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", 0x1000}, {&(0x7f0000001980)="44c41916e3b7fd3587910bce8ae66cfc6f10db607b4812de1bc134ff98ba394211f3d1f4f43ac6ca17ae1010e59196f8c5c6df4afd511a4a6db6bb79163b7ad4e5e4cd457aa1e4a70af3795ba28e97558d6f8291c55f3606d2c7ec61205b0ae73308e0cb4ed277958773ff5cb4c29d", 0x6f}, {&(0x7f0000001a00)="bb821d948c3220ccc44410c0acbdf9c8c5626c9adbc594483b0dbaa5dda8a74f145bac00d1acd9c6bcae2492e9b3da2bc9b70778157a0ca821c17e1a09dbc0ed9346b60c5364bc604ef428b812f3b411a073eebe2b1684ad68546e4f45e85c546e56d7a491fe7f47426960649bf99d999b15b161a490dedd96e2b9851842d16d13ab0235508c689fb4eab8c0db8c619730116d0180aa3aa4504c35062f0acad7fd0d382b876960586ee7553946d03edade46bb240e0c0a815386a6d6e5eb106ea3e35361baaaf4b463d10e4edd1bab3ec2ad21e3dd8eac8b003fe9", 0xdb}, {&(0x7f0000001b00)="14d7cad117defe5a3e8ef8dc9da3234114772cfed37df7bbe3d2fa", 0x1b}], 0x5, &(0x7f0000001c80)=[@rights={0x18, 0x1, 0x1, [r1, r2]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}], 0x38, 0x20000001}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = gettid() r7 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000040)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x24) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f00000000c0)={r8, 0x3}, &(0x7f00000007c0)=0xc) getpriority(0x2, r6) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6e61740000000000003f000000000000000000000000000000000000000000001b0000000500000000050000000000000000000010010000e8030000d8020000200500002005000020050000200500002005000005000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="fe800000000000000000000000000000ff02000000000000000000000000000100000000000000ff0000000000000000ffffff000000000000000000000000006272696467655f736c6176655f3000006272696467655f736c6176655f310000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003b00000400000000000000000000000000000000c800100100000000000000000000000000000000000000000000000048004d415351554552414445000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000000000000000000000000000000000000000004e2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c80010010000000000000000000000000000000000000000000000004800444e4154000000000000000000000000000000000000000000000000000100000000ff010000000000000000000000000001ff0100000000000000000000000000010100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800100100000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414aa000000000000000000000000fe8000000000000000000000000000bb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0003801000000000000000000000000000000000000000000000000280069636d70360000000000000000000000000000000000000000000000000000000000000000004800444e415400000000000000000000000000000000000000000000000000011f00000000000002000000000000000000000000fe80000000000000000000000000000008004e240000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x598) 10:08:59 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0xbc3, 0xddc, 0x2, 0x308, 0x8}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={r2, 0x3, 0xf9, 0xa0c3}, 0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={r2, @in={{0x2, 0x4e20, @remote}}, 0x5c1, 0x4, 0x1, 0xe46}, &(0x7f0000000200)=0x98) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) 10:08:59 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xd0ffbf, 0x1cbef1000, 0x1000000}], 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:08:59 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0f12a2000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 969.655721] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:08:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775a905e381e5b3b60ced5c7193b7", 0x2d0) 10:08:59 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0x3) 10:08:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001ef, 0x7ffffffff000) 10:08:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() getpriority(0x2, r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.events\x00', 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000040)=""/84, 0x54, 0x40000000, &(0x7f00000007c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000840)=ANY=[@ANYBLOB="77000000050000000100000078b9e7b9e40976b3048b24bd909eb91af43d9f9e2d468927efa33f7d20db4a64827d2705f0b33cb79a99a8308ea1b1208e50e0c0013ea0d7816d4cd09b8c1aec82976f06bbbe00020000021271faec1e18f48f1f33045dde7a7835681f96a9954fce6400aeb122894e45406dd4df2dedad88151386eb49"]) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000000c0), 0x4) [ 969.870999] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:00 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x202ae1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:00 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) syz_open_dev$vcsa(0x0, 0x10000, 0x480000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff}, 0x4000) fremovexattr(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="736563fa3a96279b4be1793841ef2a7d0b5c525c49fd3fa5029b0503f2fb64ebae08a03892eb1c1fa385e2feca67bca040b8acd078cd814446eae2c8610bf0d86aec2b7034e11ac734b0a24bd0e3a1b3c863dbfc1dccb489f3a29a60495b72b5723d7792b6dfae21b9ab5463a3247958067da1912a58035f3610f84a1f6410be99aa8c625bb97dc90ac053137e4b506d1235dc4a0da34930b159dbff279d53904b3a7234978c52f7309c7034f846bf7c88efcad0b7371593bb7af68b5f"]) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x6, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x8000, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) ioctl$RTC_VL_CLR(r3, 0x7014) 10:09:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r1, 0x78}}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x7f, 0x2) bind$alg(r2, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd85944a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpriority(0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) 10:09:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000175, 0x7ffffffff000) [ 970.196219] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:00 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x202161c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:00 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xd0ffbf, 0x1cbef1000, 0x1000000}], 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:00 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x599040, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000000c0)=""/80) 10:09:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x42000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) r3 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0xc7f4, 0x2) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000140)={r2, 0x80000, r3}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:00 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20000, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000040)=[0x3f, 0x8]) r1 = getpid() perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3f6, 0x0, 0x100000000000, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x4, 0xff00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, r1, 0xe, r0, 0x0) r2 = gettid() getpriority(0x2, r2) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) 10:09:00 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0013d2000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000132, 0x7ffffffff000) 10:09:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e21, @rand_addr=0x3f}, {0x307, @local}, 0x22, {0x2, 0x4e20, @multicast2}, 'team0\x00'}) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0xf) recvmsg(r1, &(0x7f00000004c0)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/79, 0x4f}, {&(0x7f0000000300)=""/219, 0xdb}], 0x2, &(0x7f0000000400)=""/134, 0x86, 0x5}, 0x2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0xffffffffffffffff, 0xfffffffffffffea7) 10:09:00 executing program 5: clone(0x20802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 10:09:00 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc021382000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() getpriority(0x2, r0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000007c0)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) [ 970.795953] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000040)=0x7) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x9000000, 0x4004400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getpeername$netlink(r2, &(0x7f00000000c0), &(0x7f00000007c0)=0xc) mmap(&(0x7f0000919000/0x400000)=nil, 0x400000, 0xffffffffffffffff, 0x8031, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000380)={0x8, 0x20}, 0x2000) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000040)) getpriority(0x1, r0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) 10:09:01 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xd0ffbf, 0x1cbef1000, 0x1000000}], 0x0) 10:09:01 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0311620, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:01 executing program 5: clone(0x2020000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x4000, 0x0) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000140)=0x7ff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000300), &(0x7f00000006c0)=ANY=[]}, 0x78) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e20, @local}}, 0x0, 0xffffffffffff0272}, &(0x7f0000000240)=0x90) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000280)={r2, 0x4}, &(0x7f00000002c0)=0x8) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000000)=0x1f) 10:09:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000178, 0x7ffffffff000) 10:09:01 executing program 2: socketpair(0x3, 0x80000, 0xd72, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000100)=0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = shmget$private(0x0, 0x2000, 0x78000110, &(0x7f0000ffc000/0x2000)=nil) r4 = geteuid() getgroups(0x3, &(0x7f0000000140)=[0x0, 0xee01, 0xee00]) fstat(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000000280)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee01, 0xee01]) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000002c0)=0x0) r9 = getpgid(0xffffffffffffffff) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000300)={{0x0, r4, r5, r6, r7, 0x6c, 0x1f}, 0x8, 0x100, 0x9, 0x6, r8, r9}) bind$alg(r2, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:01 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0f13720, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:01 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000140)="0521c8e9241cb5a297a88f073379916971defb62e632e360c9ac8d1e6e25fb96ceea51b5046bd149540cf312644419fbcb7bdf41404dadbc9f8008d7566135fdaca437e19707999632dcd32adfbfb4f610cd6d8adb62cea5f9afa44edb644afe84dc95ae6e92d4a9b66d71a12e11195acc0e5e10e6ceeea26fc944181c66504e60a4c11bdfb6e02c05ae497abc1d", 0x8e, 0xfffffffffffffffc) keyctl$set_timeout(0xf, r1, 0x9) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400, 0x20) 10:09:01 executing program 2: readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=""/75, 0x4b) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$set_reqkey_keyring(0xe, 0x3) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-camellia-asm\x00'}, 0xffffffffffffff9a) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x109002, 0x0) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000000300)={0x0, 0x3f, 0x3, &(0x7f00000002c0)=0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000100)=0x4) 10:09:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000005b, 0x7ffffffff000) 10:09:01 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0f11020, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 971.491118] Unknown ioctl 1075359457 [ 971.529993] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 971.558457] Unknown ioctl 1075359457 10:09:01 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000280)="59485f8dd71b9f35dac8c8b0ca17413a920c42cfe3dca1d83d4670c3c305f06c", 0x20, 0xfffffffffffffff9) keyctl$describe(0x6, r2, &(0x7f00000002c0)=""/4096, 0x1000) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) migrate_pages(r3, 0x1, &(0x7f0000000100)=0xcef, &(0x7f0000000140)=0x7ff) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x3110c3, 0x0) 10:09:02 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:02 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x270, 0x0, 0x0, 0x120, 0x0, 0x120, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, &(0x7f0000000080), {[{{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xa}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x100000000, [0x0, 0x0, 0x2, 0x6, 0xfb9f, 0x100000001], 0x9, 0x6ec6, 0x5}, {0x1ff, [0x1, 0x100, 0x7, 0xc3, 0x7ff], 0x10001, 0x6, 0x6}}}}, {{@uncond, 0x0, 0x98, 0xb8}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) clone(0x200400, &(0x7f0000000440)="49411ed3bc56ba8fba58e8a3db5599ae696f7e14ec838fe554a857d8926a3318a12db98b9227274965e63119df9a4d1c5a", &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="23b06ccb9ca4630703977dc8ac9dad8d052780e8dd5f9fe5b656133468cd72f2d3df8b954718e2baf7cba789f4c1174fcba6c0f9ac6f1db97db115f15bc3e04bc48993188afaf017b15da1be366f01349fa2df3143b745ed32a69dc46f2bc844efbb1c47643d79c8a2") 10:09:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001ba, 0x7ffffffff000) 10:09:02 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)={{0x10f, 0xfff, 0x3f, 0x1da, 0x1d4, 0xe071, 0x2d1, 0x6}, "fd52ee860ab163ebaa71c10c61565d2ab0f8762caef49f55f15d44d71a00d21d6e2c74e4d51a469d43f1f3e711b9cd049fdb6682c978c9825a8ebd463717f86b103b1e35fac0406562a5a04a406218fae7344a69846e535773e8f4d11ac28cb30e436b46b286a4bfc0e65915b60ea23ca38b2ee16b7dc1331ba86a124490f42a2b5da0cd863ff4bb4babfb9caacbe75976b7de74e67076c884a7cfaded73c9db3385ecc0f0c7e91d41a8e64a29197b", [[], [], []]}, 0x3cf) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:02 executing program 1: kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xd0ffbf, 0x1cbef1000, 0x1000000}], 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() getpriority(0x2, r0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000880)='/dev/snapshot\x00', 0x200c02, 0x0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000040)=""/135) set_thread_area(&(0x7f0000000000)={0x5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800, 0x0, 0x2, 0x4, 0x6, 0x3}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b0000000500000038050000000000000000000010010000e8030000d8020000200500002005000020050000200500002005000005000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000001600000000000000000000000000000000000000e7ff01000000000000400100000000000000000000000000000000000000"], @ANYBLOB="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"], 0x598) 10:09:02 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x200751c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 972.828838] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:02 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb01001800000000000000f0000000080100000000000075e656b453382c555404828364d79e233fce0bca6eff17a6d6f18452b590e65d017a9e59a3815a9d7a7c3b54e61e34d617bc0002d1004d8b7f751294c7773dc7d0bc396feb4bfb2ea59edc54b35eb954f992e936a2b4d79ce55b8b0d7fe709b950183ce23d7d97e89feaee51958740822a2591c2df4ab7429678c3ed2c1a61f1914983a44a1ba28d3b443c82427d01b89871a4c616fd560fc679880e3b867ed37929b2c3c46a2e0c2ffaf6e87713874e1c4e28a7d43a349203a248379509eac0459509700dab671a2ac3073b313a8366ccb9781957274232e3afb4403e05bf0fa2ea3eb9a800000000b3b1f9c05c301fccca98515fcf78e7c875fa14437df139549b6d3087811e724ec436d5742dcff26d061d1cb54c9ba611312f819eee000000000000000000"], &(0x7f0000000340)=""/215, 0x13f, 0xd7}, 0x20) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup2(r0, r0) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x3) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r3) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000ca, 0x7ffffffff000) 10:09:03 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000140)={0x1, 0x4, 0x5, 0xfffffffffffffff8}) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x200) write$evdev(r2, &(0x7f00000000c0)=[{{0x0, 0x7530}, 0x17, 0x20, 0x3f}, {{0x0, 0x2710}, 0x17, 0x3, 0x7fff}], 0x30) 10:09:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() socketpair(0x2, 0x800, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) utimensat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0) getpriority(0x2, r0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) 10:09:03 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x203a51c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x23) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:03 executing program 1: kexec_load(0x0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xd0ffbf, 0x1cbef1000, 0x1000000}], 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000124, 0x7ffffffff000) 10:09:03 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x202a31c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x82601, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000100)={[{0x7fffffff, 0xff, 0xff, 0x2, 0x6, 0x3f, 0x4, 0x0, 0x40, 0xd13, 0xfffffffffffffffb, 0x1, 0x8}, {0x3ff, 0x6, 0x5a3, 0x4, 0x3, 0x800, 0x74cf, 0x3, 0x10001, 0xa08c, 0x1f, 0x9, 0x1}, {0x2, 0x800, 0x4, 0x0, 0xfffffffffffffffa, 0x7, 0x100000000, 0x5, 0x6, 0x7, 0x7, 0x4, 0xffffffffffffffff}], 0x4}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@can, &(0x7f0000000080)=0x80) accept$packet(r1, &(0x7f00000000c0), &(0x7f00000007c0)=0x14) getpriority(0x2, r0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) 10:09:03 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x202cb1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x800, 0x0) write$FUSE_LK(r1, &(0x7f0000000040)={0x28, 0xffffffffffffffda, 0x2, {{0x3f, 0xb795, 0x0, r0}}}, 0x28) getpriority(0x2, r0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000007c0)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b0000000500000038050000000000000000000010010000e8030000d8020000200500002005000020050000200500002005000005000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="0000000000000000000004000000000000000000000000000000000000000000000000001900000000c4e6329f000000000000000000000002000000000000000000000000000000"], @ANYBLOB="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"], 0x598) 10:09:03 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x202dd1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'gretap0\x00', 0x10000}) 10:09:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000001d, 0x7ffffffff000) 10:09:04 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0f1182000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:04 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x500, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, r1, 0x10, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x5e}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffff7fff}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x0) unlink(&(0x7f0000000240)='./file0\x00') clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) 10:09:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() getpriority(0x2, r0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r2, 0x2}, &(0x7f00000007c0)=0x8) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000800)) 10:09:04 executing program 1: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000147, 0x7ffffffff000) 10:09:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40000, 0x6) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000200)=""/216, &(0x7f0000000100)=""/75, &(0x7f0000000300)=""/202}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:04 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0f10c2000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0xa0000, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x200) getpriority(0x2, r0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) 10:09:04 executing program 1: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:04 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0211720, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:04 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x203251c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:04 executing program 1: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) [ 974.311095] IPVS: ftp: loaded support on port[0] = 21 [ 975.154090] bridge0: port 1(bridge_slave_0) entered blocking state [ 975.161021] bridge0: port 1(bridge_slave_0) entered disabled state [ 975.169121] device bridge_slave_0 entered promiscuous mode [ 975.215174] bridge0: port 2(bridge_slave_1) entered blocking state [ 975.221908] bridge0: port 2(bridge_slave_1) entered disabled state [ 975.229941] device bridge_slave_1 entered promiscuous mode [ 975.275358] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 975.318665] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 975.458503] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 975.504265] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 975.700768] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 975.707938] team0: Port device team_slave_0 added [ 975.735509] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 975.743985] team0: Port device team_slave_1 added [ 975.772016] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 975.815954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 975.861316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 975.889836] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 976.184645] bridge0: port 2(bridge_slave_1) entered blocking state [ 976.191094] bridge0: port 2(bridge_slave_1) entered forwarding state [ 976.197822] bridge0: port 1(bridge_slave_0) entered blocking state [ 976.204177] bridge0: port 1(bridge_slave_0) entered forwarding state [ 976.211592] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 976.607774] device bridge_slave_1 left promiscuous mode [ 976.613293] bridge0: port 2(bridge_slave_1) entered disabled state [ 976.667977] device bridge_slave_0 left promiscuous mode [ 976.673421] bridge0: port 1(bridge_slave_0) entered disabled state [ 976.749105] team0 (unregistering): Port device team_slave_1 removed [ 976.759959] team0 (unregistering): Port device team_slave_0 removed [ 976.771155] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 976.810849] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 976.880043] bond0 (unregistering): Released all slaves [ 976.957359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 977.822539] 8021q: adding VLAN 0 to HW filter on device bond0 [ 977.983984] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 978.139476] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 978.145669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 978.162128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 978.281866] 8021q: adding VLAN 0 to HW filter on device team0 10:09:09 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000000c0)=""/47) 10:09:09 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$SCSI_IOCTL_GET_PCI(r2, 0x5387, &(0x7f0000000200)) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f0000000380)='lrw(serpent)\x00', &(0x7f00000003c0)='trusted.overlay.upper\x00'], &(0x7f0000000640)=[&(0x7f0000000440)='trusted.overlay.upper\x00', &(0x7f0000000480)='skcipher\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)="24656d302402e6766d6e65743000", &(0x7f0000000540)='em0vboxnet0em0\x00', &(0x7f0000000580)='trusted.overlay.upper\x00', &(0x7f00000005c0)='mime_type.wlan1\x00', &(0x7f0000000600)='security:\x00']) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="00fbda0308892e525ad8d44455ccb5e98e2c1e8f7bbe267f0fbce55f522ea872d00e812cd618a71a666e255c02935b24f05a1c095198b290de53a18fa027726785854d296154fdeecf1380da584b792343e7df8f4ee6d950fa6df637585d597cb42f2d53e2ca56dd0d9787af07fabb61a3561cce6af9b5ef16a2cf2ba454cb60cf810a625f46db6d1e3d8c9ccae9f61568d472ce300fc1859ee79ec093cffb7a26e63ff98b5060c39cb6f1b7c6e0f76c96518bcd171e74ff68664ada48b849997f77d058286b2ca241d0890a85101acf1530a9d9181f3d3b254d7a"], 0xda, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000100)=0x4) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:09 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() getpriority(0x2, r1) r2 = memfd_create(&(0x7f0000000000)='bridge_slave_0\x00', 0x2) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x8}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f00000007c0)={r3, 0x3c1}, 0x8) 10:09:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000e5, 0x7ffffffff000) 10:09:09 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0610020, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:09 executing program 1: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) [ 978.903384] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 978.913200] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:09 executing program 1: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) 10:09:09 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0013220, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x8010000, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4, 0x2000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0xc00000000, 0x201) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000000)=0x4, 0x4) socketpair(0x10, 0x7, 0x9, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000200)={{0x5, 0x738d8907}, {0x22, 0x80}, 0x7f, 0x4, 0x2}) fanotify_mark(r1, 0x88, 0x10010, r2, &(0x7f0000000100)='./file0\x00') getsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000002c0)=0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000255, 0x7ffffffff000) [ 978.999149] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() getpriority(0x1, r0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000e00)=ANY=[@ANYBLOB="6e614439fb2b000000007cf706873e00000000000000000000000000000000001b0000000500000038050000000000000000000010010000e8030000d8020000200500002005000020050000200500002005950000050000001fb8a7bfcdba1e6e4a59e36d3ff7085c907507db36571dafa1e2f85c39e03e553a549c5e6407dd5d12d0ab73274787ebe66527ad6363f725dbbe02eb8bc7634abfa239a752403c77e44a6a671cefaf657db570e728b91cd2ed24b92ec89a5b227bf1bdc92d085f3dcc6b4bf548dd3faa9698f1ccc4d20a63abd059caf1db", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="fe800000000000000000000000000000ff02000000000000000000000000000100000000000000ff0000000000000000ffffff000000000000000000000000006272696467655f736c6176655f3000006272696467655f736c6176655f310000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003b00000400009028f6960a03b7aa06c1a20000000000000000000000000000c800100100000000000000000000000000000000000000000000000048004d415351554552414445000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000000000000000000000000000000000000000004e2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c80010010000000000000000000000000000000000000000000000004800444e4154000000000000000000000000000000000000000000000000000100000000ff010000000000000000000000000001ff0100000000000000000000000000010100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800100100000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414aa000000000000000000000000fe8000000000000000000000000000bb0000000000000000000000fcffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0003801000000000000000000000000000000000000000000000000280069636d70360000000000000000000000000000000000000000000000000000000000000000004800444e415400000000000000000000000000000000000000000000000000011f00000000000002000000000000000000000000fe80000000000000000000000000000008004e240000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000e1dede083086e6f612e6fd"], 0x598) [ 979.047959] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:09 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000040)={@multicast1, @remote, @remote}, 0xc) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x90) ioctl$EVIOCGMASK(r1, 0x80104592, &(0x7f0000000200)={0x15, 0xda, &(0x7f0000000100)="7ecd477638a4e09e419e048db5dc69e4d55e3af9e94dfc5286074067b57c1d7d1af06def04b30b51094d85ab884dff46f88f272e0b86ef31f8595c42d3fb1d73d42ebd34b51363bcca8c82969b37e3dce843085c3107e6f3ff812e9b281b02088c60cc25f791d3b014dcc766e77a2669f6faf25cb6c02885f489234e6143e766420b29920f0e7eea8e5a655526b53d91babef059fd0a039890472601c8668eac5854a4d91b243ab217987dcc985c3879bcfca5272a4aec422bac7fce7ef146eee84b4669d773ca37a56bd5f6c6f62643e69113319737879f4c4a"}) clone(0x100400, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) 10:09:09 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0513920, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:09 executing program 1: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) 10:09:09 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x400, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000400)="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") setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) 10:09:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000014d, 0x7ffffffff000) 10:09:09 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x800, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x6f, 0x4, 0xfffffffffffffffd, "aa17e729cce5ae9da36757423fe0fbf3", "6c3ec58c6286a3ecf497fcfa1ad19d8731117b332b0d13f65fecab1a62a1fed9ba17fa6a36d2358f63064818734be1be4c45989271175bc766d73cd241a3123f72977604a6f5ffef65d097668e52ea782935c5f1ca59e28c0a12"}, 0x6f, 0x3) getpriority(0x2, r2) setxattr$security_smack_transmute(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000840)='TRUE', 0x4, 0x1) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) [ 979.283950] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:09 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0612420, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:09 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) r2 = getuid() fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$l2tp(0x18, 0x1, 0x1) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000140)={0xa0, 0x0, 0x5, {{0x2, 0x3, 0x7, 0xfffffffffffffbff, 0x401, 0x5, {0x4, 0x9, 0xffff, 0x398d, 0x0, 0x0, 0x2, 0x3f, 0x5, 0xffffffffffffd962, 0x10000, r2, r3, 0x1f, 0x8}}, {0x0, 0x1}}}, 0xa0) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x70, 0x5, 0x3, 0x1, 0x1, 0x0, 0x5, 0x20000, 0xd, 0x1, 0xff, 0x7, 0x1, 0x7, 0x5, 0x80000000, 0x9, 0x939b, 0x7ff, 0x1ff, 0x4, 0xfffffffffffffffe, 0x240000000000000, 0x9, 0xdcf, 0x3, 0x9, 0x1, 0x800, 0xffffffffffffff80, 0x100000001, 0x62f, 0x1, 0x2, 0x4, 0x1, 0xffffffff, 0x0, 0x2fa7e8c8, 0x4, @perf_config_ext={0x3f}, 0x1, 0xce6, 0x40, 0x7, 0x855d, 0x8c, 0x2}, r1, 0xf, r1, 0x2) 10:09:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x802, 0x0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x9000000, 0x4004400}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getpeername$netlink(r2, &(0x7f00000000c0), &(0x7f00000007c0)=0xc) mmap(&(0x7f0000919000/0x400000)=nil, 0x400000, 0xffffffffffffffff, 0x8031, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000380)={0x8, 0x20}, 0x2000) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000040)) getpriority(0x1, r0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) 10:09:09 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="81d835ee71481cba1bc5ff18db2327482104ac928d4ae6b603966ee2f01cd121c03323a086fe593b2df4a99cc91d2260983c9d9d36af818e61d18d8c71b9a6e53ba872550473126d9d48", 0x4a) r1 = gettid() getpriority(0x2, r1) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0), 0x4) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b0000000500000038050000000000000000000010010000e8030000d8020000200500002005000020050000200500002005000005000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x598) 10:09:09 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0811320, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000185, 0x7ffffffff000) 10:09:09 executing program 4: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000840)=0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xf24a, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x81, 0x1000, 0x0, 0x0, 0x4}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x80, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f00000007c0)={0x22, 0x3, 0x0, {0x5, 0x1, 0x0, ':'}}, 0x22) getpriority(0x2, r1) r3 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x1, 0x400) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000800)=0x400) ioctl$UI_GET_SYSNAME(r3, 0x8040552c, &(0x7f0000000180)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) 10:09:09 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2038f1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = open(&(0x7f00000005c0)='./file0\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000600)={0x0, 0x0, 0x2, [0x3, 0x37]}, &(0x7f0000000640)=0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000680)={r2, @in6={{0xa, 0x4e24, 0x1ff, @mcast1, 0x9}}, [0x3, 0x6, 0x80000001, 0x100, 0x5, 0x7, 0x5, 0x10001, 0x0, 0x6, 0x8, 0xa15, 0x2, 0x4, 0x3]}, &(0x7f0000000780)=0x100) r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r3, 0x40045731, &(0x7f0000000240)) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:09 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f0000000080)=ANY=[]}, 0x78) 10:09:09 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0xb58}, &(0x7f00000007c0)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000800)={r1, 0x81}, &(0x7f0000000840)=0x8) r2 = gettid() r3 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x5a50f778, 0x20000) ioctl$NBD_SET_TIMEOUT(r3, 0xab09, 0x3) getpriority(0x2, r2) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) 10:09:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000006d, 0x7ffffffff000) 10:09:10 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x201fc1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 979.939643] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 980.002100] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:10 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffff9c, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={r0, 0x1, 0x10}, 0xc) perf_event_open(&(0x7f0000000180)={0xfffffffffffffffd, 0xfffffffffffffd48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001e0, 0x7ffffffff000) 10:09:10 executing program 5: clone(0x200000, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000100), &(0x7f00000006c0)=ANY=[]}, 0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1011c0) ioctl$NBD_SET_SIZE(r1, 0xab02, 0x14) 10:09:10 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() getpriority(0x2, r0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b0000000500000038050000000000000000000010010000e8030000d80200002005000020da000020050000200500002005000005000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="fe800000000000000000000000000000ff02000000000000000000000000000100000000000000ff0000000000000000ffffff000000000000000000000000006272696467655f736c6176655f3000006272696467655f736c6176655f310000000000000000000000ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003b00000400000000000000000000000000000000c800100100000000000000000000000000000000000000000000000048004d415351554552414445000000000000000000000000000000000000000000000000ac1414bb0000000000000000000000000000000000000000000000000000000000004e2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c80010010000000000000000000000000000000000000000000000004800444e4154000000000000000000000000000000000000000000000000000100000000ff010000000000000000000000000001ff0100000000000000000000000000010100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c800100100000000000000000000000000000000000000000000000048004e45544d415000000000000000000000000000000000000000000000000000000000ac1414aa000000000000000000000000fe8000000000000000000000000000bb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0003801000000000000000000000000000000000000000000000000280069636d70360000000000000000000000000000000000000000000000000000000000000000004800444e415400000000000000000000000000000000000000000000000000011f00000000000002000000000000000000000000fe80000000000000000000000000000008004e240000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x598) 10:09:10 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc001032000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:10 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:10 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() getpriority(0x2, r1) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) ppoll(&(0x7f0000000000)=[{r0, 0x8}, {r0, 0x100}, {r0, 0x41}, {r0, 0x100}, {r0, 0x1021}], 0x5, &(0x7f0000000040)={0x77359400}, 0xffffffffffffffff, 0x0) 10:09:10 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x554, 0x20000) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000100)={{0x2b, @loopback, 0x4e21, 0x1, 'lblc\x00', 0x4, 0x9, 0x7d}, {@local, 0x4e21, 0x3, 0x6, 0x9, 0x10001}}, 0x44) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x1) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000002c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x80000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB='raw\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48) 10:09:10 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc011132000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 980.875721] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000164, 0x7ffffffff000) 10:09:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() getpriority(0x2, r0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2000, 0x0) write$P9_RLOPEN(r1, &(0x7f00000007c0)={0x18, 0xd, 0x2, {{0x0, 0x4, 0x8}, 0x3}}, 0x18) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000040)={0x80000000, 0x2, {0x3, 0x3, 0x6, 0x0, 0xfc00000000}}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b0000000500000038050000000000000000000010010000e8030000d8020000200500002005000020050000200500002005000005000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="0000000000000000000000000000000000020000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], @ANYBLOB="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"], 0x598) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000840)={{{@in=@multicast1, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000940)=0xe8) sendmsg$nl_netfilter(r1, &(0x7f0000000b00)={&(0x7f0000000800), 0xc, &(0x7f0000000ac0)={&(0x7f0000000980)={0x138, 0x5, 0x3, 0x2, 0x70bd2a, 0x25dfdbfb, {0xa, 0x0, 0x9}, [@generic="328c7d4a2115b951", @generic, @nested={0x11c, 0x21, [@generic="f7a9bca5c14d22aa16204f960d8b46e245af988725d99b1e6c80b31c2ba4d6f04b8b441765de973e8ed9b700c1b9bef04cc3b9bb4b34dd7a1ef654f9085b5a27ab0e13ff853a8123c1ff4fc2414c5fedb527480765c56f2a5724b955de78a8fa0bd6bc605f654bce4759f56273b90ec1e0120d4439b8cd7db77a55896877b30b1d1081d748fa6a8c04d9aefca5b211b800ecedefca01f93860e66a7be2c792b85f4d7089bf2cc36b5d78b20b569d71a5e8312bdb55a7436bbcfb596f33fa7db30624f8dc969610e30a0d9a6af452ebcb488f", @typed={0xc, 0x84, @u64=0x9}, @typed={0x8, 0x12, @uid=r3}, @generic="de7a976ed29e0e2d29b9c35d77b6ce8fc607bf64c1d1d8ff29867064e6a3dd51d37bb7cd4e2726a84d21bdc154ef97"]}]}, 0x138}, 0x1, 0x0, 0x0, 0xc080}, 0x80) 10:09:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) [ 981.005115] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000300)=""/251) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x103080, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000000)={0xfffffffffffffc01, 0x0, 0xe9c000000, 0x81}, 0x8) syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x8, 0x20080) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f00000002c0)=""/36) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000100), &(0x7f0000000040)=0x68) 10:09:11 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc001142000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:11 executing program 5: clone(0x2000000, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) 10:09:11 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x5, 0x8001, 0x5, 0xffc0000000000000, 0x0, 0x7, 0x88000, 0x1, 0x3, 0xffffffff, 0x4, 0x3, 0x7, 0x55a, 0x7f, 0x7, 0x40, 0x5, 0x0, 0x5, 0xfffffffffffffffc, 0xb6, 0x7, 0x5, 0x7, 0x81, 0xa12, 0x2f8c, 0x3, 0x4, 0x3ff, 0xf4, 0x100, 0x0, 0xfffffffffffffffb, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x6, 0x866}, 0x20000, 0x0, 0x4, 0x1, 0x1, 0xbb9, 0x727}, r1, 0x8, r0, 0x2) getpriority(0x2, r1) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) 10:09:11 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0413d20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:11 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000040)=0xffffffff) r1 = socket$alg(0x26, 0x5, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x10800) ioctl$RTC_UIE_OFF(r2, 0x7004) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-aesni\x00'}, 0x36) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000280)="0aaae49e09200000b7000018deb1626d3202a2a9cfd304a11e600000000100d94a649110dd4e7292ce7a22a02fb790db67c8e1bddd1f3ace4520353786b922a869e4d3b9502ec33dc8d74dfbd8f85592e366b79595772c01f8fa7f78c612f047e0856e6dfee3542e0041d24d1b42ab0000000000000000b97892abe3cfaf427e164e67faa263f6b782c5f4", 0x8b) fcntl$dupfd(r0, 0x406, r0) 10:09:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000027c, 0x7ffffffff000) 10:09:11 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0110e20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 981.317394] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = syz_open_dev$usb(&(0x7f0000000640)='/dev/bus/usb/00#/00#\x00', 0xfff, 0x410000) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f00000006c0)={'filter\x00', 0x7, 0x4, 0x468, 0x0, 0x130, 0x0, 0x380, 0x380, 0x380, 0x4, &(0x7f0000000680), {[{{@uncond, 0xf0, 0x130}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x1, 0xb2, 0x8f1}}}, {{@arp={@rand_addr=0x5, @remote, 0xffffffff, 0x0, @mac=@broadcast, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, {[0xff, 0xff, 0xff]}, 0x7, 0x6, 0x100000000, 0xc9, 0xfffffffffffffffe, 0x0, 'teql0\x00', 'ip6_vti0\x00', {0xff}, {0xff}, 0x0, 0x80}, 0xf0, 0x118}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0xf9d, 0x81, 0x1}}}, {{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x7, 'syz0\x00', 0xffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4b8) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000000)=0x100000) 10:09:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() getpriority(0x2, r0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x402100) [ 981.395848] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:11 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dsp\x00', 0x200000, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000000c0)={@local, @multicast1}, &(0x7f0000000100)=0x8) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000140)={@local, @multicast2, 0x0}, &(0x7f0000000180)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'team_slave_0\x00', 0x33e1a0bb9a2d2e6e}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast1, @in=@multicast1, 0x4e20, 0x0, 0x4e24, 0x3ff, 0xa, 0x80, 0x80, 0x2f, r1, r2}, {0x2, 0x400, 0xa3, 0x2, 0x8, 0x6, 0xa4, 0x5}, {0x7, 0x4, 0xfffffffffffffffe, 0x7fffffff}, 0x57, 0x6e6bbe, 0x2, 0x0, 0x3}, {{@in, 0x4d2, 0x32}, 0x2, @in6=@mcast1, 0x0, 0x2, 0x3, 0x20, 0x6, 0x5e77, 0x8001}}, 0xe8) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) 10:09:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x88000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000040)={0x1, {}, 0x7ff, 0x4}) getpriority(0x2, r0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) 10:09:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x14000, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r1, 0x4) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000100)={0x4, 0x2, 0x7, 0x9, 0x5}) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x349081, 0x0) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f0000000040)={0x5, 0x7c, 0x400, 0x4, 0xc8}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000340)="0c3d1bec11c82abf90007f0000000067fa2a0000000000080000000000000000000000000000000000000000000000000081986fcae4053a42033dd9d293ded370eb82573a4a9422eb387eba906b333fe57febaa647d5ecb3e00352ea562e623cb05cb0555fa11107a3dc7b571aec1bbcd12ce2cb499418d98fbaa46a9eec3d8a981175a96c94a758fe7a3a1e60c6344f094a000594f283499af92d47de77d40eb1d9fdd6f297cc55933e7584db4f5984fdfccd72b96a38a547f716d47a17705aa2839b6bf8fda71e11312", 0xcb) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) getresuid(&(0x7f00000002c0), &(0x7f0000000300)=0x0, &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@ipv4, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000580)=0xe8) setresuid(r3, r4, r5) 10:09:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000d8, 0x7ffffffff000) 10:09:11 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0211520, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) [ 981.629272] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:11 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000540)={0x0, 0xd0, &(0x7f0000000440)=[@in6={0xa, 0x4e24, 0xea60000, @ipv4={[], [], @loopback}, 0x2}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e23, @local}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e24, 0x80, @loopback, 0x30000}, @in6={0xa, 0x4e22, 0x4ef, @dev={0xfe, 0x80, [], 0x12}, 0x1f04bf18}, @in6={0xa, 0x4e24, 0x7fff, @local, 0x9}, @in={0x2, 0x4e23, @rand_addr}]}, &(0x7f0000000580)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000005c0)={r2}, &(0x7f0000000600)=0x8) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x163e80909998c011, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x7, 0xffff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000140)={r4, 0x4}, 0x8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz0\x00', 0x200002, 0x0) 10:09:11 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0x94, 0xfffffffffffff661}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000007c0)={r1, 0x1000}, &(0x7f0000000800)=0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() getpriority(0x2, r2) sched_getparam(r2, &(0x7f0000000000)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) write$UHID_INPUT2(r0, &(0x7f0000000840)={0xc, 0x19, "dd0491828e4045f5acd91b9989ccc5a4961035cef844d83a87"}, 0x1f) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) 10:09:11 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:11 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x200921c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-twofish-avx\x00'}, 0x10e) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000140)='hfs\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2, &(0x7f0000000380)=[{&(0x7f00000002c0)="501780c6fac24262b3faee05fc8e30fdaa1e6d4cb3f8d3d413a1d64e75a1c6ded3f5c64705b10fff5f71b9bfa8e577661d3876729e2f693c9be49f42c8cb4d99fc2295de8a3f5099bd9475e8a40184bfd36ca640e3965fd888b9afec575fcca2f17315b1cd39aa9c0f35586c63", 0x6d, 0x100}, {&(0x7f0000000340)="93fa6e64f12034170ad9a9ec23fa6f8189af0114c9e1e54d313346e9c30e3d7e9796a879f540838d51937b1d0980f50ec0ed42c1a6a72961118fa117cf", 0x3d, 0xff}], 0x800000, &(0x7f0000000540)={[{@creator={'creator', 0x3d, "fc5c66a9"}}, {@creator={'creator', 0x3d, "d65e409c"}}, {@uid={'uid', 0x3d, r2}}, {@uid={'uid', 0x3d, r3}}, {@type={'type', 0x3d, "30e88654"}}, {@dir_umask={'dir_umask', 0x3d, 0x6}}, {@type={'type', 0x3d, "60a62c9c"}}]}) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e21}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x5, 0x20}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={r4, 0x10000}, 0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) [ 981.777984] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 981.814436] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000098, 0x7ffffffff000) 10:09:12 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2005b1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:12 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) 10:09:12 executing program 4: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() getpriority(0x2, r0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) getpid() [ 981.972210] hfs: type requires a 4 character value 10:09:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) [ 982.035396] hfs: unable to parse mount options [ 982.089307] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 982.098982] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:12 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc071022000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x40, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x6, 0x2, 0x1}}, 0x30) setsockopt$inet_udp_int(r1, 0x11, 0x66, &(0x7f00000000c0)=0x7fffffff, 0x4) ioctl$UI_DEV_CREATE(r1, 0x5501) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vcan0\x00', r2}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) 10:09:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000ec, 0x7ffffffff000) [ 982.224363] hfs: can't find a HFS filesystem on dev loop2 [ 982.233251] Unknown ioctl 21761 [ 982.246624] Unknown ioctl 35123 10:09:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) [ 982.272354] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 982.283865] Unknown ioctl 21761 [ 982.288251] Unknown ioctl 35123 10:09:12 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0812220, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:12 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setpipe(r0, 0x407, 0x800) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000200)="d9da2ff77da05dd65f8654a1e2e291aa5af77d1e3233347f0ea0f6e43c8677154ff786f111c23f9e215ac1149a444eb953b43324b82f4014438bc7138db5433c71a1dbaaeaa946328cc1768a45e1b7c0b8ea613583907a5107d3e9f8e06a5411b4ab37aaac8d166a5c576776ac187aa93917ff15d797", 0x76) getsockopt$bt_sco_SCO_OPTIONS(r1, 0x11, 0x1, &(0x7f0000000000)=""/84, &(0x7f0000000100)=0x54) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:12 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080)={0x0, 0x2}, 0x8) r1 = socket$inet6(0xa, 0x6, 0x0) ioctl(r1, 0x8912, &(0x7f0000000140)="153f6234488dd25d766070") r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) sendmsg(r2, &(0x7f0000000200)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x0, 0x3, 0x1, 0x2, {0xa, 0x4e20, 0x100, @mcast1, 0x400}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000002c0)="06276f4607d391f41a36722e42f563fb4e04530c26ba97e1d8639887c3fafb11147e62a571eb5eada75e80d3ef357d45fb688b772d7715746fb3c069b2b4465c49386b453b09c25f6c64b9ceeb85266fdf90bd8d2711c4983215029aff0cc19b9c0b7ceac4b94ad968813ffe66f5b94d0088c2478e97e5e98af752c9bd0c3467edf18c878bd6a8b9632189d471604ad98e9ef28a2e4cb0d2473aac6f1090e79f65d1b00ef0048910c8bf996065944da63822826efee4ddf4", 0xb8}, {&(0x7f0000000440)="c336708668e640a5f5a0b7b26b6c9b337814dcb062c804dbc92fb5d5079aabc6d4c3bc73c3b7c8ab463bebee6b014ebe723c0de596a0b0ce0bf6e7d01244ad91509b8e73217cbc25972fdade67a577376abfb2a4e98c7f14c3d8cebded632d711fe76bad39d78ccfdbb361d50638368b17f07b03d7915e53653e9ca1d9ff02eb5deedc4940622cd08a957526c38be8ce38a28e496b898b2bf996f531d451eb5e39a2ab7611111a01c5eb4df587d9e470133f5c2a599d63b1e4349e8a59f95620c52aefeeea80c518", 0xc8}, {&(0x7f0000000540)="7c9439d0a938b8deb460db929c8ea38c4fe068b5132d89268187671c25fecd6d4e154acbb7998d758e5193fc35ed25f3bcce6acd98440d5550e8fb14239f2a616fc5242171561bd59775023711394133350509cf6e1f952b471a14bc3ccde084287ecf2cd603884d7065aa5397e7b0efd1f93d4545fb4477ce494db7b8263c1f57252738340bd6e66676c2bf12814566bb2fa6821e40f8457e1a14d7e7d8a0a2f85ddab1d10e8298251bdb059ef63408de9e6e65628e21d99784cc2b0782e3683631c5c6f336bdfd9301a1427bdeafa6297376e466aa6e73", 0xd8}, {&(0x7f0000000640)="f9d133cd28ea4c0ac419a12f06a6c51565262780832ecdeb726c340e3a6e3ed7ff0823cf934c32b7792910fba835ea520b3d457c334cec48f93a5becfe3bfd9846d8d89766ebbb442184feb2b095601825aa4c0f9106802a4c66b7a64f112a5d10e7f9a670cc254fa9cbff39c7a35171bd5cb2360f4bf9bd76eb2f63503c84678ebf9c10e9ed992792a4df80e005d6b80747", 0x92}, {&(0x7f0000000140)}, {&(0x7f0000000700)="7b9ce69370ecd6375b6287eb3a0099b8d7a6aa90921d076cd025b60b1a14180beffb6b7c5c4e4db667b4b239f8d127cad9fb321ca9a8461ef0a0178d75aa9209a18594cbf55bdde3874cd9e12273dfec2cd89f9b067037349a37fd6ab47b7ade56178ec5301e0fbdc7daaab88d0ecfebad4f255d125dd3cfa7bdaa028a164d797ce3010ddc3f7d52e440da885689670477895daf1112ff9d2a6547bf706c4c35a3d718ec44e897172396d3bba3f7d7d51731dce93669c488c4", 0xb9}], 0x6, &(0x7f0000000840)=[{0x30, 0x10f, 0x2, "eb969a0519df659b60a613d0a8ae8e0ff41c9830c9c57c706f"}, {0x90, 0x113, 0x2, "8ab3a484c966afa30d17b11717041d632960ca554e3ac02d0601686df2de0614d768a6a13b71152a5c22c280d36c48877aa8086b67511bb400e17b191b906f50187ae0383a7d45174013d25184c8a1f5e66ffddbf739f9905e64c3bc035abd819cb6f479bfdfa40ee23c5a06317a6efdc9b31bb02531281c1669"}], 0xc0, 0x24000010}, 0x40) getsockname(r2, &(0x7f0000000180)=@in={0x2, 0x0, @loopback}, &(0x7f0000000240)=0x11a) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) 10:09:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() getpriority(0x2, r0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b0000000500000038050000000000000000000010010000e8030000d8020000200500002005000020050000200500002005000005000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x598) 10:09:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001a1, 0x7ffffffff000) 10:09:12 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:12 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() getpriority(0x2, r1) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@rand_addr, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000009c0)=0xe8) r8 = getegid() getresuid(&(0x7f0000000a00), &(0x7f0000000a40)=0x0, &(0x7f0000000a80)) getgroups(0x1, &(0x7f0000000ac0)=[0xee00]) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000b00)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000c00)=0xe8) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fgetxattr(r0, &(0x7f0000001780)=@known='trusted.overlay.metacopy\x00', &(0x7f00000017c0)=""/159, 0x9f) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000d00)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000e00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e40)={0x0, 0x0, 0x0}, &(0x7f0000000e80)=0xc) r15 = getuid() getgroups(0x3, &(0x7f0000000ec0)=[0xee01, 0xffffffffffffffff, 0xee00]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000f00)={{{@in6=@ipv4, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000001000)=0xe8) getresgid(&(0x7f0000001040), &(0x7f0000001080)=0x0, &(0x7f00000010c0)) r19 = geteuid() fstat(r0, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r2, &(0x7f0000001180)={0x5e0, 0xfffffffffffffff5, 0x6, [{{0x6, 0x0, 0xc7, 0x4, 0x9, 0x20, {0x2, 0x200, 0x8001, 0x0, 0x1f, 0x0, 0x2, 0x4, 0x1, 0x80000001, 0x2, r3, r4, 0x401, 0x2}}, {0x2, 0x3, 0x5, 0x8000, 'DNAT\x00'}}, {{0x5, 0x1, 0x9, 0x1, 0xfffffffffffffffa, 0xfffffffffffffc00, {0x0, 0x0, 0x2, 0x6ea8, 0x100000001, 0x3, 0x5, 0x9, 0x3f, 0x92, 0xaf, r5, r6, 0x0, 0x100}}, {0x6, 0x8000000, 0xf, 0x0, 'bridge_slave_1\x00'}}, {{0x6, 0x3, 0x800, 0x0, 0x800, 0x1718, {0x4, 0x8, 0x10001, 0x8d08, 0x8, 0x80000000, 0x101, 0x0, 0x3, 0x3, 0x3ff, r7, r8, 0x5, 0x49}}, {0x1, 0x7ff, 0x1e, 0x9, '#trustedcgroupcgroup}bdevnodev'}}, {{0x1, 0x1, 0x3, 0x81, 0x1, 0xfffffffffffffffe, {0x6, 0x0, 0xd0, 0x80000001, 0x2, 0x10000, 0x200, 0x8, 0x8, 0xfffffffffffffffc, 0x8, r9, r10, 0x7, 0x8}}, {0x5, 0x1f, 0x0, 0xe79}}, {{0x3, 0x1, 0x0, 0x800, 0x0, 0x200, {0x4, 0x10000000000, 0x40, 0x7, 0x3, 0x4, 0xb99, 0x6, 0x6, 0x0, 0x2, r11, r12, 0x3a99, 0x100000001}}, {0x5, 0xebe, 0x1, 0x1, '-'}}, {{0x3, 0x1, 0x1ff, 0x10001, 0x10001, 0xffffffffffffea1c, {0x5, 0xffff, 0x6, 0x101, 0x60, 0x4, 0x40, 0x9, 0x3ff, 0x8, 0x4, r13, r14, 0x100, 0x4}}, {0x0, 0x8000, 0xb, 0x9, "7d2627d25c637075736574"}}, {{0x6, 0x2, 0x9, 0x3, 0x2, 0xb9, {0x3, 0x4, 0xfe8, 0x5, 0x9, 0xe1f2, 0x1, 0x5, 0x1f, 0x2, 0x4, r15, r16, 0x0, 0x9}}, {0x2, 0x5, 0x1d, 0x6, 'posix_acl_accessself*[selinux'}}, {{0x4, 0x1, 0x9, 0xc6, 0x5, 0x3, {0x0, 0x10000, 0x2, 0x20, 0x400, 0x8, 0x40, 0x100, 0x7f, 0x7fffffff, 0xfff, r17, r18, 0x2, 0x401}}, {0x4, 0x20, 0x7, 0x8, '$vmnet0'}}, {{0x4, 0x0, 0x0, 0x1, 0x4, 0x7f9c, {0x4, 0x9, 0xaf, 0x6, 0x5, 0x1, 0x8, 0x5, 0x5132, 0x8, 0x80000000, r19, r20, 0x800, 0x2}}, {0x5, 0x2, 0x0, 0xffffffffffff4a21}}]}, 0x5e0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b0000000500000038050000000000000000000010010000e8030000d8020000200500002005000020050000200508000000000005000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x598) [ 982.516875] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:12 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0613a20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000266, 0x7ffffffff000) [ 982.600320] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:12 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:12 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) bind$xdp(r0, &(0x7f00000002c0)={0x2c, 0x3, r1, 0x1c, 0xffffffffffffff9c}, 0x101) r2 = socket$alg(0x26, 0x5, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100)) bind$alg(r2, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r3 = dup2(r2, r0) ioctl$BLKBSZGET(r3, 0x80081270, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:12 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0911620, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:12 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x5, 0x760, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000000), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x13, 0xc, 0x809b, 'bond0\x00', 'veth0_to_team\x00', 'veth1_to_team\x00', 'ip6gretap0\x00', @remote, [0xff, 0x1a3ce1fe0f2600bc, 0xff], @local, [0x0, 0x0, 0xff, 0xff, 0x0, 0xff], 0x120, 0x1c0, 0x208, [@ip6={'ip6\x00', 0x50, {{@mcast2, @dev={0xfe, 0x80, [], 0x1e}, [0xff000000, 0x0, 0x0, 0xff], [0xff000000, 0xffffffff, 0x0, 0xffffffff], 0x3d, 0xef, 0x3, 0x8, 0x4e21, 0x4e24, 0x4e23, 0x4e23}}}, @realm={'realm\x00', 0x10, {{0x5, 0x5, 0x1}}}]}, [@common=@LED={'LED\x00', 0x28, {{'syz1\x00', 0x1, 0x80000001, 0x5}}}, @common=@log={'log\x00', 0x28, {{0x72, "5ed212ca61f045c95ee3551bed30cb1acc53481344dd1d2b81fbde2eac49", 0xed0b558a556bd5dc}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"22fe5358b47798bea046213a0d46e04d0ef46f58b75859d66d789d70097d"}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x2, [{{{0x5, 0x8, 0x88bf, 'eql\x00', 'bridge0\x00', 'veth1_to_team\x00', 'bpq0\x00', @random="9100cf339cfa", [0xff, 0x0, 0x0, 0x0, 0xff], @local, [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0xf8, 0x128, 0x170, [@quota={'quota\x00', 0x18, {{0x0, 0x0, 0x1, 0x8000}}}, @ip={'ip\x00', 0x20, {{@remote, @dev={0xac, 0x14, 0x14, 0x14}, 0xffffff00, 0xffffff00, 0x7, 0x5e, 0x28, 0x4, 0x4e24, 0x4e20, 0x4e21, 0x4e22}}}]}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}]}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x100000000, 0x100, 0x2}}}}, {{{0x11, 0x60, 0xfbfb, 'teql0\x00', 'dummy0\x00', 'team_slave_1\x00', 'veth1_to_bond\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @dev={[], 0xe}, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], 0xe8, 0xe8, 0x120, [@statistic={'statistic\x00', 0x18, {{0x0, 0x0, 0x2, 0x0, 0xfff}}}, @realm={'realm\x00', 0x10, {{0x8, 0x100}}}]}}, @common=@mark={'mark\x00', 0x10, {{0xfffffff0, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x2, [{{{0x7, 0x9, 0xfbfb, 'yam0\x00', 'ip6tnl0\x00', 'team0\x00', 'ifb0\x00', @random="7470c818a9c1", [0x0, 0xff, 0xdba79482284144f2, 0x0, 0xff, 0xff], @broadcast, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xc0, 0x130, 0x168, [@helper={'helper\x00', 0x28, {{0x0, 'sip-20000\x00'}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@empty, 0xffffffffffffffff}}}, @common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xfffffffffffffffc}}}]}, @common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffe}}}}, {{{0xd, 0x0, 0x1a, 'veth1_to_bridge\x00', 'dummy0\x00', 'nr0\x00', 'irlan0\x00', @random="e24e008ce695", [0xef9cae21f2aae982, 0x0, 0xff, 0xa895fab8f7a8c43e, 0xff, 0xff], @remote, [0x0, 0x0, 0xff, 0xff, 0xff], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x7d8) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x10a, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000480), &(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYRESOCT=r0, @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES32=r0, @ANYRES64], @ANYRES64=r0, @ANYBLOB="7e03c29ca2481d495ef0dcb5c9141c0e77d23873dd9b6280929d2b15a6dde9d1eda228bc796d4d1f90bb65eff746cd58143250557ca332ecd67842a65f63739eaf25aca9677c9839e04465b1dfd308246e9c197a71633a7cc44ac4d712f326adf55cc6387fcf12916293025a37ca4cd387cbdcb8af3470bc8e15a3cd8e31dae491ae7edf4ac300004884828218e29c888e4c3c0af112224b614ccf0cd3f78cf19184e0555bf510dca2d0cabc975647e123a406a0b2a67fca7a62a217fc2a70818829b79fc5358f0351b43dbad488b4021a0b601fb2ad0456a37b04fa96ad068fc1e5c251676cce42bc4d7bc9c2"], @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYBLOB="aa13def1351c30982416be6daf87bb2a28c6278be2a4d27504b0e0acd20b0d9e0e9d5faa7e0451c3b1d3f9e29d9f43dc9a7e33c51bbfbd4e6c4d483c8d221cdb2e85d8fd20c00c4ac883293f7d2ec749769970cd5a04e83d055fc9b9c11894b03dfda78e12a929565e2fc91f7bd9d02d5aca5e9c3fb994621e0b86235a414fe6feaa1a7c024035b425a280dc992a4d8c4cfd65bc476e6a1561d7c6bef21c15fe25e97a68f116be94c188dd9a6f", @ANYRESDEC=r0]}, 0x182) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000c40)={{0x2, 0x4e22, @multicast1}, {0x6}, 0x10, {0x2, 0x4e23}, 'bond_slave_0\x00'}) 10:09:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x141801) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000200)={'mangle\x00', 0xdf, "c118347cae9be10ba1dfb77071169dd2504afe15d3dc1fba0e47fbbc4c71d7925a39eb00c83c2c51586b33079001b2268846c68e7eb6b50a6a9b0854fc49ed80a13b1ca368ef18032793c3bb5356ef2127fc1a22d2431c556ce51a7548df500444f43f2275bb6be1173ae353595e4099f087ce8684c5a61513b20ddac55ba7b684e64aab5222908783e66589980a5f6dd7307514c08921ac1610ad306b94154c971b12ddb2e5f67525b5471cac4289364a0bc3f3806b868b8bfefa6d7e2fb6d9fb9d56f40c70afb50df53549d2a5984e6e960fb88dd0deb6c4294a72d3f31f"}, &(0x7f0000000040)=0x103) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:12 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x96, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = socket(0x14, 0x2, 0x2) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000000)={{0x3f, @empty, 0x400004e21, 0x4, 'wlc\x00', 0x1, 0x2, 0x7e}, {@remote, 0x4e21, 0x10007, 0x7, 0xfffffffffffffffe, 0x101}}, 0x44) getpriority(0x2, r0) 10:09:13 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0c13520, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() getpriority(0x6, r0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x101000, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000010000000000001b0000007700000038050000000000000000000010010000e8030000d8020000200500002005000020050000200500002005000005000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x598) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f00000007c0)={{0x4, 0x4, 0x3, 0x1, '\x00', 0x5}, 0x1, 0x20000008, 0x80000000, r0, 0x1, 0x5, 'syz1\x00', &(0x7f0000000040)=['NETMAP\x00'], 0x7, [], [0x40, 0x8000, 0xfffffffffffffffc, 0xcce]}) 10:09:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='clear_refs\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000140)={r0, r1}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400081, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x17, &(0x7f0000000040)=0x1, 0x4) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="009bdb000000000000000000bda8b60f9ac7516e28a067501636fd83606f901d4a504cf744a829470f3d5eecd2cdc2313bc9dc4625501288db89188eee4e8315f21b63ca8e900aa56aac825a5f913664c22f0c4577d1996f0696db3990598dff336a8d68091b95aa606d60434d3e4ddc351847015affd3994e33ae207308709f29c7f909f14de95c626342ea08b369cc891a23c52892a41201246257da0f4b9a48766711532afa4a068e4bea89430cf1f5491b6082a6352c3d2c9f6d0d702e112766112a664c3f58fc00b5e435ac", 0x12d64834d35cef97) 10:09:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001fc, 0x7ffffffff000) [ 983.003614] kernel msg: ebtables bug: please report to author: entries_size too small 10:09:13 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0c10a20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:13 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) [ 983.092674] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 10:09:13 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x1, 0x0) socket$kcm(0x29, 0x80000002, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000100)={0x4, 0xf21000000000, 0x20, 0x5}) 10:09:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) write$P9_RATTACH(r1, &(0x7f0000000040)={0x14, 0x69, 0x1, {0xaf24078df6f042c8, 0x2, 0x2}}, 0x14) getpriority(0x1, r0) getpriority(0x2, r0) 10:09:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400000, 0x0) ioctl$NBD_DO_IT(r1, 0xab03) 10:09:13 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:13 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x201321c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 983.290762] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() getpriority(0x2, r0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) getpgrp(r0) 10:09:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000005, 0x7ffffffff000) [ 983.382341] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4$vsock_stream(0xffffffffffffff9c, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @reserved}, 0x10, 0x80000) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000040)={'erspan0\x00', {0x2, 0x4e22, @local}}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:13 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:13 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0b10320, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() getpriority(0x2, r0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) 10:09:13 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000280)={r0, &(0x7f0000000140)="67ab6c53ae08562109e21dfec50517e7d14a649bf196c61ee0251068406988af33ca076641e11e55e6ee4152446fd818352d864536f47d6593dfc2c931a752bdb00ceb377fc9c6de455dc11a0e9f8a4afa6a5badfe57c11dbb821df791b9b9fe0b824d2bc293f742ba6d39df03e824046273bcf2ff9ebb498c4addc651ba86a7a1751a846bdab78e237e8798af34de8b3e06eb8aeb3b41c7dee5063513876cecac9e6867b3fc928bd29c9f8ff943874de4570ba6024f46e0ee35261eff7052d114a083196ee637d7a94f9aeb8566eb673feda43c", &(0x7f0000000240)="179dfb8c31ae3ecc6178b910b79b5f", 0x1}, 0x20) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000440)={r1, r0, 0x1, 0x3, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x51b52d9b, 0xffffffff, 0x9, 0x59, "ff90c92b74ba47aa4844052bf2e3e0245b845e54124e43618f64b3e79cb8bb5928e95aabfc5da017309018022cbe79d92a3463aa2b100a010cc4805da94e2ff40f52e46852fea01e2f59d31d35749ed9019a98da0fad07675666404cc2646ccb21b91039607489e009cc27764ee9afae736f4bb8ba48b70d56dbd03e91d5680b056f2f895b7a022fe4bd04a697ed82ba592bccd9e53359439aa820c02bc32c7b0750a7f36503214dc1682467f6d0a8b2687b51f4e133"}) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000002c0)) 10:09:13 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2000) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040), 0x4) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) fcntl$setlease(r1, 0x400, 0x1) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e22, @loopback}}, [0x100000000, 0x61d5, 0xffffffffffffff36, 0x6, 0x0, 0x6, 0xfe, 0xcf9, 0x2, 0x9, 0x9, 0x7, 0x0, 0xc0d3, 0xffffffffffffff01]}, &(0x7f0000000100)=0x100) r4 = dup2(r0, r1) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000340)={r2}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r3, 0x0, 0x1, 0x89d, 0xfffffffffffffffe, 0xfc0000000000}, &(0x7f0000000300)=0x14) bind$alg(r2, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) ioctl$SCSI_IOCTL_DOORUNLOCK(r4, 0x5381) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000058, 0x7ffffffff000) 10:09:13 executing program 1: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) [ 983.648049] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:13 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x14000, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r1, 0x4) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000100)={0x4, 0x2, 0x7, 0x9, 0x5}) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x349081, 0x0) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f0000000040)={0x5, 0x7c, 0x400, 0x4, 0xc8}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000340)="0c3d1bec11c82abf90007f0000000067fa2a0000000000080000000000000000000000000000000000000000000000000081986fcae4053a42033dd9d293ded370eb82573a4a9422eb387eba906b333fe57febaa647d5ecb3e00352ea562e623cb05cb0555fa11107a3dc7b571aec1bbcd12ce2cb499418d98fbaa46a9eec3d8a981175a96c94a758fe7a3a1e60c6344f094a000594f283499af92d47de77d40eb1d9fdd6f297cc55933e7584db4f5984fdfccd72b96a38a547f716d47a17705aa2839b6bf8fda71e11312", 0xcb) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) getresuid(&(0x7f00000002c0), &(0x7f0000000300)=0x0, &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@ipv4, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000580)=0xe8) setresuid(r3, r4, r5) 10:09:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000025f, 0x7ffffffff000) [ 983.702594] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:13 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0a1192000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:13 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 10:09:13 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x220000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0x1a, "8bb6b0781263f3a58abdb54bc50bbf4aee8019d12843244367db"}, &(0x7f0000000200)=0x22) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={r2, 0x5, 0x30, 0x6, 0x1}, &(0x7f0000000280)=0x18) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x58) 10:09:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:14 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc061222000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:14 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) [ 983.925826] kernel msg: ebtables bug: please report to author: Entries_size never zero [ 983.951392] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:14 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:14 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={r1}) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000002c0)) r3 = fcntl$getown(r0, 0x9) get_robust_list(r3, &(0x7f0000000200)=&(0x7f0000000140)={&(0x7f0000000000), 0x0, &(0x7f0000000100)={&(0x7f0000000040)}}, &(0x7f0000000240)=0x18) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000380)="0a2175b005e381e5b3b60ced5454dbb79b827a247f62ea05751886c32c31fbff00000000a2b0de09743635bac61788dba5dc1212df88552533f1acec89c4abc9e72bc29f2e33bdc8660f7fb0c0dc445148422ef65d49896a0496b41ccc1c7f0835f11716743b5a54683e6d07c5c0efa157db582591fb96ee485f5e46c57fc51df0e5f138e10d0aef8bd816545887e97bfb307773139d6a7910bf2835f1a8121e1bb0324176229caa1234", 0xaa) 10:09:14 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2024a1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) [ 984.052373] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000238, 0x7ffffffff000) 10:09:14 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x4, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYRESOCT]}, 0x8f) 10:09:14 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2011e1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) [ 984.227170] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 10:09:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x88000, 0x0) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000040)) 10:09:14 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) [ 984.344583] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 10:09:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000011b, 0x7ffffffff000) 10:09:14 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x201371c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:14 executing program 5: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000180)={0x6, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f00000001c0)={r2, 0x3}) 10:09:14 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = fcntl$getown(r0, 0x9) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)=0x0) setpgid(r3, r4) r5 = geteuid() r6 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x2}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000480)={0x0, 0x3a, "aa6cbc4d2f79562e25bd64d349be0e0e51e400a06c663752a14fa92cab571bd3065c7412afbef06317e7b6a0c9b3f9a3ee54fcfdf2a010c806ee"}, &(0x7f0000000500)=0x42) getsockopt$inet_sctp_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f0000000540)={r7, 0x3, 0x2, 0x7fff, 0x100000000, 0x7f, 0x7, 0x343a, {r8, @in={{0x2, 0x4e23, @loopback}}, 0x4, 0x8a, 0x7, 0x9, 0x1}}, &(0x7f0000000600)=0xb0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e23, 0x0, 0x2, 0xa0, 0x20, 0xff, r2, r5}, {0x20, 0x1, 0xbb1, 0xfffffffffffeffff, 0x1, 0x3f, 0x9, 0x9}, {0xaf1, 0x1a2, 0x267d59cf, 0x7}, 0x7, 0x6e6bb4, 0x0, 0x1, 0x1, 0x3}, {{@in=@remote, 0x4d3, 0x7e}, 0x2, @in6, 0x3504, 0x0, 0x2, 0x8, 0x400, 0x7, 0x1}}, 0xe8) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x80000000}) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000140), 0x4) 10:09:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) 10:09:14 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:14 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc001202000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 984.594199] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000016, 0x7ffffffff000) [ 984.668428] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:09:14 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0612e2000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:14 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xd0ffbf, 0x1cbef1000, 0x1000000}], 0x0) 10:09:14 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = semget$private(0x0, 0x3, 0x111) semctl$GETVAL(r1, 0x0, 0xc, &(0x7f0000000200)=""/185) 10:09:14 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0911520, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:15 executing program 1: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000102, 0x7ffffffff000) 10:09:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = add_key(&(0x7f0000000440)='id_resolver\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000004c0)="7d910b4de8e2bd7d966c53ca7149bf7c", 0x10, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r1, r3) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x3f, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="97a06462e30938a05b00c48fbe94bd044ffe18cfc7f3a851e85d9aedbc9574b8db8419758c14eda6dd57f0c26b104d6365a6bc51184bc2e059890aae5093e10c69670350b9b8ca4516b18a65874b7837f4b9778a8c6b856b8565b9f522aedaf7215e9e40d85f0125addb925bb5d8530eae657026645e8ef085bfed2a09ffe305f461da90739609bd261f6b3e5d8c16e0a00265108be17f5dd54b06d77e", 0x9d, 0x2}, {&(0x7f0000000100)="0fcac9f502aa41912c54101c94110d5f444506e402e07db805ba711f7441b460f9f05bcb8cc98693613560bde0f61b1dd3421a5bb5a17c4e1d52cb5a62175b93d8a96f9914", 0x45, 0x9}], 0x0, &(0x7f00000003c0)={[{@disable_sparse_yes='disable_sparse=yes'}, {@gid={'gid', 0x3d, r2}}, {@nls={'nls', 0x3d, 'cp850'}}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0xffffffffffffffff}}, {@dmask={'dmask', 0x3d, 0x6}}]}) 10:09:15 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x203c21c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x601}, 0x33fe0}}, 0x0) 10:09:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) [ 985.154660] ntfs: (device loop2): parse_options(): Unrecognized mount option . 10:09:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x601}, 0x33fe0}}, 0x0) 10:09:15 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000200)={{{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000040)=0xe8) r3 = fcntl$getown(r0, 0x9) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000640)=0x0) setpgid(r3, r4) r5 = geteuid() r6 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x40000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000400)={0x0, 0x2}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000480)={0x0, 0x3a, "aa6cbc4d2f79562e25bd64d349be0e0e51e400a06c663752a14fa92cab571bd3065c7412afbef06317e7b6a0c9b3f9a3ee54fcfdf2a010c806ee"}, &(0x7f0000000500)=0x42) getsockopt$inet_sctp_SCTP_STATUS(r6, 0x84, 0xe, &(0x7f0000000540)={r7, 0x3, 0x2, 0x7fff, 0x100000000, 0x7f, 0x7, 0x343a, {r8, @in={{0x2, 0x4e23, @loopback}}, 0x4, 0x8a, 0x7, 0x9, 0x1}}, &(0x7f0000000600)=0xb0) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000300)={{{@in=@loopback, @in6=@loopback, 0x4e21, 0x0, 0x4e23, 0x0, 0x2, 0xa0, 0x20, 0xff, r2, r5}, {0x20, 0x1, 0xbb1, 0xfffffffffffeffff, 0x1, 0x3f, 0x9, 0x9}, {0xaf1, 0x1a2, 0x267d59cf, 0x7}, 0x7, 0x6e6bb4, 0x0, 0x1, 0x1, 0x3}, {{@in=@remote, 0x4d3, 0x7e}, 0x2, @in6, 0x3504, 0x0, 0x2, 0x8, 0x400, 0x7, 0x1}}, 0xe8) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0x80000000}) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000140), 0x4) 10:09:15 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x203d01c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000013, 0x7ffffffff000) 10:09:15 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(r0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x601}, 0x33fe0}}, 0x0) 10:09:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:15 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x202f11c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000008e, 0x7ffffffff000) 10:09:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:15 executing program 5: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0xfffffffffffffe89) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000003c0)=0x4) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x21200}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="00052abd7000fddbdf250200000008000500000000001800020014000100ac1414bb000000000000000000000000080004000400000008000600ff7f00000c00030008000800a00000005c000300080005007f000001080001000000000008000500e0000002140002007663616e30000000000000000000000008000500e0000002140006000000000000000000000000000000000008000300000000000800080001000000"], 0x1}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r0, 0x28, &(0x7f0000000400)}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socket$packet(0x11, 0x3, 0x300) dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) 10:09:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x2a002) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000040)={0x20, 0x10000}) 10:09:15 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc031182000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:15 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000022a, 0x7ffffffff000) [ 985.741694] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:15 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc001242000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:15 executing program 2: uname(&(0x7f0000000080)=""/174) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0xffffffd4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:16 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0411d2000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 985.984201] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:09:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x114) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0x3, 0x0, 0x10001, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) bind$bt_sco(r1, &(0x7f0000000140)={0x1f, {0x3, 0x7, 0x7e, 0x9, 0x8000, 0x25dc07f3}}, 0x8) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) [ 986.024501] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:09:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000011a, 0x7ffffffff000) 10:09:16 executing program 5: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0xfffffffffffffe89) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000003c0)=0x4) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x21200}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="00052abd7000fddbdf250200000008000500000000001800020014000100ac1414bb000000000000000000000000080004000400000008000600ff7f00000c00030008000800a00000005c000300080005007f000001080001000000000008000500e0000002140002007663616e30000000000000000000000008000500e0000002140006000000000000000000000000000000000008000300000000000800080001000000"], 0x1}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r0, 0x28, &(0x7f0000000400)}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socket$packet(0x11, 0x3, 0x300) dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) 10:09:16 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc061052000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:16 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000000)=0x1, 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x33) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bind$netlink(0xffffffffffffffff, &(0x7f0000000100), 0xc) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x601}, 0x33fe0}}, 0x0) 10:09:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'system.', 'proc\x00'}, &(0x7f0000000100)=""/18, 0x12) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000240, 0x7ffffffff000) 10:09:16 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0313720, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:16 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:16 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000100), 0xc) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x601}, 0x33fe0}}, 0x0) [ 986.587866] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:16 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x200411c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 986.694899] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:09:16 executing program 5: setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000200)={0x0, &(0x7f00000001c0)}, 0xfffffffffffffe89) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500), &(0x7f0000000540)=0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000003c0)=0x4) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x21200}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="00052abd7000fddbdf250200000008000500000000001800020014000100ac1414bb000000000000000000000000080004000400000008000600ff7f00000c00030008000800a00000005c000300080005007f000001080001000000000008000500e0000002140002007663616e30000000000000000000000008000500e0000002140006000000000000000000000000000000000008000300000000000800080001000000"], 0x1}}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r0, 0x28, &(0x7f0000000400)}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) socket$packet(0x11, 0x3, 0x300) dup2(0xffffffffffffffff, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f00000003c0)=@broute={'broute\x00', 0x20, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200006c0], 0x0, &(0x7f0000000000), &(0x7f00000006c0)=ANY=[]}, 0x78) 10:09:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000099, 0x7ffffffff000) 10:09:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = dup(r0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000040)={0xffff, 0x7fffffff, 0x4, @broadcast, 'team_slave_1\x00'}) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000000)={0x2c, 0x28, 0x13, 0x2, 0x4, 0x91, 0x3, 0x7f}) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:16 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000100), 0xc) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x601}, 0x33fe0}}, 0x0) 10:09:16 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0a1342000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:16 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000100), 0xc) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x601}, 0x33fe0}}, 0x0) 10:09:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:17 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0b1252000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000040)={&(0x7f0000ffd000/0x1000)=nil, 0xfff, 0x7, 0x20, &(0x7f0000ffd000/0x2000)=nil, 0x7a}) 10:09:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000104, 0x7ffffffff000) [ 987.020375] kernel msg: ebtables bug: please report to author: Entries_size never zero 10:09:17 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000100), 0xc) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x601}, 0x33fe0}}, 0x0) 10:09:17 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0c11020, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 987.135598] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 10:09:17 executing program 5: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x201581c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) clock_gettime(0x0, &(0x7f0000000940)={0x0, 0x0}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f00000009c0), &(0x7f0000000a40)=0x68) recvmmsg(r0, &(0x7f00000008c0)=[{{&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000000140)=[{&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f0000000200)=""/115, 0x73}, {&(0x7f0000000280)=""/183, 0xb7}], 0x3, &(0x7f0000000340)=""/44, 0x2c, 0x8}, 0x8}, {{&(0x7f0000000380), 0x80, &(0x7f00000007c0)=[{&(0x7f0000000400)=""/124, 0x7c}, {&(0x7f0000000480)=""/157, 0x9d}, {&(0x7f0000000540)=""/32, 0x20}, {&(0x7f0000000580)=""/246, 0xf6}, {&(0x7f0000000680)=""/226, 0xe2}, {&(0x7f0000000780)=""/47, 0x2f}], 0x6, &(0x7f0000000840)=""/96, 0x60, 0xfff}, 0x7}], 0x2, 0x10000, &(0x7f0000000980)={r1, r2+10000000}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:17 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000100), 0xc) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x601}, 0x33fe0}}, 0x0) 10:09:17 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x202d31c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000259, 0x7ffffffff000) 10:09:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x1, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000040)={0x1, 0x6, 0x7ff, 0x8d2, 0x9}) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x40000, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000200)=0x7, 0x4) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000100)={0x2, 0x1, 0x76, 0x7f, 0x7, 0x80000001}) 10:09:17 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x201e51c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:17 executing program 5: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) flistxattr(r0, &(0x7f0000000040)=""/34, 0x22) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000007c0)=0x14) bind$bt_hci(r2, &(0x7f0000000800)={0x1f, r3, 0x3}, 0xc) getuid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = gettid() getpriority(0x1, r4) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x847) socket$netlink(0x10, 0x3, 0x1f) 10:09:17 executing program 4: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000100), 0xc) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x601}, 0x33fe0}}, 0x0) 10:09:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001d6, 0x7ffffffff000) 10:09:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x9, 0x208080) sendmsg$inet_sctp(r0, &(0x7f0000001400)={&(0x7f0000000040)=@in6={0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}, 0x3d}, 0x1c, &(0x7f0000001380)=[{&(0x7f0000000100)="5ff20e20ff3960313b0ed3e0486077151ed537689a582a0548817295961def7d66321cf0303f73e681bbe5660095b62e81fe5ae029adbbcfa817cad147fe66567e1adf3a88e8261cbb6f29651755a247fd8cee4e6e5382e8ae7483b5de546b64d74873bc2e27b811d86f18d58fbd70711bb0730b", 0x74}, {&(0x7f0000000200)}, {&(0x7f0000000240)="6609f52df8b5f787a7bf651f2cb873fda3c10aaa906b783cdc6c7f5736bf0d5cc4d3c0f9f4713224930ea306c89d08aed6899fd8abdd7380af9992dfefba270f33411d3af9aae66fdcf2bb01b9b43d3853598fa8e647584ffc386c56b204bbf3b77b6a1f34f50e763853612f13b77d28b51c526270ab5191551ad5161b65740b01ab82a72abbab91", 0x88}, {&(0x7f0000000300)="c4967a9555fe957acd51954d5a915e6baa1d32a304b1fe47d5d5e92b537765d64f7e54ecb8be8e0c70076ff28330582a43c98cf298335d8c725d4d5285bab2bac46e63000b991cf6bcc1ba3a0249c723fb32e3d3e49087917b9d64417d310d79952bab45c09393b55a35a8", 0x6b}, {&(0x7f0000000380)="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", 0x1000}], 0x5, 0x0, 0x0, 0x20000050}, 0x20000000) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000200), 0x4) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:17 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:17 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0810e2000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:17 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:17 executing program 5: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) flistxattr(r0, &(0x7f0000000040)=""/34, 0x22) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000007c0)=0x14) bind$bt_hci(r2, &(0x7f0000000800)={0x1f, r3, 0x3}, 0xc) getuid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = gettid() getpriority(0x1, r4) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)=@nat={'nat\x00', 0x1b, 0x5, 0x538, 0x0, 0x0, 0x110, 0x3e8, 0x2d8, 0x520, 0x520, 0x520, 0x520, 0x520, 0x5, &(0x7f0000000100), {[{{@ipv6={@dev, @mcast2, [0x0, 0xff], [0xffffff00], 'bridge_slave_0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x3b, 0x0, 0x4}, 0x0, 0xc8, 0x110}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv4=@remote, @ipv4, @icmp_id, @port=0x4e20}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@mcast1, @ipv6=@mcast1, @gre_key=0x1, @icmp_id}}}, {{@uncond, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@local, @ipv6=@remote, @icmp_id}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00'}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1f, @ipv4=@rand_addr=0x2, @ipv6=@dev, @gre_key=0x8, @port=0x4e24}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x847) socket$netlink(0x10, 0x3, 0x1f) 10:09:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x800, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10040000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x30, r2, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x16}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_TYPE={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4040}, 0x4000001) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000021a, 0x7ffffffff000) 10:09:18 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:18 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0711d20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:18 executing program 5 (fault-call:0 fault-nth:0): kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:18 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x7f}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r2, &(0x7f0000000140)=0x4) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80, 0x30) fcntl$notify(r0, 0x402, 0x20) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f0000000240)={r3, 0x400, 0x30, 0x20, 0x9}, &(0x7f0000000280)=0x18) accept4$alg(r1, 0x0, 0x0, 0x801) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000005c0)="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", 0x100000261) 10:09:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000014a, 0x7ffffffff000) 10:09:18 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0f12a20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x401, 0x8000) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x42}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x20, r1, 0x408, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x14) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000280)=""/4096, &(0x7f0000001280)=0x1000) inotify_init() r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:18 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:18 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:18 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0512d20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001e7, 0x7ffffffff000) 10:09:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) set_mempolicy(0x1, &(0x7f0000000000)=0x2, 0x7) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:18 executing program 5: kexec_load(0x10, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:18 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000100), 0xc) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x601}, 0x33fe0}}, 0x0) 10:09:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:18 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd8af}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) ioctl$TIOCSBRK(r0, 0x5427) 10:09:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000120, 0x7ffffffff000) 10:09:18 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2016d1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:18 executing program 5: kexec_load(0x3e0000, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:18 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000100), 0xc) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x601}, 0x33fe0}}, 0x0) 10:09:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a07dbb7000000000000000000000000", 0xfffffffffffffcf3) 10:09:18 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x202621c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:18 executing program 4: socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000100), 0xc) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x601}, 0x33fe0}}, 0x0) 10:09:18 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000005a, 0x7ffffffff000) 10:09:19 executing program 5: kexec_load(0x1000000000000000, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x2, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:19 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x203931c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:19 executing program 5: kexec_load(0x3e0000000000, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000200)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000003a, 0x7ffffffff000) 10:09:19 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc011342000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:19 executing program 5: kexec_load(0x10000000, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:19 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) fadvise64(r0, 0x0, 0x5, 0x7) 10:09:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180), 0x0) 10:09:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000010b, 0x7ffffffff000) 10:09:19 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0512a2000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:19 executing program 5: kexec_load(0x3e00, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0xc6) 10:09:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5", 0x8) 10:09:19 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0310220, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:19 executing program 5: kexec_load(0x0, 0x3e0000000000, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:19 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:19 executing program 5: kexec_load(0x0, 0x10000000, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001b5, 0x7ffffffff000) 10:09:19 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0b10e20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:19 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced", 0xc) 10:09:19 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9, 0x3de3509e430d18d4) fstat(r0, &(0x7f0000000100)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x4) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) 10:09:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:20 executing program 5: kexec_load(0x0, 0x3e00, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54", 0xe) 10:09:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400402, 0x0) setsockopt$inet6_dccp_buf(r1, 0x21, 0xe, &(0x7f0000000100)="0d8e277f701f2ed3418a5f88292a1191290c23f38e14802ff2605c2c7b0a7534d6a7e6e63ce415064a7807b7fec2d0a2b8ee299f33e84badb83f064975677435fce8e5f58fd3690ebc6591a25e950f7aa54192b9b00c8850e82f2b69b09a2f7f9f1828b90ead48221a9966bc58b8a5a0bb91fc073f74bda5575cc6b17b", 0x7d) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:20 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2039f1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:20 executing program 5: kexec_load(0x0, 0x3e0000, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:20 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54db", 0xf) 10:09:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000219, 0x7ffffffff000) 10:09:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:20 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x201431c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:20 executing program 5: kexec_load(0x0, 0x10, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000200)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488d") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:20 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc051282000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:20 executing program 5: kexec_load(0x0, 0x1000000000000000, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000200)="a75a25d0d0a045ea6812e9be9ce8f6eb4749d7237c31b188dfeebb6a2152d0f4f8b4234aee8b89502174e44169d8403a29b959ab1b2067807555e7a59bf00a25c6161a13186a1fc14ba761e232807f685adb3e830b5a199c6296298d9e4dab399418b60c98232ef16be0bbec538e1c5a9b652e1458f40c56f6b345ed4266f8b150a9e0932285473e659c315a01c7d7b3fbe9cea5ca66f47171a85f414b3d7d0d11a608fe80d53ff5bd3d13a0aa022421a984554e8d4b1a98896104640c66487a5e4480394275dc13a275797628193d3a6815c4a66dc3a2cab6d4e70a8431471e8f312454275293e677707d159772cbd73e18db6d04aeca70a12c4bdd55c66098") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:20 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc031262000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000034, 0x7ffffffff000) 10:09:20 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x10) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:20 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt(r0, 0xffffffffffff56af, 0x0, &(0x7f0000000100)=""/107, &(0x7f0000001380)=0x6b) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$binfmt_elf32(r2, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0x7b, 0xa2, 0x8, 0x9d, 0x0, 0x3, 0x3e, 0x1, 0x66, 0x38, 0x8f, 0x4, 0x0, 0x20, 0x2, 0x7, 0xcdfe3e1, 0x6}, [{0x6474e551, 0x6bf, 0x80, 0x4, 0x20000000000, 0x0, 0x1}], "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", [[]]}, 0x1158) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={'veth1_to_bond\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1c}}}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000200)="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") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:20 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x3e0000) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:20 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0a1182000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:20 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a07b700400000000000800000000000aab97228f63a940121a58b4d2cfb9a2b674c2cbd6f42ad75126121e52a7d9d0396fdef10f3c7d34fde4f29a5b6cc1053d8fe6f7997d6bb99a3d5b8dcf86b7ce2e4334d6b", 0x54) 10:09:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000014, 0x7ffffffff000) 10:09:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:21 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x1000000000000000) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d76") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:21 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0010f20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0x80, &(0x7f0000000080)="7cd3b09d66e43868", 0x8) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 10:09:21 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2027d1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000007a, 0x7ffffffff000) 10:09:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:21 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x3e0000000000) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:21 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) fstat(r0, &(0x7f0000000000)) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:21 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x201eb1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000010a, 0x7ffffffff000) 10:09:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:21 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xef, 0x80180) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x3, 0x1, &(0x7f0000000200)=""/182, &(0x7f00000002c0)=""/221, &(0x7f0000000040)=""/60, 0x107000}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:21 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x10000000) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:21 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x3e00) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d7660") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:21 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc021302000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7fffffff, 0x0) 10:09:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000278, 0x7ffffffff000) 10:09:21 executing program 5: kexec_load(0x0, 0x99, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:21 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0a1332000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:21 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:21 executing program 5: kexec_load(0x7, 0x67, &(0x7f0000001140)=[{&(0x7f0000000100)="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", 0x0, 0x13, 0xa3}, {&(0x7f0000001100)="27769907a3ae72e6d043f1ad583bf201eca04a6d33ecd4fff866889b50fc1cfbd72bbcc3893fa7f3087218a1", 0x0, 0x8fd3, 0x101}], 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/igmp\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000080)={0x1ff, 0x3, 0x10000, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) 10:09:21 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x655, 0x400000) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dsp\x00', 0xa2001, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x60, r2, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7f}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r0}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x92c2}]}, 0x60}}, 0x80) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0xffffffffffffffd7) r5 = dup2(r4, r0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x1, 0xfff}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e21, 0x5, @loopback, 0xf38}}, 0x80, 0x80000000, 0xfffffffffffffc00, 0x0, 0x7}, &(0x7f0000000100)=0x98) ioctl$TIOCMBIC(r5, 0x5417, &(0x7f0000000140)=0x3) 10:09:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001cd, 0x7ffffffff000) 10:09:21 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0c1262000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:22 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x40400, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000080)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x1c) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={r1}, 0x8) 10:09:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:22 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x202b91c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:22 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) fcntl$setsig(r0, 0xa, 0x13) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000236, 0x7ffffffff000) 10:09:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:22 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 10:09:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000840)='/dev/sequencer2\x00', 0x105840, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000880)={0x0, 0x45, "f6d8ebe2766456efec5f5e9473b412ed70ff50358ee7dce1dd5c03fd98ac6fd12ac73852f8cb208321eb218a63fdbbeb6b818accb6aaa78808f94c91be630f120cebbf2bef"}, &(0x7f0000000900)=0x4d) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000940)={r2, 0x5, 0x10}, 0xc) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:22 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0410b20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$P9_RRENAMEAT(r1, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x800, 0x0) 10:09:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:22 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x3e, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x3b, @loopback, 0x4e21, 0x2, 'wrr\x00', 0x1, 0x4, 0x49}, 0x2c) 10:09:22 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0f11b20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000055, 0x7ffffffff000) 10:09:22 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x200c91c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:22 executing program 5: kexec_load(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040)="6cab9702bdc8b593f52a7a2a7569d044dd6e04ac809f658fc4047b986411ac9f243c85438ba94fde3d72628d1d63527819", 0x31, 0x3, 0xe5}], 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:22 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x201a31c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000224, 0x7ffffffff000) 10:09:22 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) 10:09:23 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f00000033c0)='/dev/vcsa#\x00', 0x0, 0x24080) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000003400)) r1 = syz_open_dev$usbmon(&(0x7f0000003300)='/dev/usbmon#\x00', 0x8cbe, 0x200101) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000003380)={0x4, &(0x7f0000003340)=[{0x9, 0x2, 0x6, 0x2}, {0x0, 0x4, 0x7fffffff, 0x9}, {0xfffffffffffffeff, 0x8, 0x9, 0x800}, {0x8, 0x4, 0x5, 0x1}]}, 0x10) kexec_load(0x0, 0x6, &(0x7f0000003240)=[{&(0x7f0000000040)="aa5d3609e49dd34047d5dee2ce1a79ab15ed5e431eaddb7b9586ebe1f8fa4e8ea3b1dc6b22f6b4cbaec7bd28d00de930d14ee60398c03cd3462f6e39ef1e03161ed956cc2e47fcb861215fee7bf716436487d6e31569fefd20177ebb74e6afa6704b7752bc8cb8fddb53bf3ae88b24e68d25552f3117582dd5969407cd088d4a96bbf3cd88a62e4de66b176f48a5a60ecb84fddb98fdf9e7138c5d9b2a0f30127d2bc26254c6d5d1a23882ffea7a350e0b1baf9d1b7c129e0856d108433235191020330d", 0xc4, 0x100, 0x9}, {&(0x7f0000000140)="1c11eb4256bbc0bbab7a77045f076a74e88cf35747ea106431755068d2ebeb91c6113cb74bf9b250ceb26f2c31fc8bcd43b2ec479d8133614de32acf19bc6e24bd76d9a719d62b5eb5a347cf056033100115d0ad5e1b5e9a1ba434123a0d9a4d0c7e17677aeed9e3f1424a18176d4892fd755d9da064ea452c00b22a9d773f081fc5f7169b7ae88d6019c577174812605f5e02a0d8f23da4131ff0d415ba740cb4f7e690558b91b40413359ea8ce1ff4a9317b27bf9d3b3b0468e79572cd0c121f574175534ae20bd39c868a1c8bb0ff446906736f76010df517f8b283cbaf8ec55b7ca98ba3e21204a4aa79488ec18309908ca858dc38587315fee82c6d44f316a56a7510d198cd0eb9834f4b1f965eea1d7693df9ecca1ac39091037523f6eb4513d9dc61f28d1adbe8c94fa9724764d8c8986cffc8ac8813a5d062fefc5416138dc667212eb04a62a522f7c995bd3b4817b54407de8d7fed9e0cd13900a82ef3e88333a7b7fb11335083dddb63052e64c3192d328505f41c00f0c2b57a5b02123bab083725fe729fe4025e661229c3e28aa94e9dcc2bd6c42e8e0f0c25e00bea27daf7c5487c490f517eb22a45e25e91f1add45203959712de34288d9a06ddaadc93c6393e46baa3d57059989ebe569eb8589710cab036bc2187ea160ef38d6277f6f716c96188cb08bdf622a3bfb0618180962897e36d23e8c369d2e1be6d939c2a40185b2ceec7be20675760300e6e32e10a45eb704e47d0228f559ea1b5bc5b5738cc7b158fe476419414ad06b3017a6047297c26053aca906c909a23f25eba806996e04e09a8a7e903c4800e6746fb217d946e34f650b0d20e6d28278e59fc4d1100139935276dd3fd57e04f30ee296d01d4be0b026639dda28c847f76423037c8b85781e11b0ec4008b724e8620d6b5732b6d3acca54cd5ae15486df1318d0c36b143b7761b412ed4124d25f168f50dbcbdbeea268c50852f8bcf26aa4008795cc1e032b9bbc45fbb0d06b9ee2374a69a04dd8116b5c68f47dd8920aab60022104599a0b1d31392fc7b4c14f97d8c85861af11aa377c84a199d636eff2eca86d94f43d824907dd3505bc23c518546082423dc1b737d31055d3828923582858825a866a8ba06b081fb4a6592e85613825ea8dd5a670f7f9e7e4f1d996c6acc031a755aac604fe25f2958b8cacd0b29300e2d1c677f59872aafe813c168bdee4c3e87113f209e95a583f7d306d965b32a46fdca3e5cd5b87159215ecb9454c7f5cf0451c8d6fb3f798724c3f9484eeaad378164efa586fb71c30cdf886213f74dd6a1eba7ad71d8449f33d283a618e6d114154ec3a504181267e4ca7c29d9fc28b574a8c02d87002e508290fd9b7d6925abd1c7e45ebabc8715256808cc29ce8cddc0034020fac814e569f75d03355f5ecfdc717064e06112af225b47ff2148844ace873a1a04f67a746f7fc1f0f0dc9ed8dce4daeb02d4a650fa62afd72e190c31526a96bf48ed9a9debe67f30fddb1ca8e058ad64db9eaa980a4de2f5604d0aa9281a66157fbd65c1220ecdfaedeb623ba268b7c049135c321b07265e59256958595a0b3f2d89ee721018122f9baee8822a075f86f0b124fb229998b324ccfbe6b2135a12c3174c85f63801dd0eb50f2f4b2a6703918bac1a1148c657f2cf443417cf6e885d700f46530b36df5d4564d234e6d2085e53d6b1b76b50dda26607d127ae73fb02e8056a5833fb5a4336fdfd637fbb365754b2aae4f2173fdba521ee0363a90f5d8ebd128773ee29a2df41b84b0acff57dd0663a3dd7f89e904196100393e78ba61f4524ec584ca0e43ef531f9b8bdc66a8a160643862a12097a2960b91f9e96bf628fb357b440c35bc4b3111ed3714c85d83568270c9135411ffb6242811a80786e9b15d41f475081f5d3259a32bdedddc9d70334910dfcb574b4a17f8a9d584e2c73b8044758ab9461498d2474cd786032d7269ab24d94a523c490f8d2c1664782bc6f50b581eed6b71b94c41c8a599261959ba38fa47ca911df8479f78ab6e5e0b4f4c2ec15c17132cd71508f4ec80f781fe75a1463f4cda973fbe37407709df3d7de94ce34c680dcacf5ab55fb49a3743136b923c850224905f24f3c46a675d0ebd77ede4a662a78dcb342e319300adf51c9f21fd60220e0b5e3a3e2a841ddc27faa0cb18e11856165ab5ed738fb93c88729ff587216ad0ce469eac9d634d688ea98a73121977b3f15fb289d6e59433677a51b50706a91d89273146f047c14aacdaf6f741fd684afdfd7d3b2f60ae18b1dbd612c0e68a9163091bcc45cb2d4583e3672f6920ed9544d91864a65902cf47d6e1aa41e86c4a0929be7bb3416660ac0b31d19e33b7fb1cca4e9a6379cf4e21ab6bd43baf22be15043af3a21fa16f832b79a717a82580b4d81ed31c7d3ca4212c00be93a6ee6da8b26cb5bbe7c41fdfa300f7c340f93b63bae03430af821b2ff0a782d8169837cc36f190578ce50e00a376ecaf0d7052178512ca63fd83211eb0d2035263d256eacf482b17b66a00a15a4c538ff334795b2faca85faf695b47437056d8f20778d428d59d2c23be3a932df6deab2c55d9afa57d996002d998933cf9ace70fd4cad2d296ed19cbbe800490f29098a2349e390dd7de464724c8ad4fb776812a0282abfe36bbb4eac2a26bffa05bddce2979e583a4a7a8ab74cfa6e71ccad089b78f2c506a124e114f2bca7c5125b776a4b77b1a17f6907b9ee9b62f7cfbe4f245b7b240f35f426a00b8ff7fec5f4a44ce7ff16ea866d180fb3edfb6748a87e30071caccd0c7a8a15f04dfa17076484dec02067bfab88c41eaf292494e25d10d93358473480c4b9528aee225fcffa0c58109f11878b935f0b2fe67bbdc7033799e8e4b5f258b76d15b8e706ade945f6a77ff2dffd73d1897adecff17fb9392dbcdccb81a67ec1f688fa7d8318f54a241ffd2482fde3551c75b014dfebf3363ad51e539d4984204c760e7560b2add5249b661960701c7801a79b39ca3b1eff0bab140fd734c026363234bc24e1ad057998118dd61eca94b6e264a150af5277c479ff8c08330410af6140279315b2ee4483da9efdeda40f8e245b6a61b32592c61942ddfac61073e52c54ac3ad27bdf94d3c43b42f7c22bff083b194d691ac45d4d532890c3bed32ffc67f2247e5ddaa7479444be3317720ab70a7dac04cb25eb597f62cc5f7adfaf2a197fdc31aed598909b000d20dab861be349594dfa37afc384970d2b0c1ad8d75f3629e162f41958f9536769324108b3767dba7129723a4ed81fb19ab59224ddb78d8f000fbed48c163186994f989ca284bf987fb3676a3a79cb0939bf35c136d55ca5c4ea6f41d400686b4b9ffb3f88e97e98290f7d41249fa131de33187deb1a1b0de8f640e224330d70a91babb1cdbf6b8f33a5f3c25f115641b2fe19cd09a9b9780be9a054d2204f9d3e1d9044e48ea83e73dd423eb8120f7b85cbf40cb6624a4798accbfc61ffcd3bb78aa74e621a73997b23a8e8fbcfe841eaeb310c8292eeb134316e7b6f4dbab52eb3e498a6ce6d663e11b6676203a595b5f67f896fd63a242ce60329026c131143bb882998dc58c67abfffdf9e40bbf1f4324f1687d4e3c945ac447b7d437506b591dd9bd4153fec9e6be9d819cac41f3730dbe268b7551f2be772bf2751de9bab5241d40fcf49d6de25e0cc67c29aa4cea69b2dc45066e5947f542dec446ae481f2f52674353d1781341ee8df634bc890d615cd9b165ae976bd6ee7b824cda1081c4bb02bd71a32087c891cb0f0ec28d7963a144174979c1e874835c23159851fe74fe0290bf6b8383f4d4ea5b85a2436802158a4cce5b36950308bf51aa8167c4d4c0e866afeeef8879c86ada1fc4088b9ee0b71aedcc2b44b7b416914ac4a2e94369f33cca7f9a65baeb51b670e3de56fbedaada8489ec16df6fea40bf3846ff6ee61cf267c5657861264bd304cbf724af9daefe3a006ee37b84c1ce1f5ea6d16f240993968b95af2f21851afcc8241a3c4dc62533786d17b155e515e16a851af5086520f92156bdd4527571e7da392594d3476a7cd0df0cb7e6ad517c36db17a2cb6110ea9b4dfcb2e18b1845296f09ccacc85aa5f1e79764e77e233cab5fbd1dfc84319d1cb12e8f8bdbfd7d567569b402867b8671b41c7501632e17786777033dc98010d175085f283ae8e3b924555a986b685b0bba3a780224f0e23a5c331bfa94123640fc2e691552b964c874995ca3829a177e7e4396ac0baba11a65c336bbbcadc3d0f67a70eda53bf555f4847624048ed45b3e347af80d66a044c5b76b4a26955e7bb7c04acaf11b38778506303a5c4196d1402228273638b6c034a1a995cf4627d1b2a9620b41c0523dfd59f2374d288ea9ceac96d61660b65fa36253c6aabcfba769888e27761f7f3cc9ed038c05d8d34befc6f0648946a2fc05f1b82e510ce6d47ccf0ab1daa9108b79f0190b38af4d7ee602347ac5b278a0828ce379ee2c596fd89634e6741a65302e5d6b4487f9938fcb385a8200e9d7381ba976f4ff8b18e45402293b8d9cd86462c129df82dffe6a196a4b2dfc71973bc843b7b1dbcf39c32f0c19060859bd6b47cd9ff5bc09c0cdbcc31ce4a79f93754a49545f61043d380646e551bb1a7e2e93c9648ad3062795c97b0ddd10cad45754698288b4b3fa57df230965538308e3acc7dce596f4e09510cac90a1cabaca04c59c71890fc307669c9fa92f1460ccf4bd38250b0bd1243167a5d88ac9c84f51740c3f57407a8191f8987e89c874494a6af400e913f46d7ce48e868683557c62c28d3207e7d9e48b440ed3c478e02aa20b58f571c8b1d45c7e853cc7fea07b76ce924129ecf2ad32e1523c985c28aaccabecab9af21a4b68789ec1a0c6574fa4b1365d075811afa4daf9ac003e8b4005da07cce5f6c5be7f10bf8c69d09c3a37c058c9ae07d6b3c56dc5bc64631aaf64584f0701c81b1116a83e3872935050d1865ca1437491681fc4c5ef8d224f608defe4bdadae775f1548b58488fd292d5a597073e1ae3d79c9e189338b6047408acaef1fde10fcfb48257252e6635cd6526c8c27107cd35ecc379e01bb381642139990d59a2a87aaeca0076063ea2606282828f3efe849e18cd976802b4a1e279899d64c8744862e64d9a81855f3cdc1a5c01f97693ffbb0ea80913d973a0acdccc6c632f62155eee7adc7813750e5e375bca4b5ead346ccfef29f3a58cd217f5115f20614b1d78e97fb4eb3a3a4c123e0f2e7575669ac91e3f05b162398b923ed75eaf7ba958cd0ab13e141406b6e4c9f205deddcb4640c8b6fbbdc37fad953da39510c53a3dec514e9b571188cee22d83290eeeac65e189a7af7a67a19e75236a83aa521dcad8e1ba46ce5fd2b95d11b255e34b65e3dbd9f37db6d5e55836f596df768a0e094df0f6d9468fba5d304c5c6450ddbd1ad2feb0ab5d3d8813911532b6ce7e7ac88af2afe05e87bb46f6ae6a8df86e5defe080f5af623110acd0f43bf70d5235161a5783cb6478cd88f946e30c16297c7ea0320956ffd518582088e228f7806b8494cbc9610320751040e9369375042b928bc8b8657f796971cd9a1aee1afc1bcf87734a4ca2903211c73f45d5449478e3368872f7ad77c18ee0c8ed5f2d16b4bd728767277e29978141ce67ba7f2df93791715b9e7a5ba21961157f816ceb68d89c08b10ac83dad7764f226d7a7bf9465010a667264ecd4136bacec5dd2be00411c791393b976cd2688c046d0542fd338b516814506d2488", 0x1000, 0x4, 0x5e1}, {&(0x7f0000001140)="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", 0x1000, 0x6, 0x5}, {&(0x7f0000002140)="c10aca3e5c3490ce0df582ac032d3861348023f10e02fc5ed3aa141a9e05d4e5b11cbb57cb7721d13a5a41fe56678e2ae26fdcac0260ea8b274bdec7a874c3872a76b088c15b3d31a26681d6e7116610249d", 0x52, 0x3, 0x5}, {&(0x7f00000021c0)="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", 0x1000, 0x9, 0x10001}, {&(0x7f00000031c0)="8ee4bfffdc141ad6a72a269e11ce548dfa4425585ebae2e0f5b369378538c9a96219752c84ddde8423353626aa9461009fd62da986279375fbbde8bd17ef5d0df909fd8ebfef9dd51fba211392f4f59d1984c2914c5e15daa6d7ad374d1e0dc9ecca1502657ca305444606db1af1a4f9aaa93b", 0x73, 0x148, 0x5}], 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000003440)={0x1f, 0x4, 0x2000}, 0x4) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x41, 0x0) 10:09:23 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x202601c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000029e, 0x7ffffffff000) 10:09:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x601}, 0x33fe0}}, 0x0) 10:09:23 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000040)) 10:09:23 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc001152000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x0) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000040)=0x2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x601}, 0x33fe0}}, 0x0) 10:09:23 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0x7ff, 0x800, 0x3ff, 0xffff, 0x100000000}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000280)={r1, 0xaf, "50baa74dbe043e81b8a2412bea20e48885fc35c1e1238089c7526c0e10c0d5e98b9670276b58c5e301c7069f41accdc3a094fe1adf99f0b1671bdfc34e6eb3a78be3eb7d4a392539a658ec065680fcb1423fbc9123b03d12ca15b5e918533ad93a95ce392d2c6cf57135c92c2c7923dbd3b241f3cbc4799ad89aaa068fdc763ef03e51787b808bc2092ea0fbeac552f33ac01bdcd980f673f8b0b61c1c8a0658437bcf36c27a5eeab1bbd8f7269a11"}, &(0x7f0000000340)=0xb7) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000008c, 0x7ffffffff000) 10:09:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:23 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0d11c20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001a4, 0x7ffffffff000) 10:09:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x81, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, 0x0, 0x601}, 0x33fe0}}, 0x0) 10:09:23 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000040)={0x8, 0x1}) 10:09:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) 10:09:23 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0911920, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2}, 0x33fe0}}, 0x0) 10:09:23 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x1010c2, 0x0) 10:09:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000100)={0xd, 0x2b, 0x10, 0xf, 0x7, 0x4, 0x2, 0x73}) r1 = socket$alg(0x26, 0x5, 0x0) ustat(0x7, &(0x7f0000000000)) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:23 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2004b1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000074, 0x7ffffffff000) 10:09:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) 10:09:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2}, 0x33fe0}}, 0x0) 10:09:23 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000080)=0xffffffffffffffff, 0x4) kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:23 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2000a1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000cf, 0x7ffffffff000) 10:09:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000200)={r1, @in={{0x2, 0x4e24}}, [0x0, 0x5, 0x16536221, 0x1, 0x20, 0x5, 0xb496, 0x20, 0xb35, 0xaa, 0x9, 0x7, 0x4, 0xfffffffffffffffe, 0x4]}, &(0x7f0000000100)=0x100) r2 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000001, r2) fanotify_init(0x0, 0x2) 10:09:24 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x6, 0x400202) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000080)=""/191) 10:09:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2}, 0x33fe0}}, 0x0) 10:09:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) 10:09:24 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2015c1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001c3, 0x7ffffffff000) 10:09:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x200000, 0x80) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a80)=0x14, 0x80800) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000ac0)={'team0\x00', 0x0}) getsockname(0xffffffffffffff9c, &(0x7f0000000b00)=@hci={0x1f, 0x0}, &(0x7f0000000b80)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000c80)={{{@in=@broadcast, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000d80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000ec0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000f00)={{{@in6=@ipv4={[], [], @dev}, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000001000)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001080)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001100)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000001140)={0x11, 0x0, 0x0}, &(0x7f0000001180)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f00000011c0)={@ipv4={[], [], @loopback}, 0x0}, &(0x7f0000001200)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001280)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000012c0)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001300)={{{@in6, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001400)=0xe8) r16 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0xb, 0x82000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x14) sched_setattr(0x0, &(0x7f0000000100)={0x0, 0x6}, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r16, &(0x7f00000001c0), &(0x7f00000000c0)}, 0x20) r17 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r17, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r16, &(0x7f0000000100), &(0x7f00000000c0)}, 0x20) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001880)={&(0x7f0000000300), 0xc, &(0x7f0000001840)={&(0x7f00000018c0)=ANY=[@ANYBLOB="f8030000", @ANYRES16=r1, @ANYBLOB="00042dbd7000fcdbdf250300000008000100", @ANYRES32=r2, @ANYBLOB="3c0102003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r3, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400ff03000008000600", @ANYRES32=r4, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e67000000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000400000008000100", @ANYRES32=r5, @ANYBLOB="f0000200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004003a00000008000600", @ANYRES32=r6, @ANYBLOB="38000100240001006063746964e708aa7665706f72740000000200000000000000000000006a0000080003000300000008000400000000000000000000000000", @ANYRES32=r7, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400ff0300003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="400002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r10, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="0c0102003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r12, @ANYBLOB="54000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002400040008003f00fc9d00002000f707070000008701040000000000000004090200000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000800000008000600", @ANYRES32=r13, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004004000000008000100", @ANYRES32=r14, @ANYBLOB="4400020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e6700000000000008000300030000000800040079018e28141901508b4d0847d967688230a59bcc140e0d6180ca846a1532358de311e77f171074911c56", @ANYRES32=r15, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x3f8}, 0x1, 0x0, 0x0, 0x40000}, 0x85) r18 = socket$alg(0x26, 0x5, 0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x2, 0x4, 0x6, 0x2}, 0x1}, 0x20, 0x1, 0x0) r19 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x6, 0x1, 0x34b154c5}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r19, 0x84, 0x7c, &(0x7f0000000240)={r20, 0x5, 0x31}, &(0x7f0000000280)=0x8) bind$alg(r18, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) 10:09:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5", 0x8) 10:09:24 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000180)="d8cc34e3b63ccceb597783d7a138b3439e49405ec661bda3bb427c5d631652c0f85c094cb5d230de39b53c7781fb537dd56efca6f006479f7ae874d1466ccc157b23d2c8622ddfb7cbf053b76ddd4a2af5146b1e920d1826f8c3470e06edf9757de85add215175420cdbb0331ef83ce80ef694fcd0d98c3fe1188af4e72cc6fdc4573c0d868add", 0x87}, {&(0x7f0000000240)="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", 0xff}], 0x2, &(0x7f0000000380)=[@assoc={0x18, 0x117, 0x4, 0x4}], 0x18, 0x4884}, 0x40) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000040)) 10:09:24 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2000a1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:24 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc081082000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) 10:09:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000013d, 0x7ffffffff000) 10:09:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x201f93038cd950b7) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:24 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x40, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)) 10:09:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) 10:09:24 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc011032000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:24 executing program 2: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) prctl$setname(0xf, &(0x7f0000000100)='eth0-#,-}]') bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-avx\x00'}, 0x58) 10:09:24 executing program 5: kexec_load(0x3, 0x0, &(0x7f0000000000), 0x80000) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x8040, 0x0) 10:09:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) 10:09:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000007c, 0x7ffffffff000) 10:09:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) 10:09:24 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0213820, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:24 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x40, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x5, 0x800) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) seccomp(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x7, 0x0, 0x101, 0x8001}, {0x6, 0x3, 0x9, 0x9}]}) 10:09:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) 10:09:24 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x41, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000040)=""/45) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:24 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x200461c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000197, 0x7ffffffff000) 10:09:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) [ 994.905770] audit: type=1326 audit(1537870164.970:11): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10958 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3da code=0x0 10:09:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) 10:09:25 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc061232000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:25 executing program 4 (fault-call:5 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000139, 0x7ffffffff000) 10:09:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) [ 995.191396] FAULT_INJECTION: forcing a failure. [ 995.191396] name failslab, interval 1, probability 0, space 0, times 0 [ 995.212567] CPU: 1 PID: 10992 Comm: syz-executor4 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 995.221092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.230456] Call Trace: [ 995.233075] dump_stack+0x1d3/0x2c4 [ 995.236727] ? dump_stack_print_info.cold.2+0x52/0x52 [ 995.241953] ? mark_held_locks+0x130/0x130 [ 995.246208] should_fail.cold.4+0xa/0x17 [ 995.250290] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 995.255959] ? graph_lock+0x170/0x170 [ 995.259779] ? mark_held_locks+0x130/0x130 [ 995.264032] ? mark_held_locks+0x130/0x130 [ 995.268277] ? print_usage_bug+0xc0/0xc0 [ 995.272366] ? rcu_read_lock_sched_held+0x108/0x120 [ 995.277405] ? find_held_lock+0x36/0x1c0 [ 995.281503] ? ttwu_stat+0x5c0/0x5c0 [ 995.285233] ? find_held_lock+0x36/0x1c0 [ 995.289325] __should_failslab+0x124/0x180 [ 995.293578] should_failslab+0x9/0x14 [ 995.297406] kmem_cache_alloc_node+0x26e/0x730 [ 995.302003] ? lock_release+0x970/0x970 [ 995.305993] ? ttwu_stat+0x5c0/0x5c0 [ 995.309723] __alloc_skb+0x114/0x770 [ 995.309745] ? skb_scrub_packet+0x490/0x490 [ 995.309760] ? ttwu_stat+0x5c0/0x5c0 [ 995.309781] ? apparmor_cred_transfer+0x590/0x590 [ 995.326361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.331920] ? cap_capable+0x1f9/0x260 [ 995.335835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.341383] ? security_capable+0x99/0xc0 [ 995.345550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.351108] ? ns_capable_common+0x13f/0x170 [ 995.355606] netlink_sendmsg+0xb29/0xfc0 [ 995.359688] ? netlink_unicast+0x760/0x760 [ 995.363939] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 995.368886] ? apparmor_socket_sendmsg+0x29/0x30 [ 995.373665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.379220] ? security_socket_sendmsg+0x94/0xc0 [ 995.383990] ? netlink_unicast+0x760/0x760 [ 995.388325] sock_sendmsg+0xd5/0x120 [ 995.392053] ___sys_sendmsg+0x7fd/0x930 [ 995.396038] ? find_held_lock+0x36/0x1c0 [ 995.400115] ? copy_msghdr_from_user+0x580/0x580 [ 995.404895] ? lock_downgrade+0x900/0x900 [ 995.409068] ? proc_fail_nth_write+0x9e/0x210 [ 995.413591] ? __fget_light+0x2e9/0x430 [ 995.417665] ? fget_raw+0x20/0x20 [ 995.421135] ? kasan_check_write+0x14/0x20 [ 995.425393] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 995.430342] ? wait_for_completion+0x8a0/0x8a0 [ 995.434956] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 995.440507] ? sockfd_lookup_light+0xc5/0x160 [ 995.445015] __sys_sendmsg+0x11d/0x280 [ 995.448920] ? __ia32_sys_shutdown+0x80/0x80 [ 995.453690] ? __sb_end_write+0xd9/0x110 [ 995.457772] ? fput+0x130/0x1a0 [ 995.461072] ? do_syscall_64+0x9a/0x820 [ 995.465059] ? do_syscall_64+0x9a/0x820 [ 995.469054] ? trace_hardirqs_off_caller+0x300/0x300 [ 995.469077] __x64_sys_sendmsg+0x78/0xb0 [ 995.469096] do_syscall_64+0x1b9/0x820 [ 995.469117] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 995.487539] ? syscall_return_slowpath+0x5e0/0x5e0 [ 995.492484] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 995.497347] ? trace_hardirqs_off+0x310/0x310 [ 995.501859] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 995.506896] ? prepare_exit_to_usermode+0x291/0x3b0 [ 995.511951] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 995.516818] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 995.522018] RIP: 0033:0x457579 [ 995.525217] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 995.544112] RSP: 002b:00007f42d53adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 995.551838] RAX: ffffffffffffffda RBX: 00007f42d53adc90 RCX: 0000000000457579 [ 995.559110] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 995.566380] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 995.573660] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f42d53ae6d4 [ 995.580936] R13: 00000000004c34ce R14: 00000000004d5240 R15: 0000000000000005 10:09:25 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x100, 0x0) 10:09:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x1) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) 10:09:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001b9, 0x7ffffffff000) 10:09:25 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0f12f20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:25 executing program 4 (fault-call:5 fault-nth:1): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 995.612045] audit: type=1326 audit(1537870165.680:12): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10958 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45a3da code=0x0 [ 995.710502] FAULT_INJECTION: forcing a failure. [ 995.710502] name failslab, interval 1, probability 0, space 0, times 0 [ 995.738600] CPU: 1 PID: 11018 Comm: syz-executor4 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 995.747132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.756506] Call Trace: [ 995.759112] dump_stack+0x1d3/0x2c4 [ 995.762773] ? dump_stack_print_info.cold.2+0x52/0x52 [ 995.767992] should_fail.cold.4+0xa/0x17 [ 995.772070] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 995.777195] ? __save_stack_trace+0x8d/0xf0 [ 995.781536] ? graph_lock+0x170/0x170 [ 995.785353] ? save_stack+0xa9/0xd0 [ 995.788993] ? save_stack+0x43/0xd0 [ 995.792634] ? kasan_kmalloc+0xc7/0xe0 [ 995.796543] ? find_held_lock+0x36/0x1c0 [ 995.800637] ? ttwu_stat+0x5c0/0x5c0 [ 995.804375] ? check_preemption_disabled+0x48/0x200 [ 995.809412] __should_failslab+0x124/0x180 [ 995.813661] should_failslab+0x9/0x14 [ 995.817477] kmem_cache_alloc_node_trace+0x270/0x740 [ 995.822607] __kmalloc_node_track_caller+0x33/0x70 [ 995.827555] __kmalloc_reserve.isra.39+0x41/0xe0 [ 995.832328] __alloc_skb+0x150/0x770 [ 995.836062] ? skb_scrub_packet+0x490/0x490 [ 995.840401] ? ttwu_stat+0x5c0/0x5c0 [ 995.844132] ? apparmor_cred_transfer+0x590/0x590 [ 995.849001] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.854556] ? cap_capable+0x1f9/0x260 [ 995.858466] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.864021] ? security_capable+0x99/0xc0 [ 995.868199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.873755] ? ns_capable_common+0x13f/0x170 [ 995.878188] netlink_sendmsg+0xb29/0xfc0 [ 995.882268] ? netlink_unicast+0x760/0x760 [ 995.886545] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 995.891488] ? apparmor_socket_sendmsg+0x29/0x30 [ 995.896266] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.901821] ? security_socket_sendmsg+0x94/0xc0 [ 995.906591] ? netlink_unicast+0x760/0x760 [ 995.910845] sock_sendmsg+0xd5/0x120 [ 995.914573] ___sys_sendmsg+0x7fd/0x930 [ 995.918567] ? find_held_lock+0x36/0x1c0 [ 995.922646] ? copy_msghdr_from_user+0x580/0x580 [ 995.927421] ? lock_downgrade+0x900/0x900 [ 995.931590] ? proc_fail_nth_write+0x9e/0x210 [ 995.936100] ? __fget_light+0x2e9/0x430 [ 995.940084] ? fget_raw+0x20/0x20 [ 995.943576] ? kasan_check_write+0x14/0x20 [ 995.947839] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 995.952800] ? wait_for_completion+0x8a0/0x8a0 [ 995.957451] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 995.963066] ? sockfd_lookup_light+0xc5/0x160 [ 995.967579] __sys_sendmsg+0x11d/0x280 [ 995.971482] ? __ia32_sys_shutdown+0x80/0x80 [ 995.975904] ? __sb_end_write+0xd9/0x110 [ 995.979993] ? fput+0x130/0x1a0 [ 995.983288] ? do_syscall_64+0x9a/0x820 [ 995.987277] ? do_syscall_64+0x9a/0x820 [ 995.991274] ? trace_hardirqs_off_caller+0x300/0x300 [ 995.996486] __x64_sys_sendmsg+0x78/0xb0 [ 996.000561] do_syscall_64+0x1b9/0x820 [ 996.004489] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 996.009887] ? syscall_return_slowpath+0x5e0/0x5e0 [ 996.014846] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 996.019719] ? trace_hardirqs_off+0x310/0x310 [ 996.024234] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 996.029269] ? prepare_exit_to_usermode+0x291/0x3b0 [ 996.034311] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 996.039202] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 996.044399] RIP: 0033:0x457579 10:09:25 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0013820, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x1f}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x2, 0x3, 0x8000, 0xc952, 0x1, 0x7fffffff, 0x5, 0x100000001, r2}, 0x20) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000200)=0x3, 0x8) 10:09:25 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc021032000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:26 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4800) mq_timedreceive(r0, &(0x7f00000001c0)=""/159, 0x9f, 0x3f, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0xffffffffffffffb5, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1ff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:26 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc021322000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:26 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) r1 = socket(0xd, 0xa, 0xfffffffffffffffa) socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0xfffffffffffffdb7) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x5}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000240)={r3, 0x4, 0xa3, "adae12d169fd91f78304185c256dfee22d81c30957958972e34a5fab886db390314c1b9dda6f9c093b07b72256013ada827b73caf21a847cfe397e7d107cc1b55dc5e857c4d892eca9fa49fd9ea1ea3a3316f142c359d5a3b4c0b067e2c49b0270c58c92139e4bca8667ef3289b8423d08b0e6abc974ea4d3e56282a86be4ea5009c26d207e9a92225c8cc982abb85e28a0c8c1089dd59cafa07079f0f794db74bc5e3"}, 0xab) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000000100)={0x54, ""/84}) [ 996.047603] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 996.066536] RSP: 002b:00007f42d53adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 996.074305] RAX: ffffffffffffffda RBX: 00007f42d53adc90 RCX: 0000000000457579 [ 996.081587] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 996.088865] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 996.096141] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f42d53ae6d4 [ 996.103430] R13: 00000000004c34ce R14: 00000000004d5240 R15: 0000000000000005 10:09:26 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, 0x3, {0x7, 0x1b, 0x7, 0x8024, 0x1c14, 0x5, 0x5, 0xffffffffffffffa5}}, 0x50) 10:09:26 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0f1082000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)='\n\a', 0x2) 10:09:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000249, 0x7ffffffff000) 10:09:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x6, 0x4002) write$FUSE_DIRENT(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xa0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:26 executing program 4 (fault-call:5 fault-nth:2): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:26 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0a1132000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)='\n\a', 0x2) 10:09:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40040, 0x0) accept$unix(r1, &(0x7f0000000040)=@abs, &(0x7f0000000200)=0x6e) accept$alg(r0, 0x0, 0x0) 10:09:26 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x4, 0x0, 0x6, 0x4052}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={r1, 0x8}, 0x8) [ 996.353631] FAULT_INJECTION: forcing a failure. [ 996.353631] name failslab, interval 1, probability 0, space 0, times 0 [ 996.447511] CPU: 1 PID: 11065 Comm: syz-executor4 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 996.456062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.465426] Call Trace: [ 996.468047] dump_stack+0x1d3/0x2c4 [ 996.471696] ? dump_stack_print_info.cold.2+0x52/0x52 [ 996.476905] ? graph_lock+0x170/0x170 [ 996.480736] should_fail.cold.4+0xa/0x17 [ 996.484808] ? find_held_lock+0x36/0x1c0 [ 996.488894] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 996.494025] ? graph_lock+0x170/0x170 [ 996.497843] ? lock_acquire+0x1ed/0x520 [ 996.501837] ? graph_lock+0x170/0x170 [ 996.505656] ? find_held_lock+0x36/0x1c0 [ 996.509736] ? find_held_lock+0x36/0x1c0 [ 996.513819] ? __lock_is_held+0xb5/0x140 [ 996.517920] ? ttwu_stat+0x5c0/0x5c0 [ 996.521658] ? find_held_lock+0x36/0x1c0 [ 996.525742] __should_failslab+0x124/0x180 [ 996.529994] should_failslab+0x9/0x14 [ 996.533810] kmem_cache_alloc_node+0x26e/0x730 [ 996.538413] __alloc_skb+0x114/0x770 [ 996.542187] ? skb_scrub_packet+0x490/0x490 [ 996.546534] ? kasan_check_write+0x14/0x20 [ 996.550780] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 996.555717] ? genl_unregister_family+0x8a0/0x8a0 [ 996.560579] ? wait_for_completion+0x8a0/0x8a0 [ 996.565232] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 996.570200] ? kasan_check_read+0x11/0x20 [ 996.574359] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 996.579650] ? rcu_softirq_qs+0x20/0x20 [ 996.583641] netlink_ack+0x2c5/0xb80 [ 996.587373] ? netlink_sendmsg+0xfc0/0xfc0 [ 996.591622] ? mutex_unlock+0xd/0x10 [ 996.595341] ? genl_rcv_msg+0x102/0x168 [ 996.599323] netlink_rcv_skb+0x35d/0x440 [ 996.599348] ? genl_family_rcv_msg+0x1140/0x1140 [ 996.599362] ? netlink_ack+0xb80/0xb80 [ 996.599375] ? down_read+0x8d/0x120 [ 996.599401] genl_rcv+0x28/0x40 [ 996.615716] netlink_unicast+0x5a5/0x760 [ 996.623071] ? netlink_attachskb+0x9a0/0x9a0 [ 996.623112] netlink_sendmsg+0xa18/0xfc0 [ 996.631603] ? netlink_unicast+0x760/0x760 [ 996.631619] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 996.631638] ? apparmor_socket_sendmsg+0x29/0x30 [ 996.640788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 996.640806] ? security_socket_sendmsg+0x94/0xc0 [ 996.640820] ? netlink_unicast+0x760/0x760 [ 996.640838] sock_sendmsg+0xd5/0x120 [ 996.640856] ___sys_sendmsg+0x7fd/0x930 [ 996.640876] ? find_held_lock+0x36/0x1c0 [ 996.651172] ? copy_msghdr_from_user+0x580/0x580 [ 996.651201] ? lock_downgrade+0x900/0x900 [ 996.667860] ? proc_fail_nth_write+0x9e/0x210 [ 996.667880] ? __fget_light+0x2e9/0x430 [ 996.667895] ? fget_raw+0x20/0x20 [ 996.667923] ? kasan_check_write+0x14/0x20 10:09:26 executing program 5: kexec_load(0x0, 0x8, &(0x7f0000001480)=[{&(0x7f0000000080)="58ceea1a4f9e9572ff17bc1615db94b2401967909e5d7a40744ea5a72686fa90e0775f31636bfa33d6b79b523f3b1377508c0d8568ccf1fb2255c2773e8baa58c88c9c7f1cffb8b7d7f5ea5c154d81646f5d0fb1", 0x54, 0x0, 0x3ff}, {&(0x7f0000000100)="07b898302b006fa3a1978c76a82fe3bb0a595957e4f7601181fd4350e4633e4036b30a3808c759291bb6bd6f3ae8b1b9402de8ebfee409ac3c4dbc38d55a7d3144eb17f988773254aac14d099445265ede2bba1b7a2af6cd75dc2d6a3e7d66709c9ffe4ffa1e085f6f19856abf33ee646dcc1bde2b6d376e80778762a509f064ceadfed2f51058a6a867482d233bd0348c7620dd30ca7668a2d09a1f7a322ed7eb672dbb50fa3dc30f", 0xfffffe42, 0x0, 0x8}, {&(0x7f0000001580)="d3e81f5d69678da254b52d10caa070a192471e237533e8ca6d4f6e320669f8f17890864daf3aa911b2f08b1b0495108aef6879f9cc6d687851e0fca03a1c66a657", 0xffffffffffffff85, 0x1, 0x1}, {&(0x7f0000000240)="745201133156b622be1f156297f33da9ec9e9fbd0bc6de340f98af84cd37dc289a15dfa7c0d002f90034a65234eadb915fa083d0fecd169a73a7555310f3e6762245e530", 0x44, 0x2, 0x7}, {&(0x7f00000002c0)="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", 0xff4, 0xeb, 0x1}, {&(0x7f00000012c0)="c060e873e9edbc9276253270e8e79884eed7cae8f341d3ea4b87a2395b731d09c92f1ee89b3aa36d33ca65d68188ffe861181708b1da512cd6049940053eac8d080a9a46bfb215ba1186b8fc479165fc7aa5f7ac5477611313f66d432d514adbfe12db5a1cdc6aabecca53f92c0847e310bcf825618b28eb0a99031c9c4baa029681e2e5d427a84134306c21f3d9a4fab06b7cd8c428b4f6cf5a729d09287478b3026ec74056803800d8c4a3ecbdacbbda74561751535f4c59", 0xb9, 0x8593, 0x10001}, {&(0x7f0000001380)="2b5705ba82c157149b5e675d168bd724d35243d0e892785dfa1d63b9b5faff637e1554e3c69deb5db5fd1fdc68a29b4b945fa7f8b40ed39031c7d63cec0ea65d8792d4080a63c9473a766aaee32445a8123ab02b3f4134cbfa69613f8b276ccc2c1ee6a7456ad659737d305662f5282bb8ed8c2e6db9c6fc32dc25b5923fe58f6f827ed2a03284694589e4ab631039bca4c3ad13e60a9e08a0d527d8291428539e1bad84c89669f6bc5461ea1471d2d89cbe6587644db0e28f970f", 0xbb, 0xd83d, 0x1}, {&(0x7f0000001440)="33e24c4f62096216ff8db28d89018184ef50f5698c3d", 0x2b, 0x7, 0xd2}], 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000040)) openat$nullb(0xffffffffffffff9c, &(0x7f0000001600)='/dev/nullb0\x00', 0x1c1500, 0x0) 10:09:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)='\n\a', 0x2) 10:09:26 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc011262000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b00000000093b60ced5c54dbb7", 0x10) 10:09:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000003c, 0x7ffffffff000) [ 996.676718] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 996.676737] ? wait_for_completion+0x8a0/0x8a0 [ 996.676766] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 996.712066] ? sockfd_lookup_light+0xc5/0x160 [ 996.716585] __sys_sendmsg+0x11d/0x280 [ 996.720492] ? __ia32_sys_shutdown+0x80/0x80 [ 996.724937] ? __sb_end_write+0xd9/0x110 [ 996.729017] ? fput+0x130/0x1a0 [ 996.732306] ? do_syscall_64+0x9a/0x820 [ 996.736292] ? do_syscall_64+0x9a/0x820 [ 996.740287] ? trace_hardirqs_off_caller+0x300/0x300 [ 996.745411] __x64_sys_sendmsg+0x78/0xb0 [ 996.749487] do_syscall_64+0x1b9/0x820 [ 996.753388] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 996.758766] ? syscall_return_slowpath+0x5e0/0x5e0 [ 996.763713] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 996.768574] ? trace_hardirqs_off+0x310/0x310 [ 996.773085] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 996.778134] ? prepare_exit_to_usermode+0x291/0x3b0 [ 996.783193] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 996.788078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 996.793276] RIP: 0033:0x457579 [ 996.796498] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 996.815408] RSP: 002b:00007f42d53adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 996.823133] RAX: ffffffffffffffda RBX: 00007f42d53adc90 RCX: 0000000000457579 [ 996.830419] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 996.837699] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 10:09:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8001, 0x1) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000100)=0x4) open_by_handle_at(r0, &(0x7f0000000200)={0x54, 0x100000000, "0276d69bbf87c2ff0a71cb2bd6b87a703bc3d246015cc1e888931ee97ffddbe84eadd77a3a26c75eb2eb5b6f5e11e141bba7dcc5bc16aded27f581d750ac1efb069b99f2b69ce837d1f3d4e7"}, 0x20000) 10:09:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000023e, 0x7ffffffff000) [ 996.844974] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f42d53ae6d4 [ 996.852247] R13: 00000000004c34ce R14: 00000000004d5240 R15: 0000000000000005 10:09:27 executing program 4 (fault-call:5 fault-nth:3): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:27 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0b10f2000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:27 executing program 5: openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x80, 0x0) 10:09:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)='\n\au', 0x3) 10:09:27 executing program 5: openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x4000, 0x8) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000001400)=[{&(0x7f0000000140)="c688df588f0557473c37ae1d46646fc666c7eb41726101ff958900eb2e2ae792a798056cc8499d5dd51b05a9a764892d3380aed6fb5064085ffa819765361df1db2ddfc1ad5cf00c2c2197e817ca844b8c4e3881a01546cfe75674268966a70100c7fc552ff7f1755f38bdc70884b61848a196c5dcabeb195f24d6ded644b571dc3117e9992a03bb5df708c9489bcb39a2ae", 0x92, 0x7}, {&(0x7f0000000200)="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", 0x1000, 0x10000}, {&(0x7f0000001200)="070c98cb278958618e102277a319133b03fae49938deba5c93576ed7db6ca071cabdaa9ba6aa7418a0cf5aa7efaff746b149f9dd45f6692551e5a95ac4b37b71050b99377151", 0x46, 0x6}, {&(0x7f0000001280)="ff09f331c53ccfb3e032073e66543149eceeb6731499a2f9ca8d7287bdfd1a9391847e198ddb7f1e0f7a98844ddf0c00e8eff9963070d5a327efa541d75843", 0x3f, 0x100000001}, {&(0x7f00000012c0)="aabe09c110d7a4e1d12e02984a63feb69755738e1dae72f0e464c44c0ab4e73d42c0bc1ca13ba996e43212c127b861c78ad591", 0x33, 0x401}, {&(0x7f0000001300)="e2f2efb19be6a0fe6dc6919190ea055728cbbdfd8ddfbdb38b831b3382d1405db450778a4b8fb5c92696fb3eea691a27284d58e67e6a299fd68c6e563dca24f9fe674de0f64103215f2662d4da2888367c9ebfab7b17078ea306b575bec5b2144f67e1ea4b1d7fec10133aed452d4889a0aeea440ce9e366f9", 0x79, 0xabe}, {&(0x7f0000001380)="98c94681ef4e85f08cea5d3c6eab6d839193b102909cbf1c7dd51fb6b63a6cd7de6b4a06b9d15340563559b882a03bafbf3a04705cd1ab6590e9a81ac3bb8a928484e04d685ba5c80b2e9a3e101fc2eed1d908de98dcadb1a58ada06f4c74d", 0x5f, 0x5d3}], 0x0, &(0x7f00000014c0)='\x00') kexec_load(0x0, 0x0, &(0x7f0000000040), 0x1) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000001500)={0x20}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000000)={0x0, 0xffffffff}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000100)={r1, 0x8, 0x10, 0x300, 0x8000}, &(0x7f0000000140)=0x18) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000200)=@assoc_id=r2, &(0x7f0000000240)=0x4) [ 997.118168] FAULT_INJECTION: forcing a failure. [ 997.118168] name failslab, interval 1, probability 0, space 0, times 0 [ 997.142854] CPU: 1 PID: 11125 Comm: syz-executor4 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 997.151395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.160754] Call Trace: [ 997.163360] dump_stack+0x1d3/0x2c4 10:09:27 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0e13520, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000026b, 0x7ffffffff000) 10:09:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)='\n\au', 0x3) [ 997.167019] ? dump_stack_print_info.cold.2+0x52/0x52 [ 997.172234] should_fail.cold.4+0xa/0x17 [ 997.176322] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 997.181444] ? __save_stack_trace+0x8d/0xf0 [ 997.185779] ? graph_lock+0x170/0x170 [ 997.189593] ? graph_lock+0x170/0x170 [ 997.193408] ? save_stack+0xa9/0xd0 [ 997.197064] ? save_stack+0x43/0xd0 [ 997.200703] ? kasan_kmalloc+0xc7/0xe0 [ 997.204613] ? find_held_lock+0x36/0x1c0 [ 997.208693] ? __lock_is_held+0xb5/0x140 [ 997.212779] ? graph_lock+0x170/0x170 [ 997.216595] ? ttwu_stat+0x5c0/0x5c0 [ 997.220328] ? check_preemption_disabled+0x48/0x200 [ 997.225374] __should_failslab+0x124/0x180 [ 997.229631] should_failslab+0x9/0x14 [ 997.233447] kmem_cache_alloc_node_trace+0x270/0x740 [ 997.238579] __kmalloc_node_track_caller+0x33/0x70 [ 997.243530] __kmalloc_reserve.isra.39+0x41/0xe0 [ 997.248314] __alloc_skb+0x150/0x770 [ 997.252046] ? skb_scrub_packet+0x490/0x490 [ 997.256922] ? kasan_check_write+0x14/0x20 [ 997.261178] ? __mutex_unlock_slowpath+0x197/0x8c0 10:09:27 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0810220, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 997.266125] ? genl_unregister_family+0x8a0/0x8a0 [ 997.270989] ? wait_for_completion+0x8a0/0x8a0 [ 997.275587] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 997.281031] ? kasan_check_read+0x11/0x20 [ 997.285199] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 997.290488] ? rcu_softirq_qs+0x20/0x20 [ 997.294485] netlink_ack+0x2c5/0xb80 [ 997.298217] ? netlink_sendmsg+0xfc0/0xfc0 [ 997.302491] ? mutex_unlock+0xd/0x10 [ 997.306225] ? genl_rcv_msg+0x102/0x168 [ 997.310217] netlink_rcv_skb+0x35d/0x440 [ 997.314292] ? genl_family_rcv_msg+0x1140/0x1140 [ 997.319065] ? netlink_ack+0xb80/0xb80 [ 997.322966] ? down_read+0x8d/0x120 [ 997.326622] genl_rcv+0x28/0x40 [ 997.329934] netlink_unicast+0x5a5/0x760 [ 997.334011] ? netlink_attachskb+0x9a0/0x9a0 [ 997.338460] netlink_sendmsg+0xa18/0xfc0 [ 997.342541] ? netlink_unicast+0x760/0x760 [ 997.346792] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 997.351743] ? apparmor_socket_sendmsg+0x29/0x30 [ 997.356519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 997.362071] ? security_socket_sendmsg+0x94/0xc0 [ 997.366839] ? netlink_unicast+0x760/0x760 [ 997.371088] sock_sendmsg+0xd5/0x120 [ 997.374818] ___sys_sendmsg+0x7fd/0x930 [ 997.378809] ? find_held_lock+0x36/0x1c0 [ 997.382895] ? copy_msghdr_from_user+0x580/0x580 [ 997.387672] ? lock_downgrade+0x900/0x900 [ 997.391837] ? proc_fail_nth_write+0x9e/0x210 [ 997.396348] ? __fget_light+0x2e9/0x430 [ 997.400336] ? fget_raw+0x20/0x20 [ 997.403806] ? kasan_check_write+0x14/0x20 [ 997.408052] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 997.413002] ? wait_for_completion+0x8a0/0x8a0 10:09:27 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2023e1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)='\n\au', 0x3) [ 997.417607] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 997.423167] ? sockfd_lookup_light+0xc5/0x160 [ 997.427688] __sys_sendmsg+0x11d/0x280 [ 997.431591] ? __ia32_sys_shutdown+0x80/0x80 [ 997.436016] ? __sb_end_write+0xd9/0x110 [ 997.440096] ? fput+0x130/0x1a0 [ 997.443402] ? do_syscall_64+0x9a/0x820 [ 997.447387] ? do_syscall_64+0x9a/0x820 [ 997.451388] ? trace_hardirqs_off_caller+0x300/0x300 [ 997.456517] __x64_sys_sendmsg+0x78/0xb0 [ 997.460595] do_syscall_64+0x1b9/0x820 [ 997.464497] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 997.469882] ? syscall_return_slowpath+0x5e0/0x5e0 [ 997.474841] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 997.479701] ? trace_hardirqs_off+0x310/0x310 [ 997.484211] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 997.489249] ? prepare_exit_to_usermode+0x291/0x3b0 [ 997.494286] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 997.499143] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 997.504352] RIP: 0033:0x457579 [ 997.507556] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 997.526470] RSP: 002b:00007f42d53adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 997.534202] RAX: ffffffffffffffda RBX: 00007f42d53adc90 RCX: 0000000000457579 [ 997.541485] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 997.548761] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 997.556037] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f42d53ae6d4 [ 997.563319] R13: 00000000004c34ce R14: 00000000004d5240 R15: 0000000000000005 10:09:27 executing program 4 (fault-call:5 fault-nth:4): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000be, 0x7ffffffff000) 10:09:27 executing program 1 (fault-call:2 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x2b, 0x583540) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000200)="8af383d0c7aed7722383b3419f44304c315095e8d1396ab2d6b0c4f3deb6e719066fba7102daef175bac1cefa585ed47de353b96e5d8aa064cc8c2927528c311bb7cbd7457b32c98f5c21b2fcb1413475a30895adb3d2b9214058d0b4868509b1c6e9a5edb41e22f76cde233d419c5612bec82218a86dcbe304eb2a7b0e5580983c696791cae64118b4ccce3eb6618078422ce99840473adaf7c4f3fda6424a8c843ba842337a6581e8558be6407297ee27b0a85") ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000000)={0x5000, 0xa000}) bind$alg(r1, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha1\x00'}, 0x58) 10:09:27 executing program 5: kexec_load(0x0, 0x800000000000138, &(0x7f0000000180), 0x350000) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x3}) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x40, 0x0) 10:09:27 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0d10a20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 997.781718] FAULT_INJECTION: forcing a failure. [ 997.781718] name failslab, interval 1, probability 0, space 0, times 0 10:09:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="7d1dd0f886f5e62f1ac2c8c68b50595d7d4d04bd5459a9b99415bf05e66ad2d8bb610bc35de321dc38909158552043c082440f15f9dc7d9529321e15ecaffa22184a5ab324902c78598cc858df56ef9cbd77099bda93296925212d1e4e365dbcff53c355c95f9852ad46842f90e4719c48be0556f0bd28a6ec485c42d579068fafbdae1f22ff6a58fe183d2769b0dae7260b53a5ea7189d2b0f98613f5403680f57dab01c2ecb7c7b2c3b8600b86543099c07f86c2ba14d951d91c679c6b03c33df2606e9c63c5926aa6a4e926b98a48c56768882cb3c3c43f04e28dcd196b38162ed2b5a14a877fee47", 0xea) [ 997.824673] CPU: 0 PID: 11173 Comm: syz-executor1 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 997.833200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.842739] Call Trace: [ 997.845342] dump_stack+0x1d3/0x2c4 [ 997.848992] ? dump_stack_print_info.cold.2+0x52/0x52 [ 997.854215] should_fail.cold.4+0xa/0x17 [ 997.858297] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 997.863426] ? lock_downgrade+0x900/0x900 [ 997.867591] ? check_preemption_disabled+0x48/0x200 [ 997.872619] ? graph_lock+0x170/0x170 [ 997.876432] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 997.881370] ? kasan_check_read+0x11/0x20 [ 997.885529] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 997.891006] ? graph_lock+0x170/0x170 [ 997.894830] ? find_held_lock+0x36/0x1c0 [ 997.898913] ? __lock_is_held+0xb5/0x140 [ 997.903005] ? ttwu_stat+0x5c0/0x5c0 [ 997.906753] __should_failslab+0x124/0x180 [ 997.911007] should_failslab+0x9/0x14 [ 997.914823] __kmalloc+0x2d4/0x760 [ 997.918383] ? lockdep_hardirqs_on+0x421/0x5c0 [ 997.923014] ? trace_hardirqs_on+0xbd/0x310 [ 997.927354] ? lock_release+0x970/0x970 [ 997.931344] ? sock_kmalloc+0x15a/0x1f0 [ 997.935337] sock_kmalloc+0x15a/0x1f0 [ 997.939167] ? __sk_mem_schedule+0xe0/0xe0 [ 997.943428] ? __local_bh_enable_ip+0x160/0x260 [ 997.948121] alg_setsockopt+0x264/0x3b0 [ 997.952114] __sys_setsockopt+0x1ba/0x3c0 [ 997.956311] ? kernel_accept+0x310/0x310 [ 997.960390] ? lockdep_hardirqs_on+0x421/0x5c0 [ 997.965008] ? trace_hardirqs_on+0xbd/0x310 [ 997.969347] ? trace_hardirqs_on_caller+0x310/0x310 [ 997.974372] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 997.979752] ? trace_hardirqs_off_caller+0x300/0x300 [ 997.984874] __x64_sys_setsockopt+0xbe/0x150 [ 997.989303] do_syscall_64+0x1b9/0x820 [ 997.993212] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 997.998588] ? syscall_return_slowpath+0x5e0/0x5e0 [ 998.003531] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 998.008385] ? trace_hardirqs_off+0x310/0x310 [ 998.012935] ? prepare_exit_to_usermode+0x291/0x3b0 [ 998.017988] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 998.022855] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 998.028050] RIP: 0033:0x457579 [ 998.031256] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 998.050263] RSP: 002b:00007f62ff5fac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 998.057993] RAX: ffffffffffffffda RBX: 00007f62ff5fac90 RCX: 0000000000457579 [ 998.065274] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000003 10:09:27 executing program 5: kexec_load(0x1fffffffc, 0x7, &(0x7f0000002480)=[{&(0x7f0000000080)="ceb4a13d94ee53c40b454f4669d28ae4e7255a820a111bdea147e1f7c0b80303dc8336bfc0e8f5a5e2aceee078beb0e41721e9f02ad49112c52909a02660375344a6614cef455aff749a891e47ea7461d512815384ebd5137843ef4e7c0b017b7d80a6295f5655062b6f180b5bae255df2fce3e98ba6f0f100e4c71521cb044def75cf03e04645ec0df69e94414e1b8d6a464a9be2132ce988b2650d365e11c2b1ea51f2d0e5ed178e2a53484c550c3f1992f225643639f137184b0daa009cbe44092cb540fa4c55f9cd5f639f30c6", 0xcf, 0x5, 0x20}, {&(0x7f0000000180)="ad7b84625c800a460070a277253bbb5a9fd92c1ddd4a06677db0bcb6ba4eef", 0x1f, 0x100, 0x5}, {&(0x7f00000001c0)="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", 0x1000, 0x4, 0x4}, {&(0x7f00000011c0)="0df497574174bdb59d5f37d7754fbcc81abe72caba77d33c6d409410c239f8dd149af587530b17e3777dce126f286eb2522e395aea52c82d37fd5f91c93601eb03490ed4216e4a95c1070daf9922ae502bcb5228504a0a4de8ed22b1a9786e6a3ef09e830b04b01fe98021617a9380067713120c0b14ed4c524bb3f42022e817aa50cb93407a9cee12f8caafd5c40f9f9d6db3f852d5533547df60e740b281ecbcc8a40a21b91cccd3046f19cd090fec", 0xb0, 0x5, 0x401}, {&(0x7f0000001280)="9f1e4d7de164a2008fa0fd3bd6d537a8a8fbccf8ef82f2dd4401a3f19f45fde0aee12294d8d343d885ee7ec7e1d8deef4e86854fd01b9209a97a9fb5ff3c093445c1967cfa15862391ec99456be55470db7e3079d9382320bdcb93dff11658ddda9204db744c9705253bdc3dfe29bc471e282d109a45e987ef2baecafa414ec70754d422ae075cfdd31ccfab6692087e62600d5c3ce413c7b77723486df7ebf154b431f321f2e3266427868bf75783917ca245cd83b698d31fa2225fc44424f39bee2f96157e1e0edea79fd9e7691fb20e130443443a590edc5ab86acfdc66ccc6b2dccd941e17f6f9c0562c038c83a64987facd41c7fe1910", 0xf9, 0x5, 0xc8a}, {&(0x7f0000001380)="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", 0x1000, 0x8, 0xfffffffffffffffa}, {&(0x7f0000002380)="701a15b79607e970402085196d88cdf7574cb47a23ea16f5ece253a77ee60ade71d73b9cb3a991bd77be5eb29a3d247575c0c0087a804b7218f895905decc05c23469d3eeb0444d2b1779229c3891dce9f15878bdaa43362712058609ebf75ae6b2295a043d453fede8286ff7039027c5d5fb81c3a919479428a51627521b40eb205b8f9112eb5ddf4c051c93a742cc248be1f9ea82e170ddd99a1963ae2ade8e8a06b05f9d036663c9492b4e877abd8c289f585d6f0afb0b443840a447eceb3840c142601228e5bfd3dd8aa67b850ac239f043e9f55f8bfd0f6063135", 0xdd, 0x200, 0x9}], 0x280000) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:28 executing program 5: kexec_load(0x4, 0x121, &(0x7f0000000180), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f00000000c0)) 10:09:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000020c, 0x7ffffffff000) 10:09:28 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0711420, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 998.072553] RBP: 000000000072bf00 R08: 0000000000000004 R09: 0000000000000000 [ 998.079838] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f62ff5fb6d4 [ 998.087118] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000004 10:09:28 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0xc}, r3}, 0x14) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f00000003c0)={&(0x7f0000000140), 0x10, &(0x7f0000000380)={&(0x7f0000000240)={0x2, 0x0, 0x7, {0x77359400}, {r4, r5/1000+10000}, {0x0, 0x7f, 0x9, 0x4}, 0x1, @can={{0x1, 0x7, 0xfffffffffffff800, 0x9}, 0x7, 0x0, 0x0, 0x0, "55258637b9576eff"}}, 0x48}}, 0x20004010) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000440)={0x1002, &(0x7f0000000400), 0x2, r2, 0x8}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000002c0)="0a07b710f9844f626d9e9bfc5d23bf84f46440cba9df5b1cbe04e29bbab8c17c9a743c510adfe94db3aa7840c8b137c49667ef814bc809f2b4dfa0e76ef887dd9a049beac1b366a2da8834af5272fe2ffe40f1fb7a2e5a9818d81b20fc2a54762f51797350ff164dcb26c47afe0ef36788010d0d81f2317a3ce265070c1f485f1ea7401eb837638b44379b5ee2822e34ecdbc6ce514132d6e233bae716736ff15302a69c0256d767b931ccb95c0ad5c33e", 0xfdc5) 10:09:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:28 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0a13c2000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:28 executing program 1 (fault-call:2 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:28 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0310720, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000af, 0x7ffffffff000) 10:09:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x200001d0, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:28 executing program 2 (fault-call:4 fault-nth:0): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:28 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x201931c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 998.528710] FAULT_INJECTION: forcing a failure. [ 998.528710] name failslab, interval 1, probability 0, space 0, times 0 [ 998.572673] CPU: 1 PID: 11228 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 998.581237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 998.590597] Call Trace: [ 998.593209] dump_stack+0x1d3/0x2c4 [ 998.596860] ? dump_stack_print_info.cold.2+0x52/0x52 [ 998.602078] should_fail.cold.4+0xa/0x17 [ 998.606166] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 998.611282] ? lock_downgrade+0x900/0x900 [ 998.615445] ? check_preemption_disabled+0x48/0x200 [ 998.620470] ? graph_lock+0x170/0x170 [ 998.624279] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 998.629215] ? kasan_check_read+0x11/0x20 [ 998.633376] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 998.638665] ? graph_lock+0x170/0x170 [ 998.642486] ? find_held_lock+0x36/0x1c0 [ 998.646574] ? __lock_is_held+0xb5/0x140 [ 998.650664] ? ttwu_stat+0x5c0/0x5c0 [ 998.654442] __should_failslab+0x124/0x180 [ 998.658706] should_failslab+0x9/0x14 [ 998.662517] __kmalloc+0x2d4/0x760 [ 998.666069] ? lockdep_hardirqs_on+0x421/0x5c0 [ 998.670679] ? trace_hardirqs_on+0xbd/0x310 [ 998.675016] ? lock_release+0x970/0x970 [ 998.679001] ? sock_kmalloc+0x15a/0x1f0 [ 998.682999] sock_kmalloc+0x15a/0x1f0 [ 998.686848] ? __sk_mem_schedule+0xe0/0xe0 [ 998.691099] ? __local_bh_enable_ip+0x160/0x260 [ 998.695793] alg_setsockopt+0x264/0x3b0 [ 998.699781] __sys_setsockopt+0x1ba/0x3c0 [ 998.703944] ? kernel_accept+0x310/0x310 [ 998.708019] ? lockdep_hardirqs_on+0x421/0x5c0 [ 998.712629] ? trace_hardirqs_on+0xbd/0x310 [ 998.716995] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 998.722374] ? trace_hardirqs_off_caller+0x300/0x300 [ 998.727491] __x64_sys_setsockopt+0xbe/0x150 [ 998.731929] do_syscall_64+0x1b9/0x820 [ 998.735838] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 998.741222] ? syscall_return_slowpath+0x5e0/0x5e0 [ 998.746176] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 998.751036] ? trace_hardirqs_off+0x310/0x310 [ 998.755542] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 998.760568] ? prepare_exit_to_usermode+0x291/0x3b0 [ 998.765599] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 998.770459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 998.770472] RIP: 0033:0x457579 [ 998.770488] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 998.770502] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 [ 998.797775] ORIG_RAX: 0000000000000036 [ 998.797786] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 998.797794] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 998.797803] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 998.797812] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 998.797825] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000007b, 0x7ffffffff000) 10:09:29 executing program 2 (fault-call:4 fault-nth:1): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:29 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0011c2000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:29 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x20000, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000080)={@host}) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0xa) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x3, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x3, &(0x7f0000000180)="0a0775b0", 0x4) [ 999.038870] FAULT_INJECTION: forcing a failure. [ 999.038870] name failslab, interval 1, probability 0, space 0, times 0 10:09:29 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0a10320, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 999.088507] CPU: 0 PID: 11243 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 999.097033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.106398] Call Trace: [ 999.109047] dump_stack+0x1d3/0x2c4 [ 999.112702] ? dump_stack_print_info.cold.2+0x52/0x52 [ 999.117920] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 999.123330] should_fail.cold.4+0xa/0x17 [ 999.127431] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 999.132551] ? graph_lock+0x170/0x170 [ 999.136370] ? graph_lock+0x170/0x170 [ 999.140215] ? find_held_lock+0x36/0x1c0 [ 999.144312] ? __lock_is_held+0xb5/0x140 [ 999.148405] ? ttwu_stat+0x5c0/0x5c0 [ 999.152166] __should_failslab+0x124/0x180 [ 999.156452] should_failslab+0x9/0x14 [ 999.160283] kmem_cache_alloc_trace+0x2d7/0x750 [ 999.164984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 999.170532] ? skcipher_setkey+0x1ab/0x2e0 [ 999.174783] gf128mul_init_64k_bbe+0x51/0x7e0 [ 999.179310] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 999.184858] ? skcipher_setkey+0x1ab/0x2e0 [ 999.189113] setkey+0x21f/0x410 [ 999.189298] IPVS: ftp: loaded support on port[0] = 21 [ 999.192422] ? crypt_done+0xa0/0xa0 [ 999.192450] skcipher_setkey+0x163/0x2e0 [ 999.192472] skcipher_setkey+0x3f/0x50 [ 999.205328] ? hash_accept_nokey+0x90/0x90 [ 999.205344] alg_setsockopt+0x306/0x3b0 [ 999.205367] __sys_setsockopt+0x1ba/0x3c0 [ 999.205391] ? kernel_accept+0x310/0x310 [ 999.213506] ? lockdep_hardirqs_on+0x421/0x5c0 [ 999.213526] ? trace_hardirqs_on+0xbd/0x310 [ 999.213545] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 999.213565] ? trace_hardirqs_off_caller+0x300/0x300 [ 999.221668] __x64_sys_setsockopt+0xbe/0x150 [ 999.221692] do_syscall_64+0x1b9/0x820 [ 999.221708] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 999.221727] ? syscall_return_slowpath+0x5e0/0x5e0 [ 999.230351] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 999.230370] ? trace_hardirqs_off+0x310/0x310 [ 999.230388] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 999.230406] ? prepare_exit_to_usermode+0x291/0x3b0 [ 999.230436] ? trace_hardirqs_off_thunk+0x1a/0x1c 10:09:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x200000000000000, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000024d, 0x7ffffffff000) [ 999.230457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 999.230468] RIP: 0033:0x457579 [ 999.230484] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 999.230492] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 999.249695] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 999.249705] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 10:09:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000118, 0x7ffffffff000) 10:09:29 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0010d20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 999.249714] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 999.249724] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 999.249733] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, &(0x7f0000000180)="0a0775b0", 0x4) [ 999.828015] device bridge_slave_1 left promiscuous mode [ 999.833552] bridge0: port 2(bridge_slave_1) entered disabled state [ 999.887943] device bridge_slave_0 left promiscuous mode [ 999.893380] bridge0: port 1(bridge_slave_0) entered disabled state [ 999.959082] team0 (unregistering): Port device team_slave_1 removed [ 999.969423] team0 (unregistering): Port device team_slave_0 removed [ 999.981090] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1000.040762] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1000.097318] bond0 (unregistering): Released all slaves [ 1000.427787] bridge0: port 1(bridge_slave_0) entered blocking state [ 1000.434297] bridge0: port 1(bridge_slave_0) entered disabled state [ 1000.441746] device bridge_slave_0 entered promiscuous mode [ 1000.488333] bridge0: port 2(bridge_slave_1) entered blocking state [ 1000.494866] bridge0: port 2(bridge_slave_1) entered disabled state [ 1000.502677] device bridge_slave_1 entered promiscuous mode [ 1000.545730] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1000.589919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1000.719646] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1000.765952] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1000.975280] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1000.982957] team0: Port device team_slave_0 added [ 1001.026546] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1001.033995] team0: Port device team_slave_1 added [ 1001.075946] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1001.125393] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1001.171721] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1001.179258] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1001.195568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1001.232808] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1001.240056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1001.256503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1001.634275] bridge0: port 2(bridge_slave_1) entered blocking state [ 1001.640667] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1001.647354] bridge0: port 1(bridge_slave_0) entered blocking state [ 1001.653700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1001.661094] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1002.167358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1002.622346] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1002.721411] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1002.809945] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1002.816066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1002.823946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1002.912530] 8021q: adding VLAN 0 to HW filter on device team0 10:09:33 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x16080, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f00000000c0)={0x0, 0x1, 0xf1757e1, 0xfd}) kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) exit_group(0x9e7) mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4003, &(0x7f0000000040)=0xfff, 0x0, 0x2) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000100)={0x3f, 0x2, 0x7, 0x54}) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x20, 0xffffffffffff9c82, 0x0, 0x5, 0x3, 0x1, "519c7463827eed718236785a02c7feff89794c086017ad305b95dcdb7d5bc05e95891dce31661686d030900791363c3658835ac2d4c9cc9f73c13d5f281471e1", "65cc51f9215ca4c7f1914d1d1de3ae67b93c70977961d681eb575c4717373180eb6378f2569ba1712d16e8185f793633fafc69441a41715f01c02b2a3a7844d6", "8fc90771f61ba1ba5e83fb89be92b84549382ee995c49de4a3858bf2c400144c", [0x9, 0x80000001]}) 10:09:33 executing program 2 (fault-call:4 fault-nth:2): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x40030000000000, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0xffffff1f, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:33 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0310120, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000229, 0x7ffffffff000) [ 1003.446478] FAULT_INJECTION: forcing a failure. [ 1003.446478] name failslab, interval 1, probability 0, space 0, times 0 [ 1003.490906] CPU: 0 PID: 11547 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1003.499451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1003.508811] Call Trace: [ 1003.511427] dump_stack+0x1d3/0x2c4 [ 1003.515077] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1003.520291] ? __kernel_text_address+0xd/0x40 [ 1003.524800] ? unwind_get_return_address+0x61/0xa0 [ 1003.529751] should_fail.cold.4+0xa/0x17 [ 1003.533849] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1003.538969] ? save_stack+0xa9/0xd0 [ 1003.542612] ? graph_lock+0x170/0x170 [ 1003.546429] ? save_stack+0x43/0xd0 [ 1003.546447] ? kasan_kmalloc+0xc7/0xe0 [ 1003.553956] ? kmem_cache_alloc_trace+0x152/0x750 [ 1003.558809] ? gf128mul_init_64k_bbe+0x51/0x7e0 [ 1003.558825] ? setkey+0x21f/0x410 [ 1003.558843] ? graph_lock+0x170/0x170 [ 1003.558858] ? __sys_setsockopt+0x1ba/0x3c0 [ 1003.558873] ? __x64_sys_setsockopt+0xbe/0x150 [ 1003.558889] ? do_syscall_64+0x1b9/0x820 [ 1003.558906] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1003.558931] ? find_held_lock+0x36/0x1c0 [ 1003.558951] ? __lock_is_held+0xb5/0x140 [ 1003.597287] ? ttwu_stat+0x5c0/0x5c0 [ 1003.601028] __should_failslab+0x124/0x180 [ 1003.605283] should_failslab+0x9/0x14 [ 1003.609100] kmem_cache_alloc_trace+0x2d7/0x750 [ 1003.613783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1003.619329] ? skcipher_setkey+0x1ab/0x2e0 [ 1003.619354] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1003.619375] ? skcipher_setkey+0x1ab/0x2e0 [ 1003.619401] setkey+0x21f/0x410 [ 1003.628126] ? crypt_done+0xa0/0xa0 [ 1003.628154] skcipher_setkey+0x163/0x2e0 [ 1003.628186] skcipher_setkey+0x3f/0x50 [ 1003.628201] ? hash_accept_nokey+0x90/0x90 [ 1003.628215] alg_setsockopt+0x306/0x3b0 [ 1003.628237] __sys_setsockopt+0x1ba/0x3c0 [ 1003.647288] ? kernel_accept+0x310/0x310 [ 1003.647309] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1003.647328] ? trace_hardirqs_on+0xbd/0x310 [ 1003.647348] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1003.647368] ? trace_hardirqs_off_caller+0x300/0x300 [ 1003.655568] __x64_sys_setsockopt+0xbe/0x150 [ 1003.655591] do_syscall_64+0x1b9/0x820 [ 1003.655613] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1003.696763] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1003.701706] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1003.706562] ? trace_hardirqs_off+0x310/0x310 [ 1003.711075] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1003.716105] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1003.716128] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1003.716152] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1003.726013] RIP: 0033:0x457579 [ 1003.726031] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1003.726039] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1003.761198] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1003.768476] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1003.775761] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1003.783051] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 10:09:33 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000040), 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x670000, 0x0) write$smack_current(r0, &(0x7f00000000c0)='/dev/nullb0\x00', 0xc) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x80, 0x0) 10:09:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000292, 0x7ffffffff000) 10:09:33 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0a1032000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x300, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x3000000, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1003.790338] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:33 executing program 2 (fault-call:4 fault-nth:3): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x5000) 10:09:33 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x200c71c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:34 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) fchmod(r0, 0xc3) 10:09:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000025a, 0x7ffffffff000) [ 1003.925745] FAULT_INJECTION: forcing a failure. [ 1003.925745] name failslab, interval 1, probability 0, space 0, times 0 [ 1003.948499] CPU: 0 PID: 11584 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1003.957015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1003.957022] Call Trace: [ 1003.957047] dump_stack+0x1d3/0x2c4 [ 1003.957073] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1003.969012] ? __kernel_text_address+0xd/0x40 [ 1003.969031] ? unwind_get_return_address+0x61/0xa0 [ 1003.969054] should_fail.cold.4+0xa/0x17 [ 1003.987267] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1003.987289] ? save_stack+0xa9/0xd0 [ 1003.987307] ? graph_lock+0x170/0x170 [ 1003.987320] ? save_stack+0x43/0xd0 [ 1003.987334] ? kasan_kmalloc+0xc7/0xe0 [ 1003.987352] ? kmem_cache_alloc_trace+0x152/0x750 [ 1003.996516] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1003.996535] ? setkey+0x21f/0x410 [ 1004.024402] ? graph_lock+0x170/0x170 [ 1004.028227] ? __sys_setsockopt+0x1ba/0x3c0 [ 1004.032568] ? __x64_sys_setsockopt+0xbe/0x150 [ 1004.037254] ? do_syscall_64+0x1b9/0x820 [ 1004.041330] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1004.046721] ? find_held_lock+0x36/0x1c0 [ 1004.050802] ? __lock_is_held+0xb5/0x140 [ 1004.054893] ? ttwu_stat+0x5c0/0x5c0 [ 1004.058645] __should_failslab+0x124/0x180 [ 1004.062909] should_failslab+0x9/0x14 [ 1004.066727] kmem_cache_alloc_trace+0x2d7/0x750 10:09:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x33fcc, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1004.071425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1004.076979] ? skcipher_setkey+0x1ab/0x2e0 [ 1004.081239] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1004.085757] ? skcipher_setkey+0x1ab/0x2e0 [ 1004.090012] setkey+0x21f/0x410 [ 1004.093312] ? crypt_done+0xa0/0xa0 [ 1004.096962] skcipher_setkey+0x163/0x2e0 [ 1004.101045] skcipher_setkey+0x3f/0x50 [ 1004.104947] ? hash_accept_nokey+0x90/0x90 [ 1004.109207] alg_setsockopt+0x306/0x3b0 [ 1004.113210] __sys_setsockopt+0x1ba/0x3c0 [ 1004.117369] ? kernel_accept+0x310/0x310 [ 1004.121451] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1004.126046] ? trace_hardirqs_on+0xbd/0x310 [ 1004.130381] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1004.135763] ? trace_hardirqs_off_caller+0x300/0x300 [ 1004.140892] __x64_sys_setsockopt+0xbe/0x150 [ 1004.145328] do_syscall_64+0x1b9/0x820 [ 1004.149258] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1004.154642] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1004.159586] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1004.164452] ? trace_hardirqs_off+0x310/0x310 [ 1004.168962] ? prepare_exit_to_usermode+0x3b0/0x3b0 10:09:34 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0a10f2000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1004.173996] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1004.179032] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1004.183900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1004.189096] RIP: 0033:0x457579 [ 1004.192301] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1004.211212] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1004.218934] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 10:09:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x34000, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x3) [ 1004.226213] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1004.226223] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1004.226233] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1004.226242] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000a2, 0x7ffffffff000) 10:09:34 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x25f5de6b, 0x300c0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x3e, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000000)) 10:09:34 executing program 2 (fault-call:4 fault-nth:4): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:34 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc021082000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x20000184) 10:09:34 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x300, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1004.484699] FAULT_INJECTION: forcing a failure. [ 1004.484699] name failslab, interval 1, probability 0, space 0, times 0 [ 1004.497421] CPU: 1 PID: 11631 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1004.505944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1004.515305] Call Trace: [ 1004.517916] dump_stack+0x1d3/0x2c4 [ 1004.521578] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1004.526795] ? __kernel_text_address+0xd/0x40 [ 1004.531311] ? unwind_get_return_address+0x61/0xa0 [ 1004.536257] should_fail.cold.4+0xa/0x17 [ 1004.540328] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1004.545473] ? save_stack+0xa9/0xd0 [ 1004.549104] ? graph_lock+0x170/0x170 [ 1004.552906] ? save_stack+0x43/0xd0 [ 1004.556540] ? kasan_kmalloc+0xc7/0xe0 [ 1004.560429] ? kmem_cache_alloc_trace+0x152/0x750 [ 1004.565277] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1004.569955] ? setkey+0x21f/0x410 [ 1004.573415] ? graph_lock+0x170/0x170 [ 1004.577219] ? __sys_setsockopt+0x1ba/0x3c0 [ 1004.581543] ? __x64_sys_setsockopt+0xbe/0x150 [ 1004.586127] ? do_syscall_64+0x1b9/0x820 [ 1004.590198] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1004.595574] ? find_held_lock+0x36/0x1c0 [ 1004.599646] ? __lock_is_held+0xb5/0x140 [ 1004.603728] ? ttwu_stat+0x5c0/0x5c0 [ 1004.607457] __should_failslab+0x124/0x180 [ 1004.611697] should_failslab+0x9/0x14 [ 1004.615499] kmem_cache_alloc_trace+0x2d7/0x750 [ 1004.620191] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1004.624696] ? skcipher_setkey+0x1ab/0x2e0 [ 1004.628951] setkey+0x21f/0x410 [ 1004.632243] ? crypt_done+0xa0/0xa0 [ 1004.635883] skcipher_setkey+0x163/0x2e0 [ 1004.639959] skcipher_setkey+0x3f/0x50 [ 1004.643852] ? hash_accept_nokey+0x90/0x90 [ 1004.648092] alg_setsockopt+0x306/0x3b0 [ 1004.652075] __sys_setsockopt+0x1ba/0x3c0 [ 1004.656228] ? kernel_accept+0x310/0x310 [ 1004.660298] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1004.664889] ? trace_hardirqs_on+0xbd/0x310 [ 1004.669221] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1004.674588] ? trace_hardirqs_off_caller+0x300/0x300 [ 1004.679705] __x64_sys_setsockopt+0xbe/0x150 [ 1004.684122] do_syscall_64+0x1b9/0x820 [ 1004.688017] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1004.693386] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1004.698319] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1004.703174] ? trace_hardirqs_off+0x310/0x310 [ 1004.707676] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1004.712696] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1004.717724] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1004.722578] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1004.727769] RIP: 0033:0x457579 [ 1004.730965] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1004.749877] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1004.757596] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1004.764867] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1004.772138] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 10:09:34 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0xc) ioprio_set$pid(0x1, r0, 0xbc) clock_nanosleep(0x2, 0x1, &(0x7f0000000200), &(0x7f0000000240)) r1 = socket$unix(0x1, 0x3, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r4 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x53e4, 0x5, 0x7f, 0x3}, 0x8) ioctl$TIOCGLCKTRMIOS(r4, 0x5456, &(0x7f00000002c0)={0x2, 0x6, 0x4, 0x7, 0xadc, 0x0, 0x7, 0xfff, 0x3, 0x10000, 0x1000, 0x101}) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) ioctl$KVM_S390_UCAS_MAP(r4, 0x4018ae50, &(0x7f0000000280)={0xeb09, 0x7ff, 0x3ff}) r5 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept4(r2, &(0x7f0000000040)=@ax25, &(0x7f0000000100)=0x80, 0x80800) r6 = openat$cgroup_procs(r5, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') r7 = dup2(r5, r6) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_DEL(r5, 0x2, r2) connect(r1, &(0x7f0000987ff4)=@un=@file={0x1, "e91f7189591e9233614b00"}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r7, &(0x7f0000000240)={0x4}) r8 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) sendfile(r8, r8, &(0x7f0000000040), 0x5) [ 1004.779419] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1004.786687] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001ae, 0x7ffffffff000) 10:09:34 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2014c1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:34 executing program 2 (fault-call:4 fault-nth:5): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x2, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x1000000, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1005.061772] FAULT_INJECTION: forcing a failure. [ 1005.061772] name failslab, interval 1, probability 0, space 0, times 0 10:09:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="06a8b200b03731ee0000", 0xa) 10:09:35 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc051092000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1005.211062] CPU: 1 PID: 11661 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1005.219626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1005.228991] Call Trace: [ 1005.231596] dump_stack+0x1d3/0x2c4 [ 1005.235245] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1005.240457] ? __kernel_text_address+0xd/0x40 [ 1005.244972] ? unwind_get_return_address+0x61/0xa0 [ 1005.249937] should_fail.cold.4+0xa/0x17 [ 1005.254491] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1005.259617] ? save_stack+0xa9/0xd0 [ 1005.263260] ? graph_lock+0x170/0x170 [ 1005.267078] ? save_stack+0x43/0xd0 [ 1005.270712] ? kasan_kmalloc+0xc7/0xe0 [ 1005.274612] ? kmem_cache_alloc_trace+0x152/0x750 [ 1005.279986] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1005.284667] ? setkey+0x21f/0x410 [ 1005.288132] ? graph_lock+0x170/0x170 [ 1005.291978] ? __sys_setsockopt+0x1ba/0x3c0 [ 1005.296301] ? __x64_sys_setsockopt+0xbe/0x150 [ 1005.300898] ? do_syscall_64+0x1b9/0x820 [ 1005.304981] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1005.310368] ? find_held_lock+0x36/0x1c0 [ 1005.314448] ? __lock_is_held+0xb5/0x140 [ 1005.318543] ? ttwu_stat+0x5c0/0x5c0 [ 1005.322291] __should_failslab+0x124/0x180 [ 1005.326542] should_failslab+0x9/0x14 [ 1005.330363] kmem_cache_alloc_trace+0x2d7/0x750 [ 1005.335059] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1005.339575] ? skcipher_setkey+0x1ab/0x2e0 [ 1005.343831] setkey+0x21f/0x410 [ 1005.347168] ? crypt_done+0xa0/0xa0 [ 1005.350823] skcipher_setkey+0x163/0x2e0 [ 1005.354907] skcipher_setkey+0x3f/0x50 [ 1005.358816] ? hash_accept_nokey+0x90/0x90 [ 1005.363061] alg_setsockopt+0x306/0x3b0 [ 1005.367087] __sys_setsockopt+0x1ba/0x3c0 [ 1005.371250] ? kernel_accept+0x310/0x310 [ 1005.375330] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1005.379931] ? trace_hardirqs_on+0xbd/0x310 [ 1005.384268] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1005.389649] ? trace_hardirqs_off_caller+0x300/0x300 [ 1005.394776] __x64_sys_setsockopt+0xbe/0x150 [ 1005.399213] do_syscall_64+0x1b9/0x820 [ 1005.403136] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1005.408524] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1005.413466] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1005.418327] ? trace_hardirqs_off+0x310/0x310 [ 1005.422840] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1005.427874] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1005.432911] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1005.437786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1005.442986] RIP: 0033:0x457579 [ 1005.446207] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1005.465119] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1005.472852] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1005.480131] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1005.487419] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1005.494698] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1005.501974] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000003, 0x7ffffffff000) 10:09:35 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0xcc3f030000000000, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x2) 10:09:36 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0b1282000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:36 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80000, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x40000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x80000002}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="22609e9f4bca85a89f1d7fb4edcf11aaf7133f7b4c035b4a8782ffa2cea1467bb76c2ef4e1e0c17462c44ca6eb147e95ae9d17189773529b6dc1d95515aad05d451ccd740ece0a4501c210d36959e3d774dd28f2931d5f06a8bc5c3adead688cedd6a43735fd38b5bc0c536b5b217815f1477c36658245d30f22d3759b3942e1de3561173c27f4ad173f663be815945c20a626c0a10670852d1fc15d28186f3f603cc8e4a7ea331ab622217b977807e40bcdb654a7c51975f9afaca699d0d87379d67e0c7dd364e2f88ea0b82cb0f43d184092dcced83d754baf8a5fc377ceca482c4fe0", 0xe4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:36 executing program 2 (fault-call:4 fault-nth:6): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000c7, 0x7ffffffff000) 10:09:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0xffffff7f, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:36 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2028b1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1006.399181] FAULT_INJECTION: forcing a failure. [ 1006.399181] name failslab, interval 1, probability 0, space 0, times 0 [ 1006.422347] CPU: 0 PID: 11709 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1006.430869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1006.440227] Call Trace: [ 1006.442840] dump_stack+0x1d3/0x2c4 10:09:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x400300, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1006.446486] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1006.451690] ? __kernel_text_address+0xd/0x40 [ 1006.456206] ? unwind_get_return_address+0x61/0xa0 [ 1006.461156] should_fail.cold.4+0xa/0x17 [ 1006.465247] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1006.470364] ? save_stack+0xa9/0xd0 [ 1006.470382] ? graph_lock+0x170/0x170 [ 1006.470395] ? save_stack+0x43/0xd0 [ 1006.470408] ? kasan_kmalloc+0xc7/0xe0 [ 1006.470440] ? kmem_cache_alloc_trace+0x152/0x750 [ 1006.470460] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1006.494879] ? setkey+0x21f/0x410 10:09:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x300000000000000, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1006.498350] ? graph_lock+0x170/0x170 [ 1006.502170] ? __sys_setsockopt+0x1ba/0x3c0 [ 1006.506501] ? __x64_sys_setsockopt+0xbe/0x150 [ 1006.511092] ? do_syscall_64+0x1b9/0x820 [ 1006.515175] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1006.520561] ? find_held_lock+0x36/0x1c0 [ 1006.524647] ? __lock_is_held+0xb5/0x140 [ 1006.528737] ? ttwu_stat+0x5c0/0x5c0 [ 1006.532485] __should_failslab+0x124/0x180 [ 1006.536732] should_failslab+0x9/0x14 [ 1006.540559] kmem_cache_alloc_trace+0x2d7/0x750 [ 1006.545261] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1006.549773] ? skcipher_setkey+0x1ab/0x2e0 [ 1006.554022] setkey+0x21f/0x410 [ 1006.557324] ? crypt_done+0xa0/0xa0 [ 1006.560981] skcipher_setkey+0x163/0x2e0 [ 1006.565056] skcipher_setkey+0x3f/0x50 [ 1006.568953] ? hash_accept_nokey+0x90/0x90 [ 1006.573206] alg_setsockopt+0x306/0x3b0 [ 1006.577206] __sys_setsockopt+0x1ba/0x3c0 [ 1006.581369] ? kernel_accept+0x310/0x310 [ 1006.585453] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1006.590054] ? trace_hardirqs_on+0xbd/0x310 [ 1006.594389] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 10:09:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0xf00000000000000, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x100000000000000, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1006.599770] ? trace_hardirqs_off_caller+0x300/0x300 [ 1006.604894] __x64_sys_setsockopt+0xbe/0x150 [ 1006.609322] do_syscall_64+0x1b9/0x820 [ 1006.613223] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1006.618604] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1006.623546] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1006.628410] ? trace_hardirqs_off+0x310/0x310 [ 1006.632934] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1006.637966] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1006.643000] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1006.647862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1006.653065] RIP: 0033:0x457579 [ 1006.656261] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1006.675172] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1006.675190] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1006.675199] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 10:09:36 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0e12720, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0xfffffffffffffca6) finit_module(r0, &(0x7f0000000000)='\x00', 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0", 0x4) socketpair(0x8, 0x7, 0x2, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000240)=[0x200, 0x2]) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x6106fff, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000001c0)) setsockopt$bt_rfcomm_RFCOMM_LM(r3, 0x12, 0x3, &(0x7f0000000140)=0x1, 0x4) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000280)={0x20000000}) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000180)={0x3, 0x12, 0x0, r3}) 10:09:36 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x3, 0x48000) r1 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x6, 0xc0) write$FUSE_GETXATTR(r0, &(0x7f0000000240)={0x18, 0x0, 0x3, {0x3}}, 0x18) setsockopt$llc_int(r0, 0x10c, 0x6, &(0x7f0000000080)=0x800, 0x4) fcntl$addseals(r1, 0x409, 0x6) socket$alg(0x26, 0x5, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x4200, 0x0) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000100)=ANY=[@ANYBLOB="0400000000000000ff02000000000000000000000000000000000000000000000000000000000000"]) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000200)={r3, 0x38c}, 0x8) 10:09:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000025e, 0x7ffffffff000) [ 1006.675208] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1006.675217] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1006.675226] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:36 executing program 2 (fault-call:4 fault-nth:7): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:36 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0713320, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:36 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0xf000000, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:36 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x80) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000040)={0x400, 0x5, 0x1, 0x2}, 0x6) 10:09:36 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1f, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000300)=0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e20}}, 0x7, 0x7, 0x8, 0x8}, &(0x7f0000000340)=0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e24, 0x8, @mcast1, 0xffc0000000000000}}, 0x80, 0x100000001, 0x20, 0x1ff, 0x10}, &(0x7f0000000280)=0x98) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r3) openat$nullb(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/nullb0\x00', 0x402000, 0x0) accept4$packet(r0, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14, 0x80000) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000006c0)={r4, @broadcast, @broadcast}, 0xc) [ 1006.948196] FAULT_INJECTION: forcing a failure. [ 1006.948196] name failslab, interval 1, probability 0, space 0, times 0 [ 1006.984833] CPU: 0 PID: 11751 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 10:09:37 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0f10f20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1006.993364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1007.002777] Call Trace: [ 1007.005384] dump_stack+0x1d3/0x2c4 [ 1007.009039] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1007.014259] ? __kernel_text_address+0xd/0x40 [ 1007.018773] ? unwind_get_return_address+0x61/0xa0 [ 1007.023741] should_fail.cold.4+0xa/0x17 [ 1007.027818] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1007.032935] ? save_stack+0xa9/0xd0 [ 1007.036578] ? graph_lock+0x170/0x170 [ 1007.040387] ? save_stack+0x43/0xd0 [ 1007.044028] ? kasan_kmalloc+0xc7/0xe0 10:09:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0xcc3f0300, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1007.047932] ? kmem_cache_alloc_trace+0x152/0x750 [ 1007.047949] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1007.047963] ? setkey+0x21f/0x410 [ 1007.047979] ? graph_lock+0x170/0x170 [ 1007.047994] ? __sys_setsockopt+0x1ba/0x3c0 [ 1007.048013] ? __x64_sys_setsockopt+0xbe/0x150 [ 1007.060985] ? do_syscall_64+0x1b9/0x820 [ 1007.061002] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1007.061032] ? find_held_lock+0x36/0x1c0 [ 1007.087202] ? __lock_is_held+0xb5/0x140 [ 1007.091297] ? ttwu_stat+0x5c0/0x5c0 10:09:37 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x40, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) 10:09:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'bond_slave_1\x00', 0x800}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x1b5) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) [ 1007.095029] __should_failslab+0x124/0x180 [ 1007.099275] should_failslab+0x9/0x14 [ 1007.103086] kmem_cache_alloc_trace+0x2d7/0x750 [ 1007.107777] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1007.112299] ? skcipher_setkey+0x1ab/0x2e0 [ 1007.116550] setkey+0x21f/0x410 [ 1007.119864] ? crypt_done+0xa0/0xa0 [ 1007.123766] skcipher_setkey+0x163/0x2e0 [ 1007.127864] skcipher_setkey+0x3f/0x50 [ 1007.131762] ? hash_accept_nokey+0x90/0x90 [ 1007.136012] alg_setsockopt+0x306/0x3b0 [ 1007.140001] __sys_setsockopt+0x1ba/0x3c0 [ 1007.144175] ? kernel_accept+0x310/0x310 [ 1007.148259] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1007.152857] ? trace_hardirqs_on+0xbd/0x310 [ 1007.157204] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1007.162674] ? trace_hardirqs_off_caller+0x300/0x300 [ 1007.167799] __x64_sys_setsockopt+0xbe/0x150 [ 1007.167822] do_syscall_64+0x1b9/0x820 [ 1007.167837] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1007.167856] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1007.167871] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1007.167889] ? trace_hardirqs_off+0x310/0x310 [ 1007.167906] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1007.167924] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1007.167947] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1007.167973] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1007.176253] RIP: 0033:0x457579 [ 1007.176269] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1007.176277] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 10:09:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000029b, 0x7ffffffff000) 10:09:37 executing program 2 (fault-call:4 fault-nth:8): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) [ 1007.215940] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1007.215950] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1007.215959] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1007.215969] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1007.215979] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x2000000, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:37 executing program 5: kexec_load(0x6, 0x3, &(0x7f0000000280)=[{&(0x7f0000000040)="82503bdecda56bd9ec4cec84dfceb9d82f8f6c4b77baf7f3", 0x18, 0xda32, 0x3}, {&(0x7f0000000080)="196defc2bb47a12a69f34f47fa843ca382d8c08c4b60c9f121d55e1e495705edbd73b11dcde377e33cba3e97ddb3b9042b0a8c46f3c67ef0350312206995df083433844ab0ea6b9eeefba0105162e4da33dfa82917cc430cbb3d06bbb34a1a5f5aeabfa4a2958285c519b848f47e7a2509fbeb19791aeb23b2e901fe3e2ef65a7dfcfa53ab537b1331aea2d9c66280d0973a954922bcad83a02417290302e4a9417b4c09fad0d1aa9aa165e9392a136402af01593ecc8adc5a3ff437b1c27045fcde1883e8840822eb61f315d9fac54871831397e1ed", 0xd6, 0x5, 0x8001}, {&(0x7f0000000180)="2cbeb07c0d8e20ceeaf4d6b69f8d59019f9d0357701f0fd2092b75c14b75f421c99c5283e54031d8638c2725b9cc3f5db55e7f89a4ff74630e0505354f4ed01e9c054e9df93b6a3d7670b9ad61e15d7c00e7a7b4249a5b884324f68962f1d686b7c0c57c4238942df1b1d76811e3f1d2e61b83abf5f6b7a70213936dcd33410ba3c49a7352b04163ad54d7ab684415d8df7a106e358836a883fbf43d5b08261acad7a40ad224dd7088de2b7eb3d4e65be7d88839e7d6472b17a2add6e79a8539829bf3f1b10bfc18a927675dacd27a6ec51fc36bc1657c8421db8931550173eb3b96", 0x82, 0x0, 0x506}], 0xfffffffffffffffe) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:37 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0d13b20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="0a0775b018e07f2190c2d8505b1cd5839321f5a9e5cb38d102b59fd55ec30354ba65a852f095cdac12ddef0e1e19f59c3b464617307b29c8e0689842e1fd91e9a4e065d6e97a41c2ed0432b2989bec3ceb518717e51035cb422aae2236d964fe731942196394b19cd96b03d7cefda55d2e19c11972a3ec62b1980cb4f52ea9ffaf4daeb81ff3144fe77087e14ea87f8b039632af79117181f05008628512684b92a1ddffe861db253860ca649aa76c1d53b22b69723eb0eefa85df2824dcc45fb651507ddb1778a273686aa59ca219442461cbd581473ab6", 0xffffffb5) [ 1007.389513] FAULT_INJECTION: forcing a failure. [ 1007.389513] name failslab, interval 1, probability 0, space 0, times 0 10:09:37 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) prctl$setptracer(0x59616d61, r0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7fff, 0x101900) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000200)={0x79, 0x0, [0x6, 0x8f, 0x0, 0xbb]}) sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r2, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x8800) 10:09:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0xf00, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:37 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x201381c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1007.487961] CPU: 1 PID: 11784 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1007.496527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1007.496535] Call Trace: [ 1007.496560] dump_stack+0x1d3/0x2c4 [ 1007.496585] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1007.496609] ? __kernel_text_address+0xd/0x40 [ 1007.508565] ? unwind_get_return_address+0x61/0xa0 [ 1007.508589] should_fail.cold.4+0xa/0x17 [ 1007.508610] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1007.508631] ? save_stack+0xa9/0xd0 [ 1007.508649] ? graph_lock+0x170/0x170 [ 1007.508662] ? save_stack+0x43/0xd0 [ 1007.508679] ? kasan_kmalloc+0xc7/0xe0 [ 1007.517516] ? kmem_cache_alloc_trace+0x152/0x750 [ 1007.517532] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1007.517547] ? setkey+0x21f/0x410 [ 1007.517565] ? graph_lock+0x170/0x170 [ 1007.517580] ? __sys_setsockopt+0x1ba/0x3c0 [ 1007.517595] ? __x64_sys_setsockopt+0xbe/0x150 [ 1007.517611] ? do_syscall_64+0x1b9/0x820 [ 1007.517632] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1007.527078] ? find_held_lock+0x36/0x1c0 [ 1007.527100] ? __lock_is_held+0xb5/0x140 [ 1007.527132] ? ttwu_stat+0x5c0/0x5c0 [ 1007.527170] __should_failslab+0x124/0x180 [ 1007.536323] should_failslab+0x9/0x14 [ 1007.536338] kmem_cache_alloc_trace+0x2d7/0x750 [ 1007.536382] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1007.536403] ? skcipher_setkey+0x1ab/0x2e0 [ 1007.536425] setkey+0x21f/0x410 [ 1007.543852] ? crypt_done+0xa0/0xa0 [ 1007.543880] skcipher_setkey+0x163/0x2e0 [ 1007.543902] skcipher_setkey+0x3f/0x50 [ 1007.543931] ? hash_accept_nokey+0x90/0x90 [ 1007.611085] alg_setsockopt+0x306/0x3b0 [ 1007.611109] __sys_setsockopt+0x1ba/0x3c0 [ 1007.611126] ? kernel_accept+0x310/0x310 [ 1007.619864] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1007.619884] ? trace_hardirqs_on+0xbd/0x310 [ 1007.619903] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1007.619927] ? trace_hardirqs_off_caller+0x300/0x300 [ 1007.619948] __x64_sys_setsockopt+0xbe/0x150 [ 1007.665476] do_syscall_64+0x1b9/0x820 [ 1007.665494] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1007.665513] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1007.675024] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1007.675043] ? trace_hardirqs_off+0x310/0x310 [ 1007.675060] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1007.675078] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1007.708712] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1007.713571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1007.713583] RIP: 0033:0x457579 10:09:37 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4080, 0x0) fcntl$dupfd(r0, 0x0, r0) 10:09:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000211, 0x7ffffffff000) 10:09:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) [ 1007.713602] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1007.740859] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1007.748582] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1007.755860] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1007.763137] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1007.770424] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1007.777749] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:37 executing program 2 (fault-call:4 fault-nth:9): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:37 executing program 1: socketpair(0x2, 0x3, 0x3, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0], 0x2}) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) socket$xdp(0x2c, 0x3, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x45) 10:09:38 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x100, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040)=0xbea, 0x4) ioctl$RTC_VL_CLR(r0, 0x7014) kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x3d, 0x0) 10:09:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0xf, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1007.969099] FAULT_INJECTION: forcing a failure. [ 1007.969099] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1007.981008] CPU: 1 PID: 11829 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1007.989528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1007.998886] Call Trace: [ 1008.001505] dump_stack+0x1d3/0x2c4 [ 1008.005155] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1008.010381] ? print_usage_bug+0xc0/0xc0 [ 1008.014480] should_fail.cold.4+0xa/0x17 [ 1008.018735] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1008.023854] ? is_bpf_text_address+0xac/0x170 [ 1008.028375] ? check_preemption_disabled+0x48/0x200 [ 1008.033415] ? mark_held_locks+0x130/0x130 [ 1008.037664] ? rcu_softirq_qs+0x20/0x20 [ 1008.041650] ? rcu_softirq_qs+0x20/0x20 [ 1008.045636] ? unwind_dump+0x190/0x190 [ 1008.049546] ? is_bpf_text_address+0xd3/0x170 [ 1008.054056] ? kernel_text_address+0x79/0xf0 [ 1008.058481] ? unwind_get_return_address+0x61/0xa0 [ 1008.063427] ? __save_stack_trace+0x8d/0xf0 [ 1008.067765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1008.073309] ? should_fail+0x22d/0xd01 [ 1008.077212] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1008.082366] __alloc_pages_nodemask+0x34b/0xdd0 [ 1008.087046] ? save_stack+0x43/0xd0 [ 1008.090695] ? kasan_kmalloc+0xc7/0xe0 [ 1008.094622] ? kmem_cache_alloc_trace+0x152/0x750 [ 1008.099478] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1008.104182] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1008.109211] ? do_syscall_64+0x1b9/0x820 [ 1008.113294] ? find_held_lock+0x36/0x1c0 [ 1008.117390] ? trace_hardirqs_off+0xb8/0x310 [ 1008.121842] cache_grow_begin+0x91/0x8c0 [ 1008.125944] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1008.131497] ? check_preemption_disabled+0x48/0x200 [ 1008.136546] kmem_cache_alloc_trace+0x67e/0x750 [ 1008.141246] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1008.145757] ? skcipher_setkey+0x1ab/0x2e0 [ 1008.150006] setkey+0x21f/0x410 [ 1008.153308] ? crypt_done+0xa0/0xa0 [ 1008.156961] skcipher_setkey+0x163/0x2e0 [ 1008.161041] skcipher_setkey+0x3f/0x50 [ 1008.164948] ? hash_accept_nokey+0x90/0x90 [ 1008.169219] alg_setsockopt+0x306/0x3b0 [ 1008.173216] __sys_setsockopt+0x1ba/0x3c0 [ 1008.177417] ? kernel_accept+0x310/0x310 [ 1008.181500] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1008.186098] ? trace_hardirqs_on+0xbd/0x310 [ 1008.190438] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1008.195832] ? trace_hardirqs_off_caller+0x300/0x300 [ 1008.200965] __x64_sys_setsockopt+0xbe/0x150 [ 1008.205391] do_syscall_64+0x1b9/0x820 [ 1008.209292] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1008.214686] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1008.219628] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1008.224503] ? trace_hardirqs_off+0x310/0x310 [ 1008.229024] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1008.234057] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1008.239093] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1008.243963] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1008.249158] RIP: 0033:0x457579 10:09:38 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x203a61c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001ee, 0x7ffffffff000) 10:09:38 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x200261c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:38 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) 10:09:38 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc071362000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:38 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) 10:09:38 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0a12b2000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1008.252377] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1008.271281] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1008.279003] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1008.286277] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1008.293553] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1008.300830] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1008.308104] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(twofish-generic)\x00'}, 0xfffffffffffffce3) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b0", 0x4) 10:09:38 executing program 2 (fault-call:4 fault-nth:10): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000111, 0x7ffffffff000) 10:09:38 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000000040)='%keyringmime_typeuser\x00'}, 0x30) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x301400, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000100)={{0x32, @remote, 0x4e20, 0x2, 'dh\x00', 0x18, 0x4, 0x34}, {@remote, 0x4e23, 0x12003, 0x3, 0x1f, 0x7}}, 0x44) ptrace(0x11, r0) kexec_load(0x3, 0x25b, &(0x7f0000000040), 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast1}}, &(0x7f00000004c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0}, &(0x7f0000000540)=0xc) r8 = geteuid() fstat(r1, &(0x7f0000001cc0)) write$P9_RGETLOCK(r1, &(0x7f0000002100)={0x1f, 0x37, 0x2, {0x0, 0x8, 0x535, r6, 0x1, '+'}}, 0x1f) sendmsg$nl_route_sched(r2, &(0x7f00000020c0)={&(0x7f0000001d40)={0x10, 0x0, 0x0, 0x80004004}, 0xc, &(0x7f0000002080)={&(0x7f0000001d80)=@gettaction={0x2dc, 0x32, 0x4, 0x70bd2b, 0x25dfdbff, {0x0, 0x4, 0xffffffffffff0000}, [@action_gd=@TCA_ACT_TAB={0x6c, 0x1, [{0x10, 0xe, @TCA_ACT_INDEX={0x8}}, {0x10, 0x9, @TCA_ACT_INDEX={0x8, 0x3, 0xd8ad}}, {0x14, 0x19, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}, {0x10, 0x5, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0xd, @TCA_ACT_INDEX={0x8, 0x3, 0x6407bb87}}, {0x14, 0xf, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x10, 0x17, @TCA_ACT_INDEX={0x8, 0x3, 0x159}}, {0x14, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}]}, @action_gd=@TCA_ACT_TAB={0x74, 0x1, [{0x10, 0x5, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x2, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x14, 0xb, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x18, 0x1b, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x14, 0x1e, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x10, 0x20, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}]}, @action_gd=@TCA_ACT_TAB={0x54, 0x1, [{0x10, 0xc, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x11, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x10, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x7}, @action_gd=@TCA_ACT_TAB={0xa8, 0x1, [{0x10, 0x1b, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}, {0x10, 0xb, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x9, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x14, 0x6, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x18, 0x1d, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}, {0x10, 0x9, @TCA_ACT_INDEX={0x8, 0x3, 0x80}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}, {0x14, 0x6, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0xe, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x6c, 0x1, [{0x18, 0x19, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}, {0x14, 0x16, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x14, 0x17, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}, {0x14, 0xe, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x1b, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x38, 0x1, [{0x10, 0x1d, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x14, 0x1e, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}, {0x10, 0x13, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x40000}]}, 0x2dc}}, 0x24000000) stat(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r2, &(0x7f0000001c80)={&(0x7f0000000180)=@proc={0x10, 0x0, 0x25dfdbfc, 0x20}, 0xc, &(0x7f0000001b00)=[{&(0x7f0000000580)={0x1580, 0x16, 0x0, 0x70bd2a, 0x25dfdbfe, "", [@typed={0x8, 0x26, @pid=r0}, @typed={0x8, 0x89, @uid=r3}, @generic="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", @typed={0x4, 0x61}, @nested={0x108, 0x12, [@typed={0x8, 0x10, @fd=r2}, @generic="d2c6ec887e2018bf54d3a6cafb21c1583cb146e02376ff5af32b28cebfcbb5ea9b7aadf99ba9126c02bbd87839164fcae09ccc8e883165419952eda5748e45d22e8f6182b9fe87a8c3865b8bb2d29cea7de7c7b894d96f694f76802912ad77be43af8bd2a8819901b9506e7eaa6bb561eed8f107f746df1ab0acab967921b2cbdabb786b8b50ea3f0c15c3a63133ae9611ba0975ddcf8b8cbc83a2fbc474b04124f33847a31ec886e8508f0053eb1c4a8c1a926ce5cda7aec6fcfb54278642a2e76b24dab5dd5381019aa9eb67fa36fc9d020561777885b768da4fcae7512fa706078b109c2ff358d29e31169e0779", @generic="c078dc028201996ccb86"]}, @nested={0x328, 0x18, [@typed={0x14, 0x11, @ipv6=@mcast2}, @typed={0x8, 0x70, @u32=0xed9e}, @generic="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", @generic="c6566453dcfd47fd42bc34ab46d9756167324b6efec56b5945dc1e065057ee88bcba2a837b5094647901700edafb4e00d62b0eeabe5118e5b236c6bd76b412539c2ea4d6cd1e60c986aa2ccafb9e6cecdc7c778af47cd4c2a3cb11230aa86f6f9f0c200c7b0d31ed1c4e99c315d8990577428a5987797a546f4a719c8b008bc366f95c35be84d53c712d83febfb167eef42d2c0b26b48afa1fc19a25100fa0e066b8aa05df8edd72508bfbc6fc1a89f8407a97e61c0e90cd5cd92bddf085192b50692402a9bf73ecde93", @typed={0xd4, 0x36, @binary="81852f7f4eafa7c95af705f850265ac81ad406d071b560bd6b9da5eaeec221b345deb9ea2ac9076bd65876e71211f4e3f4361f44275add8673deed26423edc1cbcb74d11e594ecdcb24e6486fe9725a3409df782f74c55d6ef5b186665be3c2c1ce71c1b5a34e980f871f3abc9b76ef4bbf4f9546e34613ef4670b259f6a9e0bc6ab625f2dd22676905bed26e82f60f37121de65e1d42316a171476773bb75d72adcd7ae38785c7803e783b6ba944ccb1048adbffa3dee5fc1571e994f7d72a8efbd0f5ea6e3ec6f24cb6b6c65252f7c"}, @typed={0x8, 0x57, @ipv4=@rand_addr=0x8}, @typed={0x8, 0x8b, @uid=r4}, @typed={0xc, 0x1a, @u64=0xff}, @generic="9143a2b57c07de67b53c08534c97370f792616d7c4a1555ce7d9a2bb2e82987bc171633cdfd10c961d8f22d5ae9d923ae28022a6f8fb7d3f1dcf8e8504dea9404088096dc9efa963fb6c1840c9a91b10bbc2"]}, @nested={0x7c, 0x38, [@typed={0x4, 0x1c}, @typed={0x8, 0x30, @u32=0x1000}, @typed={0x8, 0x5c, @uid=r5}, @typed={0xc, 0x3d, @u64=0x5}, @typed={0x8, 0x2, @uid=r7}, @generic="879608d2ade80e90b847e9dcb024f98cdc3b55687c3a7056f6b4100e13ac0b8f428e62560dd5102d787fdea7b2ef37ed2079976ac2c39c92f3980d5d1324a65196effb56f095091bd42e822acaaee6"]}, @generic="043cdb8d177f471bf5b3582b261481c9b2119dc1bcdf5427543aa24a9029481e4b8e19cf5626c26ef846d8575c0627c113b0bba8d47e813a8082558664d9bf8e38b13724e6af5b4b927209e47d21e02d77262896768e5753d0011d81fca29c1529e78efb2f47ece139410d9f408b58dcb3d77e7e1c14e0741159207a32571f8e39083e30bcb38cbbeb7ed7ddfdb05f737196d6cace86f65ec35eca5ad844db9c8499287ea867feb11250be39ff167e9c"]}, 0x1580}], 0x1, &(0x7f0000001c00)=[@rights={0x20, 0x1, 0x1, [r1, r2, r2]}, @cred={0x20, 0x1, 0x2, r0, r8, r9}, @rights={0x18, 0x1, 0x1, [r1, r2]}], 0x58, 0x4080}, 0x40000) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:38 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0d10e20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0xffffff7f00000000, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0xfffffffffffffd59) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:38 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0110820, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0xf00000000000000, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:38 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f00000000c0)=""/156) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000040)={r0, 0x0, 0x9, 0x1959, 0x3}) lseek(r0, 0x0, 0x1) 10:09:38 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2030e1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) socketpair$inet6(0xa, 0x6, 0x7, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x2, [0x0, 0x0]}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={r2, 0x4}, &(0x7f0000000240)=0x8) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384\x00'}, 0x58) ioctl$UI_DEV_CREATE(r0, 0x5501) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000b8, 0x7ffffffff000) [ 1008.944618] FAULT_INJECTION: forcing a failure. [ 1008.944618] name failslab, interval 1, probability 0, space 0, times 0 [ 1008.956687] CPU: 0 PID: 11920 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1008.965210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1008.974568] Call Trace: [ 1008.977178] dump_stack+0x1d3/0x2c4 [ 1008.980828] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1008.986033] ? __kernel_text_address+0xd/0x40 [ 1008.990537] ? unwind_get_return_address+0x61/0xa0 [ 1008.995484] should_fail.cold.4+0xa/0x17 [ 1008.999575] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1009.004698] ? save_stack+0xa9/0xd0 [ 1009.008335] ? graph_lock+0x170/0x170 [ 1009.012148] ? save_stack+0x43/0xd0 [ 1009.015797] ? kasan_kmalloc+0xc7/0xe0 [ 1009.019694] ? kmem_cache_alloc_trace+0x152/0x750 [ 1009.024579] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1009.029252] ? setkey+0x21f/0x410 [ 1009.032696] ? graph_lock+0x170/0x170 [ 1009.036507] ? __sys_setsockopt+0x1ba/0x3c0 [ 1009.040822] ? __x64_sys_setsockopt+0xbe/0x150 [ 1009.045414] ? do_syscall_64+0x1b9/0x820 [ 1009.049468] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1009.054821] ? find_held_lock+0x36/0x1c0 [ 1009.058886] ? __lock_is_held+0xb5/0x140 [ 1009.062947] ? ttwu_stat+0x5c0/0x5c0 [ 1009.066670] __should_failslab+0x124/0x180 [ 1009.070904] should_failslab+0x9/0x14 [ 1009.074693] kmem_cache_alloc_trace+0x2d7/0x750 [ 1009.079356] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1009.083856] ? skcipher_setkey+0x1ab/0x2e0 [ 1009.088093] setkey+0x21f/0x410 [ 1009.091387] ? crypt_done+0xa0/0xa0 [ 1009.095027] skcipher_setkey+0x163/0x2e0 [ 1009.099080] skcipher_setkey+0x3f/0x50 [ 1009.102957] ? hash_accept_nokey+0x90/0x90 [ 1009.107195] alg_setsockopt+0x306/0x3b0 [ 1009.111181] __sys_setsockopt+0x1ba/0x3c0 [ 1009.115317] ? kernel_accept+0x310/0x310 [ 1009.119367] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1009.123953] ? trace_hardirqs_on+0xbd/0x310 [ 1009.128267] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1009.133619] ? trace_hardirqs_off_caller+0x300/0x300 [ 1009.138740] __x64_sys_setsockopt+0xbe/0x150 [ 1009.143187] do_syscall_64+0x1b9/0x820 [ 1009.147082] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1009.152435] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1009.157354] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1009.162204] ? trace_hardirqs_off+0x310/0x310 [ 1009.166711] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1009.171740] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1009.176754] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1009.181590] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1009.186774] RIP: 0033:0x457579 [ 1009.189961] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1009.208846] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1009.216557] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1009.223824] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1009.231127] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1009.238382] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 10:09:39 executing program 2 (fault-call:4 fault-nth:11): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0xf000000, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:39 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x203651c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:39 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) 10:09:39 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x3, 0x40) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000340)={0xffffffffffffff9c}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000380)={0x60002004}) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f00000003c0)) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) write$vnet(r2, &(0x7f00000002c0)={0x1, {&(0x7f0000000100)=""/69, 0x45, &(0x7f00000001c0)=""/219, 0x0, 0x4}}, 0x68) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) setsockopt$inet6_udp_int(r1, 0x11, 0x6f, &(0x7f0000000400)=0x40, 0x4) 10:09:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000113, 0x7ffffffff000) [ 1009.245638] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:39 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0c1182000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000200)='syz1\x00') ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000280)=@req={0x28, &(0x7f0000000240)={'ip6_vti0\x00', @ifru_flags=0x8901}}) syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x0, 0x0) fstat(r1, &(0x7f00000000c0)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-vsock\x00', 0x2, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x82002, 0x0) ioctl$KIOCSOUND(r2, 0x4b2f, 0xfffffffffffff801) write$sndseq(r2, &(0x7f00000003c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @control={0x0, 0x5}}], 0x30) dup2(r0, r2) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000500)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000540)={@ipv4={[], [], @local}, @local, @mcast2, 0x4, 0x2, 0x5, 0x500, 0x1, 0x0, r3}) write$tun(0xffffffffffffffff, &(0x7f0000000580)=ANY=[], 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000400)=""/83}, 0x18) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) [ 1009.409032] FAULT_INJECTION: forcing a failure. [ 1009.409032] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1009.420888] CPU: 1 PID: 11941 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1009.429394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.438751] Call Trace: [ 1009.441360] dump_stack+0x1d3/0x2c4 [ 1009.445009] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1009.450223] ? print_usage_bug+0xc0/0xc0 [ 1009.454313] should_fail.cold.4+0xa/0x17 [ 1009.458395] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1009.463518] ? is_bpf_text_address+0xac/0x170 [ 1009.468027] ? check_preemption_disabled+0x48/0x200 [ 1009.473067] ? mark_held_locks+0x130/0x130 [ 1009.477313] ? rcu_softirq_qs+0x20/0x20 [ 1009.481305] ? rcu_softirq_qs+0x20/0x20 [ 1009.485292] ? unwind_dump+0x190/0x190 [ 1009.489212] ? is_bpf_text_address+0xd3/0x170 [ 1009.493739] ? kernel_text_address+0x79/0xf0 [ 1009.498173] ? unwind_get_return_address+0x61/0xa0 [ 1009.503116] ? __save_stack_trace+0x8d/0xf0 [ 1009.507458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1009.513005] ? should_fail+0x22d/0xd01 [ 1009.516909] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1009.522049] __alloc_pages_nodemask+0x34b/0xdd0 [ 1009.526737] ? save_stack+0x43/0xd0 [ 1009.530374] ? kasan_kmalloc+0xc7/0xe0 [ 1009.534269] ? kmem_cache_alloc_trace+0x152/0x750 [ 1009.539120] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1009.543801] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1009.548833] ? do_syscall_64+0x1b9/0x820 [ 1009.552929] ? find_held_lock+0x36/0x1c0 [ 1009.557026] ? trace_hardirqs_off+0xb8/0x310 [ 1009.561456] cache_grow_begin+0x91/0x8c0 [ 1009.561476] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1009.561494] ? check_preemption_disabled+0x48/0x200 [ 1009.561514] kmem_cache_alloc_trace+0x67e/0x750 [ 1009.571121] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1009.571143] ? skcipher_setkey+0x1ab/0x2e0 [ 1009.571176] setkey+0x21f/0x410 [ 1009.571199] ? crypt_done+0xa0/0xa0 [ 1009.580875] skcipher_setkey+0x163/0x2e0 [ 1009.580901] skcipher_setkey+0x3f/0x50 [ 1009.589624] ? hash_accept_nokey+0x90/0x90 [ 1009.589638] alg_setsockopt+0x306/0x3b0 [ 1009.589661] __sys_setsockopt+0x1ba/0x3c0 [ 1009.589688] ? kernel_accept+0x310/0x310 [ 1009.589713] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1009.596610] ? trace_hardirqs_on+0xbd/0x310 [ 1009.596631] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1009.596649] ? trace_hardirqs_off_caller+0x300/0x300 [ 1009.596671] __x64_sys_setsockopt+0xbe/0x150 [ 1009.604604] do_syscall_64+0x1b9/0x820 [ 1009.604621] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1009.604640] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1009.604659] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1009.663769] ? trace_hardirqs_off+0x310/0x310 [ 1009.668288] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1009.673325] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1009.678369] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1009.683240] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1009.688440] RIP: 0033:0x457579 [ 1009.691644] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:09:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x34000, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:39 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000025c0)={&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002480), 0x0, &(0x7f00000024c0)=""/206, 0xce}, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000400)={0x3f, 0x8}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f00000017c0), 0x1fe, 0xf0ff7f00000000) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x3) setsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f0000000380)={@multicast1, @loopback}, 0x8) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000003c0), 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@remote}}, &(0x7f0000000180)=0xe8) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={@dev={0xfe, 0x80, [], 0x20}, @local, @empty, 0xc97, 0x4, 0x80, 0x400, 0x8, 0x40000100, r3}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)=0x7fffffff) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r2, &(0x7f0000000040)='./file0\x00', r4, r5, 0x800) 10:09:39 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0313820, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000206, 0x7ffffffff000) [ 1009.710550] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1009.718268] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1009.725573] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1009.732851] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1009.740132] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1009.747448] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:39 executing program 2 (fault-call:4 fault-nth:12): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:39 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0a11620, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x300000000000000, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:39 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x2, 0x0) 10:09:39 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="22cc", 0xfffffffffffffef2) 10:09:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001d7, 0x7ffffffff000) 10:09:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x400300, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:40 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x201151c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1009.978683] FAULT_INJECTION: forcing a failure. [ 1009.978683] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1009.990560] CPU: 0 PID: 11982 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1009.999063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1010.008431] Call Trace: [ 1010.011042] dump_stack+0x1d3/0x2c4 [ 1010.014683] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1010.019884] ? print_usage_bug+0xc0/0xc0 [ 1010.024000] should_fail.cold.4+0xa/0x17 [ 1010.028069] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1010.033203] ? is_bpf_text_address+0xac/0x170 [ 1010.037705] ? check_preemption_disabled+0x48/0x200 [ 1010.042734] ? mark_held_locks+0x130/0x130 [ 1010.046970] ? rcu_softirq_qs+0x20/0x20 [ 1010.050951] ? rcu_softirq_qs+0x20/0x20 [ 1010.054924] ? unwind_dump+0x190/0x190 [ 1010.058822] ? is_bpf_text_address+0xd3/0x170 [ 1010.063325] ? kernel_text_address+0x79/0xf0 [ 1010.067744] ? unwind_get_return_address+0x61/0xa0 [ 1010.072679] ? __save_stack_trace+0x8d/0xf0 [ 1010.077006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1010.082545] ? should_fail+0x22d/0xd01 [ 1010.086448] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1010.091565] __alloc_pages_nodemask+0x34b/0xdd0 [ 1010.096236] ? save_stack+0x43/0xd0 [ 1010.099864] ? kasan_kmalloc+0xc7/0xe0 [ 1010.103758] ? kmem_cache_alloc_trace+0x152/0x750 [ 1010.108602] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1010.113280] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1010.118299] ? do_syscall_64+0x1b9/0x820 [ 1010.122372] ? find_held_lock+0x36/0x1c0 [ 1010.126466] ? trace_hardirqs_off+0xb8/0x310 [ 1010.130884] cache_grow_begin+0x91/0x8c0 [ 1010.134950] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1010.140494] ? check_preemption_disabled+0x48/0x200 [ 1010.145517] kmem_cache_alloc_trace+0x67e/0x750 [ 1010.150207] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1010.154709] ? skcipher_setkey+0x1ab/0x2e0 [ 1010.158969] setkey+0x21f/0x410 [ 1010.162263] ? crypt_done+0xa0/0xa0 [ 1010.165902] skcipher_setkey+0x163/0x2e0 [ 1010.169980] skcipher_setkey+0x3f/0x50 [ 1010.173878] ? hash_accept_nokey+0x90/0x90 [ 1010.178114] alg_setsockopt+0x306/0x3b0 [ 1010.182098] __sys_setsockopt+0x1ba/0x3c0 [ 1010.186253] ? kernel_accept+0x310/0x310 [ 1010.190323] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1010.194914] ? trace_hardirqs_on+0xbd/0x310 [ 1010.199241] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1010.204612] ? trace_hardirqs_off_caller+0x300/0x300 [ 1010.209723] __x64_sys_setsockopt+0xbe/0x150 [ 1010.214140] do_syscall_64+0x1b9/0x820 [ 1010.218039] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1010.223406] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1010.228347] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1010.233206] ? trace_hardirqs_off+0x310/0x310 [ 1010.237704] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1010.242739] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1010.247766] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1010.252618] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1010.257805] RIP: 0033:0x457579 [ 1010.260999] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1010.279912] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1010.287625] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1010.294936] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1010.302222] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1010.309509] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1010.316778] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:40 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000040)={0xffffffff, 0x8}) [ 1010.333638] attempt to access beyond end of device 10:09:40 executing program 5: kexec_load(0x0, 0x2b, &(0x7f0000000040), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x4, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x200000, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000080)={{0x3, 0xc567}, 0x20}, 0x10) [ 1010.361632] loop5: rw=1048577, want=37089, limit=112 [ 1010.380292] attempt to access beyond end of device [ 1010.385248] loop5: rw=1, want=37185, limit=112 10:09:40 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x200791c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:40 executing program 1: socketpair(0x5, 0x0, 0x89, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000100)={0x3, &(0x7f0000000040)=[{0x0, 0x8}, {0x7, 0x7}, {0x52, 0xbb17}]}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0xff48) 10:09:40 executing program 2 (fault-call:4 fault-nth:13): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x3000000, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000021b, 0x7ffffffff000) 10:09:40 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2005e1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:40 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x4e21, @rand_addr=0x7}, {0x6, @remote}, 0x0, {0x2, 0x4e20, @remote}, 'ip6gretap0\x00'}) 10:09:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x80000000, 0x210000) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000040)=""/29) 10:09:40 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x300, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:40 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000440)='/dev/audio\x00', 0x40000, 0x0) ioctl$TIOCCBRK(r1, 0x5428) write$binfmt_aout(r0, &(0x7f0000000040)={{0x1cf, 0x1, 0x8, 0x1aa, 0x2d2, 0x9, 0x1e, 0x1}, "8412e2fbb26c65ecf4c667f44f06e18a4a8d89f8acc4df4ff701de1f98b9eec54d4d3450042233533337902da42932eab7e9c8f4efdb9fb9bbb477429abafb6c5183a0815fd7e445d2d72bc676843624778c1b57ac26bb9678c0e6b5602d0c737be38ef6a9b18a021f04f30a5dc91295ddbf7c0365f667cb52e384acbd75a15c9363e7381e45675ff58f0a6e364a261a1bb533c41b6255e0bb27d0efeb0c091ed04a32aef0248506a5a1", [[], [], []]}, 0x3ca) 10:09:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000200)={0x0, 0x7fffffff}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000280)={r2, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x8001}, &(0x7f0000000340)=0x90) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000040)={r0}) 10:09:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000150, 0x7ffffffff000) 10:09:40 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0111a2000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:40 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x10000000080) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000080)={0x0, 0x1, 0x9, 0x7, 0x8}, 0xc) kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) [ 1010.805318] FAULT_INJECTION: forcing a failure. [ 1010.805318] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1010.817218] CPU: 0 PID: 12046 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1010.825717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1010.835072] Call Trace: [ 1010.837679] dump_stack+0x1d3/0x2c4 [ 1010.841333] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1010.846547] ? print_usage_bug+0xc0/0xc0 [ 1010.850637] should_fail.cold.4+0xa/0x17 [ 1010.854719] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1010.859941] ? is_bpf_text_address+0xac/0x170 [ 1010.863549] QAT: Invalid ioctl [ 1010.864458] ? check_preemption_disabled+0x48/0x200 [ 1010.864486] ? mark_held_locks+0x130/0x130 [ 1010.864501] ? rcu_softirq_qs+0x20/0x20 [ 1010.864520] ? rcu_softirq_qs+0x20/0x20 [ 1010.884873] ? unwind_dump+0x190/0x190 [ 1010.888799] ? is_bpf_text_address+0xd3/0x170 [ 1010.893331] ? kernel_text_address+0x79/0xf0 [ 1010.897755] ? unwind_get_return_address+0x61/0xa0 [ 1010.902702] ? __save_stack_trace+0x8d/0xf0 [ 1010.907042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1010.912591] ? should_fail+0x22d/0xd01 [ 1010.916493] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1010.921625] __alloc_pages_nodemask+0x34b/0xdd0 [ 1010.926320] ? save_stack+0x43/0xd0 [ 1010.929974] ? kasan_kmalloc+0xc7/0xe0 [ 1010.933868] ? kmem_cache_alloc_trace+0x152/0x750 [ 1010.938728] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1010.943416] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1010.948467] ? do_syscall_64+0x1b9/0x820 [ 1010.952551] ? find_held_lock+0x36/0x1c0 [ 1010.956678] ? trace_hardirqs_off+0xb8/0x310 [ 1010.961105] cache_grow_begin+0x91/0x8c0 [ 1010.965181] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1010.970731] ? check_preemption_disabled+0x48/0x200 [ 1010.970753] kmem_cache_alloc_trace+0x67e/0x750 [ 1010.970782] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1010.970804] ? skcipher_setkey+0x1ab/0x2e0 [ 1010.970824] setkey+0x21f/0x410 [ 1010.992478] ? crypt_done+0xa0/0xa0 [ 1010.992508] skcipher_setkey+0x163/0x2e0 [ 1010.992533] skcipher_setkey+0x3f/0x50 [ 1011.004095] ? hash_accept_nokey+0x90/0x90 [ 1011.008344] alg_setsockopt+0x306/0x3b0 [ 1011.012335] __sys_setsockopt+0x1ba/0x3c0 [ 1011.016495] ? kernel_accept+0x310/0x310 [ 1011.020574] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1011.025176] ? trace_hardirqs_on+0xbd/0x310 [ 1011.029515] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1011.034894] ? trace_hardirqs_off_caller+0x300/0x300 [ 1011.040018] __x64_sys_setsockopt+0xbe/0x150 [ 1011.040041] do_syscall_64+0x1b9/0x820 [ 1011.040060] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1011.048342] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1011.048358] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1011.048376] ? trace_hardirqs_off+0x310/0x310 [ 1011.048394] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1011.048412] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1011.048444] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1011.078042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1011.088046] RIP: 0033:0x457579 10:09:41 executing program 2 (fault-call:4 fault-nth:14): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:41 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0xfff) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000300)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x4, {0xa, 0x4e21, 0x7fff, @dev={0xfe, 0x80, [], 0xa}, 0x5}, r1}}, 0x38) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80000, 0x0) getpeername$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @remote}, &(0x7f0000000140)=0xc) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) bind$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000340)={0x3, 0x0, 0x79b}) getpeername$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000100)=0x10) 10:09:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0xffffff7f00000000, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000002a3, 0x7ffffffff000) 10:09:41 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc091292000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1011.088064] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1011.088073] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1011.088090] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1011.088099] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1011.088108] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1011.088117] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1011.088126] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0xcc3f030000000000, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000012f, 0x7ffffffff000) 10:09:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = memfd_create(&(0x7f0000000000)='rfc4106-gcm-aesni\x00', 0x2) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000040)={0xffffff8b, &(0x7f00000001c0)="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"}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000140)=0x0) sendmsg$nl_netfilter(r1, &(0x7f0000001300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000012c0)={&(0x7f0000001340)=ANY=[@ANYBLOB="d0000000110014062cbd7000fbdbe18cd17e069a6cabc8ef72084e0a977b6a09e6edf24435ba4fe93cb8b60b42d2e89403c470bdb72fba1cab6fa1cd9e0570a7da9244365c1b6d6aa0225a726db20100115d34eb609aad64004800080000ac1414aa08001300e0000002eb631be2b54dfc83a79f6edf02de1a74bb61daca409a27e238dcf36028e409a6940a582eec42646709089b4b41c7710b00120004000000518b82e2bc0bffd536ce4e14a9c892", @ANYRES32=r0, @ANYBLOB="0c006a0043ea00000000000008003900010000000008006d00", @ANYRES32=r2], 0xd0}, 0x1, 0x0, 0x0, 0x801}, 0x20000010) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:41 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) mount$9p_rdma(&(0x7f0000000140)='127.0.0.1\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x50000, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r1 = request_key(&(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000100)='/dev/nullb0\x00', 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) 10:09:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0xffffff7f, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:41 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0c13d2000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:41 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000500)=0x0) getpgid(r1) r2 = syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0x6, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x40000, 0x0) readlink(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)=""/252, 0xfc) r4 = gettid() ptrace$setregs(0xf, r4, 0x6, &(0x7f0000000280)="ff5764b3917d69d4e649cc64984611fcf703a9e74c19efa3fcf3352b383d168ac6ac89c7941b87372d23992cd98756c0c0a227b5eb1faba1754845b69aa10d4f8af99114821a607745a8dc45663a1d742af3980386377344c0a7195a2047f66b3fa41bfa46e5aa1ea0c12ea04ca1f63ba3b54bbe4a30efaaf5ce24b78f81cb98") ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f00000000c0)={0x0, r3, 0x7f, 0x4, 0x6, 0x1000}) ioctl(r3, 0x10001, &(0x7f0000000300)="ac902d4e4bb98dfd33ea5ae88882927976a0b97ec4f9187dfa64992f5bf5681c9ea855c94aa389a18306757f3d93c1efa6536a6d7cb444024c519155c0c7c7a6e56f556423049e2d7e5a5afb5834479eba8023c7d207d9016813a38899127f2935a83aa8911c29f4da272adcbb9429b040dc8ec2afa3bfcbfa47cab5b853526b9066b56bb0953592d6171264d6d97d00dd323dc4b18d6fd3b2cd1991a4fc0191ec9ac04dc5a03658d73fae9aa62bb9c498d5bfd77b05ff66bd0f2bf4cd5fa62d5b934b52d7e45a474affefaf92cb1dd08b64af1b7deb55d291c2189881ee") bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) fcntl$setownex(r0, 0xf, &(0x7f0000001dc0)={0x3, r1}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000400)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000480)={0x7, 0x8, 0xfa00, {r5, 0x5}}, 0x10) openat$cuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cuse\x00', 0x2, 0x0) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f00000007c0)={{&(0x7f0000000680)=""/252, 0xfc}, &(0x7f0000000780), 0x28}, 0x20) ioctl$KVM_ASSIGN_DEV_IRQ(r3, 0x4040ae70, &(0x7f0000000100)={0x32, 0x1, 0xdf, 0x4}) syz_mount_image$xfs(&(0x7f0000000840)='xfs\x00', &(0x7f0000000880)='./file0\x00', 0x4, 0x6, &(0x7f0000001c80)=[{&(0x7f00000008c0)="017fa1f92bdafecaa206a5f0370d23d1f8da899d9ced58304ec168ba1b40b3e620fa9e2b9690e205a034", 0x2a}, {&(0x7f0000000900)="228bc8aec6fa7f16cf299024d333e084d4e9c74dabf324c459bfd8fc203921b0bee09111eca69575051ca55453187020800acfd8a25e2d77eaf5438153489c06766348fec18262033ececb330049012ec898ba094022b46cfae52bb6ba44e54f2960b1f515", 0x65, 0xef6}, {&(0x7f0000000980)="0eb1165d65a52ec11eab803e5b35216fdd0355a578713f7698ff8fca7e5c30095e26480a6c3d344a8925bad77fd0a28a437481bf2ca22819ab1d9141ecccb69afc5144bc6508453e95d48b8d0f69a719cb1d88c00b68b48f90b4a9f2901b524306d875edb79ab6125a195f794650da1e2d4dd1334eeca1c5718875fb545b11c2ff7735e499f5219fcf09418c82ee478de8880d42b32fa3622fd6ddbba028195093404ab5a56a5a233057abb753d476f2ab7e1bb47d06ff469054bf7443acb56fb386d5f2f5e8c624965337596a05e08743d24e24607c9f60bf", 0xd9, 0x1f}, {&(0x7f0000000a80)="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", 0x1000, 0x48}, {&(0x7f0000001a80)="ccb5737fda722af2f4f17acffafbfc5fb279969968a4e43fbdf778e9e05af3a3413a09d2f5d6e0f578d9151f2636e3545a9a23b8f32aaba02c75383b973f50635240885aa524c1e7fad46ce353656a236e4ebf479e442d210da88d6fa291dd07668fe0a7e2f143c49e610849be3f59609b9a73dbe9f63336bd74ab3446df59b97cbf28952df39c9df9dd0aefd50e94bc427df53cf5c344ebf33509775e85088799233cfcaacabe00e83184ee5f3feef727d0939d13ec6819023f229aa3940c2cad69ac64c15a09a9aefc912a6e48bbd2ffd90a2de74861c5002cb0703af1856100e3", 0xe2, 0x1}, {&(0x7f0000001b80)="9fb177bb179edfa923279665a54db5d153d1f5f71e5f9ad418f166f279d234e4d2260263e279ed829505eaa29895a1e71d2e7061e8027d2979bed3105d1a11c83dee9cfa87432c913a7f8daa86ba433c67b1261ac2f52efc4065d167c5593fbcabd54b9aeccb2c23d432c7b5ef178bb642eaa1568a73f0e25a217def39c9058f65052af80d464de854cc26ec3a301415da16d76eb6468f07e739fed09e5652552500c2b445086078ed449441541fad12308cbe1871823f809e2640a73177bd773d6ac0716091292bb28c404aa44aa14bea2434c6d7ab8d876ed9f80aad3bd7564add58", 0xe3}], 0x5a419eb89bf603f1, &(0x7f0000001d40)={[{@uquota='uquota'}]}) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f0000000200)={0x2c, @empty, 0x4e23, 0x2, 'ovf\x00', 0x15, 0x2, 0x3f}, 0x2c) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) getsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) socket$alg(0x26, 0x5, 0x0) [ 1011.534187] Unknown ioctl 21376 [ 1011.547135] Unknown ioctl -1071094257 [ 1011.555365] Unknown ioctl 65537 [ 1011.560011] Unknown ioctl 1077980784 [ 1011.563083] FAULT_INJECTION: forcing a failure. [ 1011.563083] name failslab, interval 1, probability 0, space 0, times 0 [ 1011.576223] CPU: 0 PID: 12111 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1011.584728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1011.594083] Call Trace: [ 1011.594108] dump_stack+0x1d3/0x2c4 [ 1011.594135] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1011.600334] ? __kernel_text_address+0xd/0x40 [ 1011.600353] ? unwind_get_return_address+0x61/0xa0 [ 1011.600377] should_fail.cold.4+0xa/0x17 [ 1011.600398] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1011.600431] ? save_stack+0xa9/0xd0 [ 1011.627861] ? graph_lock+0x170/0x170 [ 1011.631672] ? save_stack+0x43/0xd0 [ 1011.635313] ? kasan_kmalloc+0xc7/0xe0 [ 1011.639204] ? kmem_cache_alloc_trace+0x152/0x750 [ 1011.639221] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1011.639235] ? setkey+0x21f/0x410 [ 1011.639252] ? graph_lock+0x170/0x170 [ 1011.639268] ? __sys_setsockopt+0x1ba/0x3c0 [ 1011.639283] ? __x64_sys_setsockopt+0xbe/0x150 [ 1011.639303] ? do_syscall_64+0x1b9/0x820 [ 1011.669015] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1011.674400] ? find_held_lock+0x36/0x1c0 [ 1011.678485] ? __lock_is_held+0xb5/0x140 [ 1011.682577] ? ttwu_stat+0x5c0/0x5c0 [ 1011.686303] __should_failslab+0x124/0x180 [ 1011.690531] should_failslab+0x9/0x14 [ 1011.694318] kmem_cache_alloc_trace+0x2d7/0x750 [ 1011.698980] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1011.703489] ? skcipher_setkey+0x1ab/0x2e0 [ 1011.707714] setkey+0x21f/0x410 [ 1011.710982] ? crypt_done+0xa0/0xa0 [ 1011.714605] skcipher_setkey+0x163/0x2e0 [ 1011.718660] skcipher_setkey+0x3f/0x50 [ 1011.722537] ? hash_accept_nokey+0x90/0x90 [ 1011.726759] alg_setsockopt+0x306/0x3b0 [ 1011.730726] __sys_setsockopt+0x1ba/0x3c0 [ 1011.734867] ? kernel_accept+0x310/0x310 [ 1011.738918] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1011.743493] ? trace_hardirqs_on+0xbd/0x310 [ 1011.747819] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1011.753190] ? trace_hardirqs_off_caller+0x300/0x300 [ 1011.758289] __x64_sys_setsockopt+0xbe/0x150 [ 1011.762688] do_syscall_64+0x1b9/0x820 [ 1011.766588] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1011.771945] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1011.776906] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1011.781757] ? trace_hardirqs_off+0x310/0x310 [ 1011.786240] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1011.791244] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1011.796304] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1011.801153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1011.806337] RIP: 0033:0x457579 [ 1011.809520] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:09:41 executing program 2 (fault-call:4 fault-nth:15): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0xf00, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:41 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) 10:09:41 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0b12520, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000021e, 0x7ffffffff000) [ 1011.828405] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1011.836114] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1011.843407] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1011.850690] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1011.857959] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1011.865215] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 [ 1011.914989] Unknown ioctl 21376 [ 1011.919149] Unknown ioctl -1071094257 [ 1011.938767] Unknown ioctl 65537 [ 1011.958005] Unknown ioctl 1077980784 [ 1011.976746] FAULT_INJECTION: forcing a failure. [ 1011.976746] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1011.988588] CPU: 1 PID: 12129 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1011.997084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1012.006442] Call Trace: [ 1012.009076] dump_stack+0x1d3/0x2c4 [ 1012.012725] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1012.017938] ? print_usage_bug+0xc0/0xc0 [ 1012.022026] should_fail.cold.4+0xa/0x17 [ 1012.026120] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1012.031277] ? is_bpf_text_address+0xac/0x170 [ 1012.035791] ? check_preemption_disabled+0x48/0x200 [ 1012.040860] ? mark_held_locks+0x130/0x130 [ 1012.045135] ? rcu_softirq_qs+0x20/0x20 [ 1012.049160] ? rcu_softirq_qs+0x20/0x20 [ 1012.053193] ? unwind_dump+0x190/0x190 [ 1012.057103] ? is_bpf_text_address+0xd3/0x170 [ 1012.061615] ? kernel_text_address+0x79/0xf0 [ 1012.066039] ? unwind_get_return_address+0x61/0xa0 [ 1012.071002] ? __save_stack_trace+0x8d/0xf0 [ 1012.075354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1012.080902] ? should_fail+0x22d/0xd01 [ 1012.084819] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1012.089963] __alloc_pages_nodemask+0x34b/0xdd0 [ 1012.094646] ? save_stack+0x43/0xd0 [ 1012.098285] ? kasan_kmalloc+0xc7/0xe0 [ 1012.102194] ? kmem_cache_alloc_trace+0x152/0x750 [ 1012.107051] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1012.111748] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1012.116769] ? do_syscall_64+0x1b9/0x820 [ 1012.120906] ? find_held_lock+0x36/0x1c0 [ 1012.125031] ? trace_hardirqs_off+0xb8/0x310 [ 1012.129459] cache_grow_begin+0x91/0x8c0 [ 1012.133536] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1012.139120] ? check_preemption_disabled+0x48/0x200 [ 1012.144194] kmem_cache_alloc_trace+0x67e/0x750 [ 1012.148896] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1012.153420] ? skcipher_setkey+0x1ab/0x2e0 [ 1012.157678] setkey+0x21f/0x410 [ 1012.160973] ? crypt_done+0xa0/0xa0 [ 1012.164627] skcipher_setkey+0x163/0x2e0 [ 1012.168709] skcipher_setkey+0x3f/0x50 [ 1012.172621] ? hash_accept_nokey+0x90/0x90 [ 1012.176870] alg_setsockopt+0x306/0x3b0 [ 1012.180876] __sys_setsockopt+0x1ba/0x3c0 [ 1012.185040] ? kernel_accept+0x310/0x310 [ 1012.189122] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1012.193722] ? trace_hardirqs_on+0xbd/0x310 [ 1012.198077] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1012.203459] ? trace_hardirqs_off_caller+0x300/0x300 [ 1012.208577] __x64_sys_setsockopt+0xbe/0x150 [ 1012.213001] do_syscall_64+0x1b9/0x820 [ 1012.216902] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1012.222301] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1012.227244] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1012.232104] ? trace_hardirqs_off+0x310/0x310 [ 1012.236615] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1012.241647] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1012.246685] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1012.251548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1012.256746] RIP: 0033:0x457579 10:09:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) r1 = syz_open_dev$adsp(&(0x7f0000001e00)='/dev/adsp#\x00', 0x800, 0x4100) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000030c0)=0x0) r3 = gettid() getresuid(&(0x7f0000003180)=0x0, &(0x7f00000031c0), 0xfffffffffffffffe) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000800)={{0x3, 0x3, 0x3, 0x81, '\x00', 0xffffffff}, 0x1, [0x400, 0x1, 0x8, 0x80, 0x9, 0x6, 0x6, 0x0, 0x5, 0x800, 0x8001, 0xffffffff, 0x8, 0xfffffffffffffff7, 0x1, 0x1, 0x8, 0x6, 0x8, 0xd0a, 0x9, 0x2646, 0x3, 0x60d, 0x6, 0x0, 0x63f50a0a, 0x9866, 0x4, 0xb447, 0x9, 0x9, 0xeb, 0xffffffffffffff01, 0x0, 0x3, 0x4, 0xb7ae, 0xffffffffffff0d70, 0x2, 0x40, 0x5, 0x3, 0x3, 0x7, 0x6, 0x0, 0x7ff, 0x0, 0x4, 0x8, 0x1, 0xfffffffffffffffb, 0x0, 0x101, 0x4, 0x0, 0xfffffffffffffffe, 0x79b786ca, 0x100, 0x100, 0x7, 0x6, 0xe4, 0x38, 0x7ff, 0xffffffffffff8001, 0x1, 0x1ff, 0x40000000000, 0x5, 0x9, 0x100000000, 0x4, 0x5, 0xe2, 0x3ff, 0xfffffffffffffffb, 0x7, 0x100000000, 0x100000000, 0xfcc0, 0x9, 0x6, 0x80000000, 0x3, 0x3, 0x2, 0x7ff, 0x2, 0x1, 0xfff, 0x80, 0x9, 0x100, 0x1, 0xdf8f, 0x4, 0x0, 0xfffffffffffffff8, 0x4b, 0x7, 0xfffffffffffffff8, 0x10001, 0x3, 0x6, 0x8, 0x100, 0xad, 0xa7f, 0x4d9a, 0x8, 0x0, 0x3f, 0x7, 0x1, 0x3, 0x9, 0x7, 0x1, 0x3c6e, 0xfffffffffffffff8, 0x20000000000, 0x80000001, 0x200, 0x564, 0xb6, 0xffffffff]}) stat(&(0x7f0000003200)='./file0\x00', &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = accept4$unix(0xffffffffffffff9c, &(0x7f00000032c0), &(0x7f0000003340)=0x6e, 0x800) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)=@gettaction={0x164, 0x32, 0x400, 0x70bd2a, 0x25dfdbfd, {0x0, 0x400, 0x6}, [@action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x6}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x1000}, @action_gd=@TCA_ACT_TAB={0x74, 0x1, [{0x10, 0x10, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x18, 0x1d, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}, {0x10, 0x18, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x81}}, {0x18, 0x8, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x94, 0x1, [{0x10, 0x7, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x14, 0x11, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x14, 0x19, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x14, 0x1, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x14, 0x3, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x1d, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x16, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x2, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x1f}, @action_gd=@TCA_ACT_TAB={0x28, 0x1, [{0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x14, 0x1b, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x1}, 0x20040010) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) sendmsg$netlink(r1, &(0x7f0000000140)={&(0x7f0000001e40)=@proc={0x10, 0x0, 0x25dfdbfe, 0x100}, 0xc, &(0x7f0000003140)=[{&(0x7f0000001e80)={0x10, 0x2c, 0x602, 0x70bd2c, 0x25dfdbfd}, 0x10}, {&(0x7f0000003100)=ANY=[@ANYBLOB="240000002980000029bd7000ffdbdf2508004500", @ANYRES32=r2, @ANYBLOB='\f\x00K\x00aead\x00\x00\x00\x00'], 0x3}], 0x2, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="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", @ANYRES32=r0, @ANYRES32=r0, @ANYRESHEX, @ANYRES32=r0, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r6, @ANYRES32=r0, @ANYRES32=r0, @ANYRESOCT=r0], 0x18f, 0x800}, 0x0) 10:09:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001f1, 0x7ffffffff000) 10:09:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000540)={0x0}, &(0x7f0000000580)=0xc) timer_create(0x6, &(0x7f0000000500)={0x0, 0x3c, 0x2, @tid=r1}, &(0x7f0000000600)=0x0) timer_getoverrun(r2) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000000)) r3 = syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x22000) write$9p(r3, &(0x7f00000003c0)="7389a31862a66fb72c6b56a2d694dd2fbcb541e511a7462d6241f7407b3f44d51e265d3f4e164d9baa712bf63ab841e14cfcefd15e213160a2c1df3a11c222c5ca981bfbcc23126ce6", 0x49) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, &(0x7f0000000440)) 10:09:42 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x2, 0x40000) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x80000000040, 0x0) 10:09:42 executing program 2 (fault-call:4 fault-nth:16): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) [ 1012.259959] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1012.278862] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1012.278879] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1012.278888] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1012.278897] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1012.278907] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1012.278921] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:42 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x200031c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000028, 0x7ffffffff000) 10:09:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x200000000000000, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1012.389968] FAULT_INJECTION: forcing a failure. [ 1012.389968] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1012.401808] CPU: 1 PID: 12147 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1012.401818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1012.401825] Call Trace: [ 1012.401848] dump_stack+0x1d3/0x2c4 [ 1012.401899] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1012.401948] ? print_usage_bug+0xc0/0xc0 [ 1012.426005] should_fail.cold.4+0xa/0x17 [ 1012.426026] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1012.426045] ? is_bpf_text_address+0xac/0x170 [ 1012.426065] ? check_preemption_disabled+0x48/0x200 [ 1012.426090] ? mark_held_locks+0x130/0x130 [ 1012.426105] ? rcu_softirq_qs+0x20/0x20 [ 1012.426120] ? rcu_softirq_qs+0x20/0x20 [ 1012.426134] ? unwind_dump+0x190/0x190 [ 1012.426156] ? is_bpf_text_address+0xd3/0x170 [ 1012.474570] ? kernel_text_address+0x79/0xf0 [ 1012.474604] ? unwind_get_return_address+0x61/0xa0 [ 1012.474639] ? __save_stack_trace+0x8d/0xf0 10:09:42 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f00000000c0), &(0x7f0000000100)=0xc) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x420000, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) [ 1012.483964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1012.483981] ? should_fail+0x22d/0xd01 [ 1012.484001] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1012.502844] __alloc_pages_nodemask+0x34b/0xdd0 [ 1012.507533] ? save_stack+0x43/0xd0 [ 1012.511180] ? kasan_kmalloc+0xc7/0xe0 [ 1012.515098] ? kmem_cache_alloc_trace+0x152/0x750 [ 1012.519961] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1012.524647] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1012.529675] ? do_syscall_64+0x1b9/0x820 [ 1012.533765] ? find_held_lock+0x36/0x1c0 10:09:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000b6, 0x7ffffffff000) [ 1012.537864] ? trace_hardirqs_off+0xb8/0x310 [ 1012.542285] cache_grow_begin+0x91/0x8c0 [ 1012.546376] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1012.551952] ? check_preemption_disabled+0x48/0x200 [ 1012.556985] kmem_cache_alloc_trace+0x67e/0x750 [ 1012.561685] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1012.566205] ? skcipher_setkey+0x1ab/0x2e0 [ 1012.570461] setkey+0x21f/0x410 [ 1012.573765] ? crypt_done+0xa0/0xa0 [ 1012.577414] skcipher_setkey+0x163/0x2e0 [ 1012.577436] skcipher_setkey+0x3f/0x50 [ 1012.577454] ? hash_accept_nokey+0x90/0x90 [ 1012.585391] alg_setsockopt+0x306/0x3b0 [ 1012.593595] __sys_setsockopt+0x1ba/0x3c0 [ 1012.597761] ? kernel_accept+0x310/0x310 [ 1012.601841] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1012.606464] ? trace_hardirqs_on+0xbd/0x310 [ 1012.610800] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1012.616190] ? trace_hardirqs_off_caller+0x300/0x300 [ 1012.621339] __x64_sys_setsockopt+0xbe/0x150 [ 1012.625783] do_syscall_64+0x1b9/0x820 [ 1012.629683] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1012.635060] ? syscall_return_slowpath+0x5e0/0x5e0 10:09:42 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x402000, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000180)={0x200, @time, 0x80, {0x101, 0x2}, 0x44b, 0x2}) kexec_load(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000040), 0x0, 0x9, 0x800}], 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x401, 0x82) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) [ 1012.640004] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1012.644866] ? trace_hardirqs_off+0x310/0x310 [ 1012.649376] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1012.654402] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1012.659442] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1012.664308] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1012.669507] RIP: 0033:0x457579 [ 1012.672717] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:09:42 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0e11c2000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1012.691624] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1012.699338] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1012.699348] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1012.699358] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1012.699367] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1012.699376] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0xcc3f0300, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) sendto$inet(r0, &(0x7f0000000000)="d0d75828b09a639c1c9b0e45824b8590aa909804ba0f86e959e7a82a644cfeb20266dbcb19c135757001ab9f10998777275ed0a35a36637bbf1b69291d95102cbe97bc93b018d938266a4d0c1c81c8433dc81fd867c2f1d0db0107addd8e434267", 0x61, 0x4004084, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x4100, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f00000001c0)={{0x3ff, 0x8, 0xa8, 0x8, 0x5, 0x7}, 0x4}) 10:09:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000005f, 0x7ffffffff000) 10:09:42 executing program 2 (fault-call:4 fault-nth:17): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:43 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000040)=0x702) 10:09:43 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0d13a20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1012.949589] FAULT_INJECTION: forcing a failure. [ 1012.949589] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1012.961448] CPU: 1 PID: 12192 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1012.969956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1012.979317] Call Trace: [ 1012.981956] dump_stack+0x1d3/0x2c4 [ 1012.985614] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1012.990829] ? print_usage_bug+0xc0/0xc0 [ 1012.994963] should_fail.cold.4+0xa/0x17 10:09:43 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x203db1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1012.999052] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1013.004197] ? is_bpf_text_address+0xac/0x170 [ 1013.008713] ? check_preemption_disabled+0x48/0x200 [ 1013.013755] ? mark_held_locks+0x130/0x130 [ 1013.018001] ? rcu_softirq_qs+0x20/0x20 [ 1013.021984] ? rcu_softirq_qs+0x20/0x20 [ 1013.025966] ? unwind_dump+0x190/0x190 [ 1013.029891] ? is_bpf_text_address+0xd3/0x170 [ 1013.034411] ? kernel_text_address+0x79/0xf0 [ 1013.038840] ? unwind_get_return_address+0x61/0xa0 [ 1013.043784] ? __save_stack_trace+0x8d/0xf0 10:09:43 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x20000000040, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x6, 0x6, r1}) 10:09:43 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc061192000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1013.048124] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1013.053671] ? should_fail+0x22d/0xd01 [ 1013.057574] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1013.062706] __alloc_pages_nodemask+0x34b/0xdd0 [ 1013.067392] ? save_stack+0x43/0xd0 [ 1013.071029] ? kasan_kmalloc+0xc7/0xe0 [ 1013.074932] ? kmem_cache_alloc_trace+0x152/0x750 [ 1013.079789] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1013.084476] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1013.089508] ? do_syscall_64+0x1b9/0x820 [ 1013.093593] ? find_held_lock+0x36/0x1c0 10:09:43 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc071062000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1013.097693] ? trace_hardirqs_off+0xb8/0x310 [ 1013.102121] cache_grow_begin+0x91/0x8c0 [ 1013.106297] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1013.111854] ? check_preemption_disabled+0x48/0x200 [ 1013.116889] kmem_cache_alloc_trace+0x67e/0x750 [ 1013.121826] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1013.126336] ? skcipher_setkey+0x1ab/0x2e0 [ 1013.130590] setkey+0x21f/0x410 [ 1013.133896] ? crypt_done+0xa0/0xa0 [ 1013.137595] skcipher_setkey+0x163/0x2e0 [ 1013.141675] skcipher_setkey+0x3f/0x50 [ 1013.145576] ? hash_accept_nokey+0x90/0x90 10:09:43 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f0000000300)=0xe8) r2 = getgid() getgroups(0x5, &(0x7f0000000340)=[0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0x0]) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000380)={{}, {0x1, 0x2}, [{0x2, 0x1, r0}, {0x2, 0x1, r1}], {0x4, 0x1}, [{0x8, 0x2, r2}, {0x8, 0x2, r3}], {0x10, 0x1}, {0x20, 0x2}}, 0x44, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f00000049c0)=[{{0x0, 0x0, &(0x7f0000002680)=[{&(0x7f0000000400)=""/155, 0x9b}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f00000014c0)=""/74, 0x4a}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/86, 0x56}, {&(0x7f00000025c0)=""/157, 0x9d}], 0x6, &(0x7f0000002700)=""/98, 0x62, 0x1ff}, 0x3}, {{&(0x7f0000002780)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000002a80)=[{&(0x7f0000002800)=""/4, 0x4}, {&(0x7f0000002840)=""/208, 0xd0}, {&(0x7f0000002940)=""/165, 0xa5}, {&(0x7f0000002a00)=""/85, 0x55}], 0x4, &(0x7f0000002ac0)=""/222, 0xde, 0x1}, 0x1}, {{&(0x7f0000002bc0)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000002d40)=[{&(0x7f0000002c40)=""/214, 0xd6}], 0x1, &(0x7f0000002d80)=""/251, 0xfb, 0x80000000}, 0x10001}, {{&(0x7f0000002e80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f00000030c0)=[{&(0x7f0000002f00)=""/66, 0x42}, {&(0x7f0000002f80)=""/53, 0x35}, {&(0x7f0000002fc0)=""/206, 0xce}], 0x3, 0x0, 0x0, 0x100}, 0xa94c}, {{&(0x7f0000003100)=@l2, 0x80, &(0x7f0000003340)=[{&(0x7f0000003180)=""/239, 0xef}, {&(0x7f0000003280)=""/5, 0x5}, {&(0x7f00000032c0)=""/89, 0x59}], 0x3, &(0x7f0000003380)=""/243, 0xf3, 0x9}, 0x4e40}, {{0x0, 0x0, &(0x7f0000004880)=[{&(0x7f0000003480)=""/200, 0xc8}, {&(0x7f0000003580)=""/137, 0x89}, {&(0x7f0000003640)=""/159, 0x9f}, {&(0x7f0000003700)=""/4096, 0x1000}, {&(0x7f0000004700)=""/181, 0xb5}, {&(0x7f00000047c0)=""/164, 0xa4}], 0x6, &(0x7f0000004900)=""/160, 0xa0, 0xae7}, 0xffffffffffffc6fc}], 0x6, 0x22, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000004b40)={0x0, @in6={{0xa, 0x4e21, 0x1, @empty, 0x5}}, 0x4, 0x100000001, 0x8, 0xfffffffffffffffe, 0x3}, &(0x7f0000004c00)=0x98) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f0000004c40)={r5, 0x4}, 0x8) [ 1013.149820] alg_setsockopt+0x306/0x3b0 [ 1013.153814] __sys_setsockopt+0x1ba/0x3c0 [ 1013.157995] ? kernel_accept+0x310/0x310 [ 1013.162080] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1013.166680] ? trace_hardirqs_on+0xbd/0x310 [ 1013.171023] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1013.176400] ? trace_hardirqs_off_caller+0x300/0x300 [ 1013.181522] __x64_sys_setsockopt+0xbe/0x150 [ 1013.185972] do_syscall_64+0x1b9/0x820 [ 1013.189873] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1013.195256] ? syscall_return_slowpath+0x5e0/0x5e0 10:09:43 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0c12f20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1013.200208] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1013.205067] ? trace_hardirqs_off+0x310/0x310 [ 1013.209594] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1013.214627] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1013.219662] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1013.224528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1013.229728] RIP: 0033:0x457579 10:09:43 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) readahead(r0, 0x1, 0x5) 10:09:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000b5, 0x7ffffffff000) 10:09:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x33fcc, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1013.232963] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1013.251873] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1013.260111] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1013.267384] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1013.274654] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1013.274668] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1013.289207] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:43 executing program 2 (fault-call:4 fault-nth:18): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) recvmmsg(r0, &(0x7f0000004640)=[{{&(0x7f0000000100)=@alg, 0x80, &(0x7f00000005c0)=[{&(0x7f00000001c0)=""/160, 0xa0}, {&(0x7f0000000280)=""/116, 0x74}, {&(0x7f0000000300)=""/89, 0x59}, {&(0x7f0000000380)=""/161, 0xa1}, {&(0x7f0000000440)=""/117, 0x75}, {&(0x7f00000004c0)=""/219, 0xdb}], 0x6, &(0x7f0000000040)=""/64, 0x40, 0x81}, 0x3}, {{&(0x7f0000000640)=@ipx, 0x80, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x1}, 0x81}, {{&(0x7f0000000700)=@sco, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/229, 0xe5}], 0x1, &(0x7f00000008c0)=""/137, 0x89, 0x2}}, {{&(0x7f0000000980)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000000a00)=""/234, 0xea}, {&(0x7f0000000b00)=""/242, 0xf2}, {&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000001c00)=""/13, 0xd}], 0x4, &(0x7f0000001c80)=""/210, 0xd2, 0xfff}, 0xffff}, {{&(0x7f0000001d80)=@sco, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000001e00)=""/13, 0xd}, {&(0x7f0000001e40)=""/125, 0x7d}, {&(0x7f0000001ec0)=""/22, 0x16}, {&(0x7f0000001f00)=""/148, 0x94}, {&(0x7f0000001fc0)=""/4096, 0x1000}], 0x5, &(0x7f0000003040)=""/216, 0xd8, 0x8}, 0x6da3}, {{&(0x7f0000003140)=@vsock, 0x80, &(0x7f0000004500)=[{&(0x7f00000031c0)=""/39, 0x27}, {&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/178, 0xb2}, {&(0x7f00000042c0)=""/133, 0x85}, {&(0x7f0000004380)=""/32, 0x20}, {&(0x7f00000043c0)}, {&(0x7f0000004400)=""/63, 0x3f}, {&(0x7f0000004440)=""/183, 0xb7}], 0x8, &(0x7f0000004580)=""/132, 0x84, 0x5}, 0x6}], 0x6, 0x1, &(0x7f00000047c0)) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000004800)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000004840)=0x10) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0x80) 10:09:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000009b, 0x7ffffffff000) 10:09:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x2, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:43 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0b13220, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, 0x5, {0x7, 0x1b, 0x0, 0x40, 0x7, 0x6, 0x6a64e449, 0xffffffffffffffc1}}, 0x50) kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000100)) 10:09:43 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x9) 10:09:43 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) rt_sigpending(&(0x7f0000000000), 0x8) 10:09:43 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0a10920, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x3, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1013.535830] FAULT_INJECTION: forcing a failure. [ 1013.535830] name failslab, interval 1, probability 0, space 0, times 0 [ 1013.645612] CPU: 0 PID: 12248 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1013.654154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1013.663522] Call Trace: [ 1013.666140] dump_stack+0x1d3/0x2c4 [ 1013.669805] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1013.675066] ? __kernel_text_address+0xd/0x40 [ 1013.679574] ? unwind_get_return_address+0x61/0xa0 [ 1013.684518] should_fail.cold.4+0xa/0x17 [ 1013.688616] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1013.693734] ? save_stack+0xa9/0xd0 [ 1013.697369] ? graph_lock+0x170/0x170 [ 1013.701190] ? save_stack+0x43/0xd0 [ 1013.704847] ? kasan_kmalloc+0xc7/0xe0 [ 1013.708755] ? kmem_cache_alloc_trace+0x152/0x750 [ 1013.708772] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1013.708786] ? setkey+0x21f/0x410 [ 1013.708803] ? graph_lock+0x170/0x170 [ 1013.708818] ? __sys_setsockopt+0x1ba/0x3c0 [ 1013.708837] ? __x64_sys_setsockopt+0xbe/0x150 [ 1013.718339] ? do_syscall_64+0x1b9/0x820 [ 1013.718357] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 10:09:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) accept$alg(r0, 0x0, 0x0) 10:09:43 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000100)={0x69, 0xfffffffffffffff8, 0x75, &(0x7f0000000080)="d39a097becc6f8bb47130a2cf1fa67c052167dfbc816a00f637c16a33d32a53d44b84ad40c2a7b901edaa280af5264ec0a9b7b97260ea8704b3a9b9dd5f3a65d16658328626302d63c2ab0d70931d54078760f784956f249dd29867142a62e0b9659af12e4343cc909fe31eff46da0710069549db0"}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) [ 1013.718382] ? find_held_lock+0x36/0x1c0 [ 1013.718402] ? __lock_is_held+0xb5/0x140 [ 1013.718471] ? ttwu_stat+0x5c0/0x5c0 [ 1013.748102] __should_failslab+0x124/0x180 [ 1013.748121] should_failslab+0x9/0x14 [ 1013.748151] kmem_cache_alloc_trace+0x2d7/0x750 [ 1013.748189] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1013.748210] ? skcipher_setkey+0x1ab/0x2e0 [ 1013.748232] setkey+0x21f/0x410 [ 1013.748252] ? crypt_done+0xa0/0xa0 [ 1013.780680] skcipher_setkey+0x163/0x2e0 [ 1013.788355] skcipher_setkey+0x3f/0x50 [ 1013.792264] ? hash_accept_nokey+0x90/0x90 [ 1013.796509] alg_setsockopt+0x306/0x3b0 [ 1013.800503] __sys_setsockopt+0x1ba/0x3c0 [ 1013.804669] ? kernel_accept+0x310/0x310 [ 1013.808744] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1013.813341] ? trace_hardirqs_on+0xbd/0x310 [ 1013.817700] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1013.823082] ? trace_hardirqs_off_caller+0x300/0x300 [ 1013.828218] __x64_sys_setsockopt+0xbe/0x150 [ 1013.832644] do_syscall_64+0x1b9/0x820 [ 1013.836538] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1013.841914] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1013.841929] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1013.841948] ? trace_hardirqs_off+0x310/0x310 [ 1013.841965] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1013.841983] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1013.842010] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1013.871112] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1013.876314] RIP: 0033:0x457579 10:09:44 executing program 2 (fault-call:4 fault-nth:19): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:44 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc061092000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0xf, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:44 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) socketpair$inet6(0xa, 0xf, 0xe04, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r1, &(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x80) accept(r1, &(0x7f0000000240)=@pppol2tpv3in6, &(0x7f00000002c0)=0x80) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000140)=""/236) 10:09:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000ef, 0x7ffffffff000) 10:09:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r1, &(0x7f0000000100)=[{&(0x7f00000001c0)="0e8b35c7cec9ea5afbab106130c18b01998de15543f5f8b039db9cda644956e4145f71b507e9b147d5d2271e76cfee918da8864306f72aff02923f962c127574f2f9b137e2da3f307c97ce286055c7dba488d3bf16bfda688401f5971f12294ca85204375a4fe3f4a779b7e6b30691b2bba6eeb68c8c9a70e8bbbed8ce8be6cc59b45ad48f0e00d3ab3331957328045d0b36607fb67ba39e03e64540486de543f9efb4a0e2d5f597a9ac6ad375", 0xad}, {&(0x7f0000000280)="f95e9b65c7e379a0766b20d8a0286b8ea62f2df52d3704827bda09fffb27e9a9c1367afdac781c1b142de3749ab6a056ef2f86beff749b3649210819094bf6873c27c470b0917df60c309dedd8a6a8c6ccf16fa12818534c96db4ea65b65475925d6b1ffac680e9dcb27ef05addccbea22eae329dc5b1e6ce56437caa389040fc76d399e497175b16551f94e8dac7b55a995c087d070d22bfcec725d3acc3791e837ce0b869c7c4811f1bf6504aec9671bebebd1a9fbf69518ef25f82d8bce5b8f", 0xc1}, {&(0x7f0000000380)="0d96b39c432b90acf52c19b3dc1798e81d56544c5538f143625b57688d1ba26d5b24dff762bd12dc4796125797fd313a568982b16fc3f71708c43fdf1f81af9fe7bae1600a0c14ecd47d442daaf5dba117dee58c34eaedad0d6a1b441d62fd07808fe18c1400b3aa8b31d44f67e5b593248b5f993737df402d1f18d376dff9827b70b4f994011559f58d7d354a3a2cb6197505e169074282160093", 0x9b}], 0x3, r2) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) [ 1013.879516] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1013.898436] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1013.906156] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1013.913441] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1013.913451] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1013.913460] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1013.913470] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 [ 1014.048985] FAULT_INJECTION: forcing a failure. [ 1014.048985] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1014.060847] CPU: 1 PID: 12293 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1014.069349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1014.078713] Call Trace: [ 1014.081324] dump_stack+0x1d3/0x2c4 [ 1014.084983] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1014.090206] ? print_usage_bug+0xc0/0xc0 [ 1014.094292] should_fail.cold.4+0xa/0x17 [ 1014.098373] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1014.103495] ? is_bpf_text_address+0xac/0x170 [ 1014.108004] ? check_preemption_disabled+0x48/0x200 [ 1014.113045] ? mark_held_locks+0x130/0x130 [ 1014.117299] ? rcu_softirq_qs+0x20/0x20 [ 1014.121286] ? rcu_softirq_qs+0x20/0x20 [ 1014.125272] ? unwind_dump+0x190/0x190 [ 1014.129186] ? is_bpf_text_address+0xd3/0x170 [ 1014.133704] ? kernel_text_address+0x79/0xf0 [ 1014.138126] ? unwind_get_return_address+0x61/0xa0 [ 1014.143083] ? __save_stack_trace+0x8d/0xf0 [ 1014.147423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1014.152973] ? should_fail+0x22d/0xd01 [ 1014.156878] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1014.162005] __alloc_pages_nodemask+0x34b/0xdd0 [ 1014.166684] ? save_stack+0x43/0xd0 [ 1014.170322] ? kasan_kmalloc+0xc7/0xe0 [ 1014.174222] ? kmem_cache_alloc_trace+0x152/0x750 [ 1014.179077] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1014.183763] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1014.188792] ? do_syscall_64+0x1b9/0x820 [ 1014.192875] ? find_held_lock+0x36/0x1c0 [ 1014.197004] ? trace_hardirqs_off+0xb8/0x310 [ 1014.201428] cache_grow_begin+0x91/0x8c0 [ 1014.205505] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1014.211059] ? check_preemption_disabled+0x48/0x200 [ 1014.216092] kmem_cache_alloc_trace+0x67e/0x750 [ 1014.220788] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1014.225305] ? skcipher_setkey+0x1ab/0x2e0 [ 1014.229558] setkey+0x21f/0x410 [ 1014.232853] ? crypt_done+0xa0/0xa0 [ 1014.236508] skcipher_setkey+0x163/0x2e0 [ 1014.240596] skcipher_setkey+0x3f/0x50 [ 1014.244523] ? hash_accept_nokey+0x90/0x90 [ 1014.248768] alg_setsockopt+0x306/0x3b0 [ 1014.252767] __sys_setsockopt+0x1ba/0x3c0 [ 1014.256930] ? kernel_accept+0x310/0x310 [ 1014.261030] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1014.265641] ? trace_hardirqs_on+0xbd/0x310 [ 1014.269977] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1014.275358] ? trace_hardirqs_off_caller+0x300/0x300 [ 1014.280495] __x64_sys_setsockopt+0xbe/0x150 [ 1014.284914] do_syscall_64+0x1b9/0x820 [ 1014.288847] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1014.294311] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1014.299346] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1014.304210] ? trace_hardirqs_off+0x310/0x310 [ 1014.308719] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1014.308738] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1014.308762] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1014.308787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1014.308804] RIP: 0033:0x457579 10:09:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000289, 0x7ffffffff000) 10:09:44 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0012420, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x100000000000000, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:44 executing program 5: openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x40, 0x0) r0 = socket$pptp(0x18, 0x1, 0x2) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) 10:09:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x2000) write$P9_RLOPEN(r1, &(0x7f0000000040)={0x18, 0xd, 0x2, {{0x24, 0x0, 0x6}, 0xffffffffffffffff}}, 0x18) fchdir(r0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="13112400", 0x4) 10:09:44 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0911320, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1014.318826] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1014.318835] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1014.318852] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1014.318860] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1014.318876] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1014.328884] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1014.328908] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:44 executing program 2 (fault-call:4 fault-nth:20): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x40030000000000, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x7, 0x100) r1 = msgget(0x2, 0x3) msgctl$IPC_RMID(r1, 0x0) 10:09:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000252, 0x7ffffffff000) 10:09:44 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xff, 0x200) clock_gettime(0x3, &(0x7f0000000080)={0x0, 0x0}) write$input_event(r0, &(0x7f00000000c0)={{r1, r2/1000+30000}, 0x15, 0x8000, 0x80000000}, 0x18) [ 1014.493696] FAULT_INJECTION: forcing a failure. [ 1014.493696] name failslab, interval 1, probability 0, space 0, times 0 10:09:44 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc091082000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x2000000, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1014.576176] CPU: 0 PID: 12321 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1014.584721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1014.594080] Call Trace: [ 1014.596688] dump_stack+0x1d3/0x2c4 [ 1014.600339] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1014.605554] ? __kernel_text_address+0xd/0x40 [ 1014.610062] ? unwind_get_return_address+0x61/0xa0 [ 1014.615025] should_fail.cold.4+0xa/0x17 [ 1014.619105] ? fault_create_debugfs_attr+0x1f0/0x1f0 10:09:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000006, 0x7ffffffff000) [ 1014.624228] ? save_stack+0xa9/0xd0 [ 1014.627874] ? graph_lock+0x170/0x170 [ 1014.631685] ? save_stack+0x43/0xd0 [ 1014.635319] ? kasan_kmalloc+0xc7/0xe0 [ 1014.639215] ? kmem_cache_alloc_trace+0x152/0x750 [ 1014.644068] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1014.644087] ? setkey+0x21f/0x410 [ 1014.652207] ? graph_lock+0x170/0x170 [ 1014.656023] ? __sys_setsockopt+0x1ba/0x3c0 [ 1014.660357] ? __x64_sys_setsockopt+0xbe/0x150 [ 1014.664953] ? do_syscall_64+0x1b9/0x820 [ 1014.669028] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1014.674413] ? find_held_lock+0x36/0x1c0 [ 1014.678503] ? __lock_is_held+0xb5/0x140 [ 1014.682596] ? ttwu_stat+0x5c0/0x5c0 [ 1014.686351] __should_failslab+0x124/0x180 [ 1014.690589] should_failslab+0x9/0x14 [ 1014.694402] kmem_cache_alloc_trace+0x2d7/0x750 [ 1014.699113] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1014.703627] ? skcipher_setkey+0x1ab/0x2e0 [ 1014.707894] setkey+0x21f/0x410 [ 1014.711200] ? crypt_done+0xa0/0xa0 [ 1014.714848] skcipher_setkey+0x163/0x2e0 [ 1014.718925] skcipher_setkey+0x3f/0x50 [ 1014.722823] ? hash_accept_nokey+0x90/0x90 10:09:44 executing program 1: syz_emit_ethernet(0x3e, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa000000000000f4ff4400003000000000029078ac2314a1bb89ee7b95d44e14140012ff907800000000450000000000000000000000ac1414aaac141400f4ffcc2fadf5820a0f81560191cabfbdc861132fe2dacab749a621e00c4de7d3b582dd0b0ae42ea3276f6773941a330763ae1167a659d4703bf22e5d0bd876939ce685fdef376e9e1ccf1dab05e30ec19fe32600ccf27ad24ed8271e8ae60d9294a87e6d1447943705c4e2664d4d96ea21fc758da2cc3c6543"], &(0x7f0000000000)) open(&(0x7f0000000100)='./file0\x00', 0x100, 0x40) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0xa) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x412000, 0x0) [ 1014.727069] alg_setsockopt+0x306/0x3b0 [ 1014.731062] __sys_setsockopt+0x1ba/0x3c0 [ 1014.735228] ? kernel_accept+0x310/0x310 [ 1014.739306] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1014.739326] ? trace_hardirqs_on+0xbd/0x310 [ 1014.739345] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1014.739368] ? trace_hardirqs_off_caller+0x300/0x300 [ 1014.758724] __x64_sys_setsockopt+0xbe/0x150 [ 1014.758748] do_syscall_64+0x1b9/0x820 [ 1014.758765] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1014.758784] ? syscall_return_slowpath+0x5e0/0x5e0 10:09:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'vlan0\x00', 0x94}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) [ 1014.758799] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1014.758817] ? trace_hardirqs_off+0x310/0x310 [ 1014.758834] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1014.758852] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1014.758873] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1014.801627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1014.806827] RIP: 0033:0x457579 10:09:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x1000000, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:44 executing program 2 (fault-call:4 fault-nth:21): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) [ 1014.810044] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1014.828952] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1014.828969] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1014.828978] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1014.829003] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1014.829013] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1014.829022] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:45 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x200a51c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001e4, 0x7ffffffff000) 10:09:45 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x270800, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001180)={r0, 0x0, 0x1000, 0xd3, &(0x7f0000000080)="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", &(0x7f0000001080)=""/211, 0x2}, 0x28) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80f00}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0xffffffffffffff86) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x2800, 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0xf5c9) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f00000001c0)={[0x1000, 0x7003, 0x0, 0x1000000101000], 0x9, 0x42, 0x2005}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:45 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0210920, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1015.082856] FAULT_INJECTION: forcing a failure. [ 1015.082856] name failslab, interval 1, probability 0, space 0, times 0 [ 1015.098650] CPU: 0 PID: 12372 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1015.107188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1015.116552] Call Trace: [ 1015.119156] dump_stack+0x1d3/0x2c4 [ 1015.123361] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1015.128571] ? __kernel_text_address+0xd/0x40 [ 1015.133128] ? unwind_get_return_address+0x61/0xa0 [ 1015.138098] should_fail.cold.4+0xa/0x17 [ 1015.142186] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1015.147307] ? save_stack+0xa9/0xd0 [ 1015.150949] ? graph_lock+0x170/0x170 [ 1015.154754] ? save_stack+0x43/0xd0 [ 1015.158424] ? kasan_kmalloc+0xc7/0xe0 [ 1015.162324] ? kmem_cache_alloc_trace+0x152/0x750 [ 1015.167186] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1015.171896] ? setkey+0x21f/0x410 [ 1015.175385] ? graph_lock+0x170/0x170 [ 1015.179204] ? __sys_setsockopt+0x1ba/0x3c0 [ 1015.183545] ? __x64_sys_setsockopt+0xbe/0x150 [ 1015.188133] ? do_syscall_64+0x1b9/0x820 [ 1015.192216] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1015.197600] ? find_held_lock+0x36/0x1c0 [ 1015.197622] ? __lock_is_held+0xb5/0x140 [ 1015.197652] ? ttwu_stat+0x5c0/0x5c0 [ 1015.197682] __should_failslab+0x124/0x180 [ 1015.197700] should_failslab+0x9/0x14 [ 1015.197718] kmem_cache_alloc_trace+0x2d7/0x750 [ 1015.205883] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1015.226774] ? skcipher_setkey+0x1ab/0x2e0 [ 1015.231030] setkey+0x21f/0x410 [ 1015.234337] ? crypt_done+0xa0/0xa0 [ 1015.237987] skcipher_setkey+0x163/0x2e0 [ 1015.242070] skcipher_setkey+0x3f/0x50 [ 1015.245966] ? hash_accept_nokey+0x90/0x90 [ 1015.250207] alg_setsockopt+0x306/0x3b0 [ 1015.254414] __sys_setsockopt+0x1ba/0x3c0 [ 1015.254441] ? kernel_accept+0x310/0x310 [ 1015.254462] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1015.254483] ? trace_hardirqs_on+0xbd/0x310 [ 1015.267261] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1015.267280] ? trace_hardirqs_off_caller+0x300/0x300 10:09:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept(r0, 0x0, &(0x7f0000000100)) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000380)=0x804, 0x4) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-avx\x00'}, 0x28b) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f00000003c0)={0x3, 0x0, 0x10001, 0x2}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000400)={0x9, r3}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000440)={0x3, 0x1, 0x3ff, 0xd73, 0x80}, 0x14) r4 = dup3(0xffffffffffffff9c, r0, 0x80000) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r4, 0x40485404, &(0x7f0000000300)={{0x0, 0x1, 0x8000, 0x3, 0xfff}, 0x5, 0x5}) r5 = fcntl$dupfd(r0, 0x0, r0) r6 = getpid() fanotify_init(0x18, 0x1000) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r5, 0xc1105517, &(0x7f0000000480)={{0x1, 0x7, 0xfffffffffffffff7, 0x5, 'syz1\x00', 0x7}, 0x1, 0x223, 0x8, r6, 0xa, 0x0, 'syz0\x00', &(0x7f0000000000)=['\x00', '\x00', 'rfc4106-gcm-aesni\x00', 'vboxnet1^:&\x00', 'rfc4106-gcm-aesni\x00', 'rfc4106-gcm-aesni\x00', 'rfc4106-gcm-aesni\x00', 'aead\x00', 'aead\x00', 'rfc4106-gcm-aesni\x00'], 0x72, [], [0x8, 0x8000000000000002, 0x0, 0xb936]}) [ 1015.267302] __x64_sys_setsockopt+0xbe/0x150 [ 1015.267330] do_syscall_64+0x1b9/0x820 [ 1015.290373] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1015.295751] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1015.300698] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1015.305559] ? trace_hardirqs_off+0x310/0x310 [ 1015.310066] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1015.315099] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1015.320132] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1015.325005] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1015.330208] RIP: 0033:0x457579 10:09:45 executing program 5: kexec_load(0x2, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000f4, 0x7ffffffff000) [ 1015.333411] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1015.352325] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1015.360051] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1015.367327] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1015.374604] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 10:09:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80002}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1015.381886] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1015.389177] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:45 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x3e0001) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:45 executing program 2 (fault-call:4 fault-nth:22): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:45 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0013c20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80003}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:45 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000040)) 10:09:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000216, 0x7ffffffff000) [ 1015.665724] FAULT_INJECTION: forcing a failure. [ 1015.665724] name failslab, interval 1, probability 0, space 0, times 0 [ 1015.708711] CPU: 1 PID: 12419 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1015.717242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1015.726617] Call Trace: [ 1015.729235] dump_stack+0x1d3/0x2c4 [ 1015.732889] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1015.738111] ? __kernel_text_address+0xd/0x40 [ 1015.742622] ? unwind_get_return_address+0x61/0xa0 [ 1015.747567] should_fail.cold.4+0xa/0x17 [ 1015.751647] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1015.756770] ? save_stack+0xa9/0xd0 [ 1015.760416] ? graph_lock+0x170/0x170 [ 1015.764229] ? save_stack+0x43/0xd0 [ 1015.767865] ? kasan_kmalloc+0xc7/0xe0 [ 1015.771768] ? kmem_cache_alloc_trace+0x152/0x750 [ 1015.776624] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1015.781310] ? setkey+0x21f/0x410 [ 1015.784776] ? graph_lock+0x170/0x170 [ 1015.788591] ? __sys_setsockopt+0x1ba/0x3c0 [ 1015.792920] ? __x64_sys_setsockopt+0xbe/0x150 [ 1015.797521] ? do_syscall_64+0x1b9/0x820 [ 1015.801592] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1015.806975] ? find_held_lock+0x36/0x1c0 [ 1015.811051] ? __lock_is_held+0xb5/0x140 [ 1015.815139] ? ttwu_stat+0x5c0/0x5c0 [ 1015.818888] __should_failslab+0x124/0x180 [ 1015.823148] should_failslab+0x9/0x14 [ 1015.826975] kmem_cache_alloc_trace+0x2d7/0x750 [ 1015.831677] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1015.836199] ? skcipher_setkey+0x1ab/0x2e0 [ 1015.840459] setkey+0x21f/0x410 [ 1015.843759] ? crypt_done+0xa0/0xa0 [ 1015.847413] skcipher_setkey+0x163/0x2e0 [ 1015.851495] skcipher_setkey+0x3f/0x50 [ 1015.855400] ? hash_accept_nokey+0x90/0x90 [ 1015.859646] alg_setsockopt+0x306/0x3b0 [ 1015.863642] __sys_setsockopt+0x1ba/0x3c0 [ 1015.867805] ? kernel_accept+0x310/0x310 [ 1015.871880] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1015.876478] ? trace_hardirqs_on+0xbd/0x310 [ 1015.880810] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1015.886200] ? trace_hardirqs_off_caller+0x300/0x300 [ 1015.891329] __x64_sys_setsockopt+0xbe/0x150 [ 1015.895759] do_syscall_64+0x1b9/0x820 [ 1015.899671] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1015.905052] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1015.909995] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1015.914856] ? trace_hardirqs_off+0x310/0x310 [ 1015.919370] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1015.924401] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1015.929437] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1015.934300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1015.939501] RIP: 0033:0x457579 10:09:45 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x202981c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000f}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) clock_adjtime(0x4, &(0x7f00000001c0)={0x8, 0x3f, 0x2, 0x9, 0x346, 0x100, 0x401, 0x36, 0xfffffffffffffffe, 0x4, 0x2, 0x7, 0x4, 0x0, 0x20, 0x3f, 0x1, 0x9, 0x4, 0x8, 0x1, 0xffffffffffffe9b4, 0x2, 0x0, 0x14, 0xfffffffffffff888}) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'\x00', 0x200}) 10:09:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80300}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00', 0x9e, "bb8eda5cb48ad29b659eda4c47aa42f32fe17a3c347e5d036d782871a77fbf7d25c20e60a1c6f126878d9aff0a10ffa3efef77deb86d065c2ee4f63e9149953ab2cd462490d307340feab15067fc1645908b3e4033ab9b9b8a6f9578862c12299b9eb23e8f77f3ae0f43ff2bf8014ef3dbfa4bb07a369233e88d7a77e4697fbb0198aad784b0fe0f4fe84dfbebc5a4b91669ddee60f1aefc7c88c1e62944"}, &(0x7f0000000100)=0xc2) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000040)=0x7) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) accept$alg(r0, 0x0, 0x0) 10:09:45 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xb, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1015.942707] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1015.961622] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1015.969346] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1015.976624] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1015.983908] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1015.991200] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1015.998476] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:46 executing program 2 (fault-call:4 fault-nth:23): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000200)) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140)={r1, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x5, 0x80000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x90000, 0x0) ioctl$EVIOCGUNIQ(r2, 0x80404508, &(0x7f0000000240)=""/25) 10:09:46 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0x25, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:46 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x200000, 0x0) [ 1016.147047] FAULT_INJECTION: forcing a failure. [ 1016.147047] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1016.158902] CPU: 0 PID: 12464 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1016.167403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1016.176773] Call Trace: [ 1016.179378] dump_stack+0x1d3/0x2c4 [ 1016.183022] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1016.188225] ? print_usage_bug+0xc0/0xc0 [ 1016.192309] should_fail.cold.4+0xa/0x17 [ 1016.196387] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1016.201505] ? is_bpf_text_address+0xac/0x170 [ 1016.206021] ? check_preemption_disabled+0x48/0x200 [ 1016.211150] ? mark_held_locks+0x130/0x130 [ 1016.215403] ? rcu_softirq_qs+0x20/0x20 [ 1016.219396] ? rcu_softirq_qs+0x20/0x20 [ 1016.223387] ? unwind_dump+0x190/0x190 [ 1016.227301] ? is_bpf_text_address+0xd3/0x170 [ 1016.231815] ? kernel_text_address+0x79/0xf0 [ 1016.236234] ? unwind_get_return_address+0x61/0xa0 [ 1016.241189] ? __save_stack_trace+0x8d/0xf0 10:09:46 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) chdir(&(0x7f0000000040)='./file0\x00') openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) [ 1016.245529] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1016.251076] ? should_fail+0x22d/0xd01 [ 1016.254975] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1016.260100] __alloc_pages_nodemask+0x34b/0xdd0 [ 1016.264780] ? save_stack+0x43/0xd0 [ 1016.268423] ? kasan_kmalloc+0xc7/0xe0 [ 1016.272332] ? kmem_cache_alloc_trace+0x152/0x750 [ 1016.277200] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1016.281894] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1016.286925] ? do_syscall_64+0x1b9/0x820 [ 1016.291015] ? find_held_lock+0x36/0x1c0 [ 1016.295289] ? trace_hardirqs_off+0xb8/0x310 [ 1016.299713] cache_grow_begin+0x91/0x8c0 [ 1016.303797] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1016.309359] ? check_preemption_disabled+0x48/0x200 [ 1016.314401] kmem_cache_alloc_trace+0x67e/0x750 [ 1016.319123] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1016.323642] ? skcipher_setkey+0x1ab/0x2e0 [ 1016.327900] setkey+0x21f/0x410 [ 1016.331204] ? crypt_done+0xa0/0xa0 [ 1016.334849] skcipher_setkey+0x163/0x2e0 [ 1016.338930] skcipher_setkey+0x3f/0x50 [ 1016.342827] ? hash_accept_nokey+0x90/0x90 [ 1016.347071] alg_setsockopt+0x306/0x3b0 [ 1016.351076] __sys_setsockopt+0x1ba/0x3c0 [ 1016.355255] ? kernel_accept+0x310/0x310 [ 1016.359333] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1016.363936] ? trace_hardirqs_on+0xbd/0x310 [ 1016.368273] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1016.373650] ? trace_hardirqs_off_caller+0x300/0x300 [ 1016.378772] __x64_sys_setsockopt+0xbe/0x150 [ 1016.383305] do_syscall_64+0x1b9/0x820 [ 1016.387243] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1016.392613] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1016.397530] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1016.402360] ? trace_hardirqs_off+0x310/0x310 [ 1016.406842] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1016.411862] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1016.416883] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1016.421715] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1016.426889] RIP: 0033:0x457579 10:09:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000f9, 0x7ffffffff000) 10:09:46 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x200631c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:46 executing program 5: kexec_load(0x0, 0xa, &(0x7f0000000600)=[{&(0x7f0000000040)="9a6f5f745775b66aba93d122126a32d27dff7a51a370d9e29785d8710b6e5af3eb8a01c221cbd0acf07b66e4761a9d369763ef29e9d15b681e998323bee94a98aafd8480f3b7b5d89553139b3038a5ee94c38d3e4aeaad8d2c66f4c9c21b2a941be35fd21dae38d01dcc81bb1c4df3e4450b70ac517f517f2e59132e02", 0xb1, 0xfffffffffffffff9, 0xfffffffffffffffa}, {&(0x7f00000000c0)="f55ec86bc0e075f504e1", 0xa, 0x100000000, 0x9661}, {&(0x7f00000007c0)="233c5e8b692c3fe03b98dffb9be510cbb797f68a001043298ba1ff131d27d08e759698623a859fe4619c7b71d401e3ad234a6dea8db2ae1e03d30fa1b9c032e46716b701d6dc03740365a684fd5ea97de080c01582e204a886a168f474ded8cd4ba0dddac6d70f8b24b8bc9e3e39d690001244d1103616ca0771be267eb975c03fb98aafed079667dcd66224bd955da5a4c87a0bd5307a321af9305c3a147c4d5055c327a5edd843f9594a341e5c1251863f4e71643b748a190d714c38fe3b7bb5dc8ee5d1697c8e1c6d05c3a3acca838075261f009f08d7a0cea622f7deb0eb6bc6c9c8cc76a84a7e97e0e0e10db6fbc38d71d6dde7a8fb2d306683ae0f4749d43f4662f81269da09afb84cad71bc4ce4a36308673e491a33d125da79a620f82fe4e4287b897839443794083f96", 0xcb, 0x2f0400000, 0x88}, {&(0x7f0000000200)="37d72d0f845e88a26bdf7333393fd4b81030f2b8ed193ee1b2d331c04c495574e83ad7edc059ac94b0ece53eff2e7126a8471f3112651560a6d1e11f81a9c599eae6cac346f8ed9b2b41860f5b3f5c6d597a391049719373d217a2331060590f9a2bdfcc16822b66d1a74d375bcb4ace307e101d72b55b4340b39e2d65d431bf55645dec0ea0b494b00aca7ed291abab55a14625850d21ccbf51ab913a1e423dd564cbbc347660355b28a89d4702f2b17fe7eaaab574048b79171d738106b3681648c851c07031cbe090aad6d14c3d94d186bcfd72cfba15a622fbdc76f3ba9492b48807f0fae243874edfbceb8b70c78aa2ac55977413bd", 0xf8, 0x200009, 0x5}, {&(0x7f0000000740)="61a8607696c05d15e5f807b7652121a98877a2f70bc52ac8bdcbe43c583803e7a790836d527ce30cd7afe00ce2b33324847becc0a05e730710d31a12d0f9c6f657012f32961cc31fd404c6b435453c651c42755101", 0x55, 0x5cf0857a, 0xf683}, {&(0x7f0000000380)="621386565ef07af64abc731a552422b7e5985938e381fca24d7cfd1e878321ee360c606f17cf211bf5e398a1c5d7da966b7ee5afd37ce317dcbee748a66ba3b2470cabf24421838815291f0312e3792b7cade9bcb3e4644f0062b64ae18eed1a831a0604111193294812d5f213d088164b3fc6c01b6c9ed15ddb4d9692253147b399", 0x82, 0x8, 0x8}, {&(0x7f0000000440)="5a5256507b120a293d4ae266df47621b54aa51c14c341525", 0x18, 0x3f, 0x7ffffffd}, {&(0x7f0000000480)="cbe26f71ff4c9f48e5e3092321070002996b8a8927f602e7a8c707fd1a48fc190a1e2ee8011261bd291ded907516faa7e75a8ac26652320b199265858f287abfec0d", 0x42, 0x0, 0x8}, {&(0x7f0000000500)="2a2b760c60a144bbd90f7b2f5c035acfac69fa3e98c768b6a36808cb420a60b6130980e02aa02eb4b2925ec559644070e0d2f95afd99e462edd134cd075eeaf2abda52094db6f4604e525a", 0x4b, 0x69, 0x7f}, {&(0x7f0000000580)="86d5ba30b08647f7b7ec32f582c1b6bdfa8b952d1a7f574cc559756f8037e9c66aa31e9a07e9ddeb7215bdb3c4566afc1955e3d0c281d2db52075836dfea11acf7654003ef9e536ec4891127f497dae4d3db32721d", 0x41, 0x8000000, 0x7ff}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) 10:09:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x80, 0x444002) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f00000000c0)) 10:09:46 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0x200000cc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1016.430070] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1016.449042] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1016.456735] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1016.463988] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1016.471256] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1016.478548] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1016.485814] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) io_setup(0x0, &(0x7f0000000040)=0x0) io_destroy(r1) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) r2 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x4, 0x30840) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x9d3, r0, &(0x7f00000001c0), 0x0, 0x5, 0x0, 0x2, r2}]) socketpair(0x5, 0x8000e, 0xffffffffffffff6b, &(0x7f0000000000)) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e24, 0xc9, @loopback, 0x1084}, {0xa, 0x4e21, 0x2, @local}, 0x100, [0xfffffffffffffff8, 0x1, 0x7ff, 0x6, 0x6, 0xffffffffffffffff, 0x8, 0x4f5f]}, 0x5c) 10:09:46 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x7, 0x20000) 10:09:46 executing program 2 (fault-call:4 fault-nth:24): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:46 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x202801c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:46 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000161, 0x7ffffffff000) 10:09:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) [ 1016.766959] FAULT_INJECTION: forcing a failure. [ 1016.766959] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1016.778823] CPU: 0 PID: 12500 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1016.787319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1016.796683] Call Trace: [ 1016.799286] dump_stack+0x1d3/0x2c4 [ 1016.802936] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1016.808163] should_fail.cold.4+0xa/0x17 [ 1016.812253] ? fault_create_debugfs_attr+0x1f0/0x1f0 10:09:46 executing program 1: sysfs$1(0x1, &(0x7f0000000000)='rfc4106-gcm-aesni\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0xff7b) [ 1016.817365] ? is_bpf_text_address+0xac/0x170 [ 1016.817386] ? check_preemption_disabled+0x48/0x200 [ 1016.817411] ? mark_held_locks+0x130/0x130 [ 1016.817433] ? rcu_softirq_qs+0x20/0x20 [ 1016.817451] ? rcu_softirq_qs+0x20/0x20 [ 1016.839149] ? unwind_dump+0x190/0x190 [ 1016.843071] ? is_bpf_text_address+0xd3/0x170 [ 1016.847585] ? kernel_text_address+0x79/0xf0 [ 1016.852012] ? unwind_get_return_address+0x61/0xa0 [ 1016.856951] ? __save_stack_trace+0x8d/0xf0 [ 1016.861294] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1016.866845] ? should_fail+0x22d/0xd01 [ 1016.866867] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1016.866893] __alloc_pages_nodemask+0x34b/0xdd0 [ 1016.866912] ? save_stack+0x43/0xd0 [ 1016.875893] ? kasan_kmalloc+0xc7/0xe0 [ 1016.875908] ? kmem_cache_alloc_trace+0x152/0x750 [ 1016.875925] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1016.875947] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1016.875967] ? do_syscall_64+0x1b9/0x820 [ 1016.906689] ? find_held_lock+0x36/0x1c0 [ 1016.910788] ? trace_hardirqs_off+0xb8/0x310 [ 1016.915221] cache_grow_begin+0x91/0x8c0 [ 1016.919304] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1016.924862] ? check_preemption_disabled+0x48/0x200 [ 1016.929900] kmem_cache_alloc_trace+0x67e/0x750 [ 1016.934602] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1016.939113] ? skcipher_setkey+0x1ab/0x2e0 [ 1016.943365] setkey+0x21f/0x410 [ 1016.946702] ? crypt_done+0xa0/0xa0 [ 1016.950355] skcipher_setkey+0x163/0x2e0 [ 1016.954444] skcipher_setkey+0x3f/0x50 [ 1016.958343] ? hash_accept_nokey+0x90/0x90 [ 1016.962588] alg_setsockopt+0x306/0x3b0 10:09:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6bda, 0x2400) setsockopt$inet6_buf(r1, 0x29, 0x2f, &(0x7f00000001c0)="745029876dafbe66be4bdefcae9cb22f55a51b640b7194b729ee9f19d9b8ca6d23303fc9c92a8ecb5402583ee147041038fb4476abf7ed5c0006ddcc553fbafc7b19b7a6fad81512a156994d35b354332643653435b57a899e15256a1d676bcb2a58204bfd5b7ae5319a4c6966ff395e910350efc1e59ab5409f2bb74d118f2c0d5221970e3744034835238ee031061f74416a8f9f8fc2c9601d280bcb766ba9e5c8054cab83588b71fc579c22c5f22cf6498cadc0fbf378f734e5b420679ef05b506daa1ea3", 0xc6) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:47 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1016.966579] __sys_setsockopt+0x1ba/0x3c0 [ 1016.970743] ? kernel_accept+0x310/0x310 [ 1016.974821] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1016.979420] ? trace_hardirqs_on+0xbd/0x310 [ 1016.983784] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1016.989162] ? trace_hardirqs_off_caller+0x300/0x300 [ 1016.994299] __x64_sys_setsockopt+0xbe/0x150 [ 1016.998717] do_syscall_64+0x1b9/0x820 [ 1016.998733] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1016.998752] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1016.998767] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1016.998816] ? trace_hardirqs_off+0x310/0x310 [ 1017.022305] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1017.027337] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1017.032376] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1017.037243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1017.042448] RIP: 0033:0x457579 [ 1017.045652] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:09:47 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xfffffffffffffffe, 0x101000) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0x1}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:47 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2000e1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1017.064562] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1017.072281] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1017.079555] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1017.086830] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1017.094107] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1017.101387] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:47 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @rand_addr}}}}, &(0x7f00000000c0)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0x4c, "090914bfdade6c7f9c870f21a9ee6027564e25c662c94df537d9cc11aec0979659318120509f4e07090f1c6f56b123fc48316499d9204f927faf48b500b8028edd3d2bf1a0c14df73efbafe2"}, &(0x7f0000000180)=0x54) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000001c0)={r1, 0x8}, 0x8) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:47 executing program 2 (fault-call:4 fault-nth:25): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:47 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) accept$alg(r0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7ff, 0x80) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000040)=0x3a) 10:09:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000196, 0x7ffffffff000) [ 1017.274105] FAULT_INJECTION: forcing a failure. [ 1017.274105] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1017.285958] CPU: 0 PID: 12542 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1017.294445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1017.303804] Call Trace: [ 1017.306401] dump_stack+0x1d3/0x2c4 [ 1017.310077] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1017.315281] ? mark_held_locks+0xc7/0x130 [ 1017.319450] should_fail.cold.4+0xa/0x17 [ 1017.323546] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1017.328668] ? is_bpf_text_address+0xac/0x170 [ 1017.333178] ? check_preemption_disabled+0x48/0x200 [ 1017.338237] ? mark_held_locks+0x130/0x130 [ 1017.342503] ? rcu_softirq_qs+0x20/0x20 [ 1017.346483] ? rcu_softirq_qs+0x20/0x20 [ 1017.350462] ? unwind_dump+0x190/0x190 [ 1017.354361] ? is_bpf_text_address+0xd3/0x170 [ 1017.358863] ? kernel_text_address+0x79/0xf0 [ 1017.363306] ? unwind_get_return_address+0x61/0xa0 [ 1017.368245] ? __save_stack_trace+0x8d/0xf0 [ 1017.372576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1017.378132] ? should_fail+0x22d/0xd01 [ 1017.382034] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1017.387152] __alloc_pages_nodemask+0x34b/0xdd0 [ 1017.391832] ? save_stack+0x43/0xd0 [ 1017.395459] ? kasan_kmalloc+0xc7/0xe0 [ 1017.399349] ? kmem_cache_alloc_trace+0x152/0x750 [ 1017.404204] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1017.408879] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1017.413899] ? do_syscall_64+0x1b9/0x820 [ 1017.417975] ? find_held_lock+0x36/0x1c0 [ 1017.422067] ? trace_hardirqs_off+0xb8/0x310 [ 1017.426480] cache_grow_begin+0x91/0x8c0 [ 1017.430548] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1017.436087] ? check_preemption_disabled+0x48/0x200 [ 1017.441111] kmem_cache_alloc_trace+0x67e/0x750 [ 1017.445794] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1017.450296] ? skcipher_setkey+0x1ab/0x2e0 [ 1017.454553] setkey+0x21f/0x410 [ 1017.457859] ? crypt_done+0xa0/0xa0 [ 1017.461500] skcipher_setkey+0x163/0x2e0 [ 1017.465569] skcipher_setkey+0x3f/0x50 [ 1017.469464] ? hash_accept_nokey+0x90/0x90 [ 1017.473699] alg_setsockopt+0x306/0x3b0 [ 1017.477709] __sys_setsockopt+0x1ba/0x3c0 [ 1017.481876] ? kernel_accept+0x310/0x310 [ 1017.485940] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1017.490543] ? trace_hardirqs_on+0xbd/0x310 [ 1017.494870] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1017.500238] ? trace_hardirqs_off_caller+0x300/0x300 [ 1017.505350] __x64_sys_setsockopt+0xbe/0x150 [ 1017.509768] do_syscall_64+0x1b9/0x820 [ 1017.513657] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1017.519041] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1017.523992] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1017.528853] ? trace_hardirqs_off+0x310/0x310 [ 1017.533351] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1017.538377] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1017.543401] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1017.548260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1017.553451] RIP: 0033:0x457579 [ 1017.556665] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:09:47 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x400000, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f00000000c0)) ioctl$DRM_IOCTL_MARK_BUFS(r0, 0x40206417, &(0x7f0000000080)={0xa25c, 0x1d, 0xffffffffffff0001, 0x30, 0x1d, 0xec74}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) [ 1017.575584] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1017.583306] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1017.590577] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1017.597845] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1017.605114] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1017.612382] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:47 executing program 5: openat$md(0xffffffffffffff9c, &(0x7f0000000180)='/dev/md0\x00', 0x200000, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x406500, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000200)=""/132) open(&(0x7f0000000300)='./file0\x00', 0x480400, 0x80) kexec_load(0x0, 0x4, &(0x7f0000001280)=[{&(0x7f0000000040)="5d65736b26b36aa4d9d74ed576fa382f0f0f1c54433d5c73711def741b7eedb558282953606005d91789f5901e9a9ee2ecf343f9da21602e5ff45235", 0x3c, 0x4, 0x2b}, {&(0x7f0000000080)="35ded598cd6093cf58c035e8528f76da7fe45f90ea790b8ff3c7943ffc539e7022de1449b05b8fe3cd4d849f25871e40cf801f9c253feaa637e4f482322d09767a67444bb97caae3d0645a014f0d3698ec9f89349132a4b1eb4aacc039f428e2260b479bb274e6c8c3922372103bf633d55dd49e13a8958a3713b3bdecfe62bd64834e17c45e98cca4dfc5c2c84de2cb148f181d96e5cfc3f829dcc96d70355fdb338464622c2e2c708cd65170ebe4efd44d142abc74632b8d9f42a0d78fcbada5dba2c7cce35b388b95daefd5c2b1edae1694376f0da10a19bfd5a0f0af19bf55c1537d82bd37cf8cf94f2dda07", 0xee, 0xa9f, 0xffff}, {&(0x7f0000001300)="e486cb91080355ace9a957586a242b271ab32fa9b0c482a004baa1bff9945af6c2e692970a3be2eb21d9d3476e77e528e16ee1b359c75cdef30bad14e733a11883a49f0cacdea3f4f02c0671b2712c0199f9b81ae7d0b211c2b2fe297a76daed82a1f6b4480f709e244e725ace692755503974300dfe7bc1db009d5e3421d0d28d8c07def5eeb2f69c93473023149e215e0595e8e7f0e5ae2b4b54277ac2815070a851bb09be5832c602f4d8bfcb5bfe67c2a30ac5d80c1df84f4570a3fa5c65b2b7f349", 0xc4, 0x5, 0x1}, {&(0x7f0000001400)="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", 0x1005, 0x5}], 0x0) readlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000002440)=""/4096, 0x1000) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:47 executing program 2 (fault-call:4 fault-nth:26): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000000)=""/49) sched_yield() 10:09:47 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1017.853993] FAULT_INJECTION: forcing a failure. [ 1017.853993] name failslab, interval 1, probability 0, space 0, times 0 [ 1017.887520] CPU: 1 PID: 12567 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1017.896068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1017.905430] Call Trace: [ 1017.908067] dump_stack+0x1d3/0x2c4 [ 1017.911713] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1017.916917] ? __kernel_text_address+0xd/0x40 [ 1017.921429] ? unwind_get_return_address+0x61/0xa0 [ 1017.926377] should_fail.cold.4+0xa/0x17 [ 1017.930457] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1017.935578] ? save_stack+0xa9/0xd0 [ 1017.939233] ? graph_lock+0x170/0x170 [ 1017.943049] ? save_stack+0x43/0xd0 [ 1017.946695] ? kasan_kmalloc+0xc7/0xe0 [ 1017.950588] ? kmem_cache_alloc_trace+0x152/0x750 [ 1017.955438] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1017.960114] ? setkey+0x21f/0x410 [ 1017.963580] ? graph_lock+0x170/0x170 [ 1017.967394] ? __sys_setsockopt+0x1ba/0x3c0 [ 1017.967412] ? __x64_sys_setsockopt+0xbe/0x150 [ 1017.967429] ? do_syscall_64+0x1b9/0x820 [ 1017.967447] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1017.967472] ? find_held_lock+0x36/0x1c0 [ 1017.967491] ? __lock_is_held+0xb5/0x140 [ 1017.976419] ? ttwu_stat+0x5c0/0x5c0 [ 1017.997657] __should_failslab+0x124/0x180 [ 1018.001918] should_failslab+0x9/0x14 [ 1018.005746] kmem_cache_alloc_trace+0x2d7/0x750 [ 1018.010455] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1018.014974] ? skcipher_setkey+0x1ab/0x2e0 [ 1018.019224] setkey+0x21f/0x410 [ 1018.022537] ? crypt_done+0xa0/0xa0 [ 1018.026218] skcipher_setkey+0x163/0x2e0 [ 1018.030298] skcipher_setkey+0x3f/0x50 [ 1018.034222] ? hash_accept_nokey+0x90/0x90 [ 1018.038502] alg_setsockopt+0x306/0x3b0 [ 1018.042509] __sys_setsockopt+0x1ba/0x3c0 [ 1018.046671] ? kernel_accept+0x310/0x310 [ 1018.050741] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1018.050760] ? trace_hardirqs_on+0xbd/0x310 [ 1018.050826] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1018.065084] ? trace_hardirqs_off_caller+0x300/0x300 [ 1018.070234] __x64_sys_setsockopt+0xbe/0x150 [ 1018.074696] do_syscall_64+0x1b9/0x820 [ 1018.078595] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1018.083974] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1018.088922] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1018.088949] ? trace_hardirqs_off+0x310/0x310 [ 1018.088967] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1018.088985] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1018.089011] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1018.113277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1018.113290] RIP: 0033:0x457579 [ 1018.113306] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1018.113315] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 10:09:48 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc081122000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b0", 0x2) ioctl$sock_ifreq(r0, 0x891a, &(0x7f0000000040)={'team_slave_0\x00', @ifru_flags=0x4500}) 10:09:48 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0d1382000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000)=0x2, 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:48 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0511f2000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000152, 0x7ffffffff000) 10:09:48 executing program 5: kexec_load(0x3, 0x80000000000012a, &(0x7f00000011c0)=[{&(0x7f0000000080)="327b1b99800befe914c2f9c960c4eca9141c57a70e353ff74ba70d9563d6e575892f49cb3fbf65a3c2a3f476be6f34d0fa486983b6168072e7dc67cac0c10650793f837fcc56a5aeef51d545cc26b42c1f5a9730508a0ac699893c69498d0b4a1099aeefc28c698556f42d056b8d4780e799ed83534ea9fd190bce0450bb5edc0790fe5099b1368973a4ca34567cc5fb710ca9bb9c06e0b907e91a29f72cd7fe0d530e2305daa8a78319d396441c1feba4", 0xb1, 0x80000001, 0x3ff}, {&(0x7f0000002280)="15f08da0be5763fafec893f6f7c71786afcd11ec0eebe4cd51d6d483b9937a1b03244d0496514fe9225644719290bb5f4491d63198633c88eb28ddecee5b97f419167614e475293954c4c98918f7ef0811c09c11de558dd1fafe6786018f4b7ec745249bece168dcec1acd1ead9a6092c8457bfe7bd22b3fe1c45bcaaecacb9caa13a12c55952a158c87505557b2f8473e7c180a6e9d5c28ee079eee38e8a91ff44dee6c55958adba00528a07a4483f5991f087d26bb1f19cf0cf0dbdd011b1dfa72d72339d3146882db147c68d1e28a4542aa388999688bff9ee0b733425e8d5cb9e7e6e380188c349854b06c624dc5e0228b6a58c93c62482aec39f8a80a317d332326786338ec3457665062d771115e7958ed57b83c9193d9cca3304e448ebd3227ca3c047f0dcde51f5219f62c79cd84c05ab06c6331099f1bc43b8ad32a35b1153aa6b64bad3763028c7d485910f1911067244ad50d876ca4a39aa1529cf62a6c139032b9f0b3f44600dbeb973e4915a838a4d231df01f663f1beefdef3bc6a009245c144d005ab12fd0bea7481a1cfd84e426d92d28066411b7ef1642bc2591699155e8670ebe8d1feb22591be3b4bf4fca1958dd682ad9b8c765fba0d24e3ea473c8b5fe1bcc482ae4a11d2156563f68e39ba45fb45e9a6d43d6e215bcac9c1768e2f4757dcd5e3addee86f7de7f4ea3770ee46b21670029d3e78ac5e5e8f114df6c14f9257762f58c64028f2cb6bb67774226151f8025cb70bc1b478a15dc9f29e8d42b0355e0e2320f549b69a66eec4d11cbd86f7e70e167ef1f43acddba8c5355814e64bdc3660e05b7677acf926fb4e7352f4edfdd82727c2cc6e007f31cebe8845d4d51a629c6ab228016a08177afe75ff0bc68706ff945607aa63961a3e8af4bc54364567f581794e2384929b98f5824a30f9e2970059a3de8d9818e3bcc46ca6e6974aef59136df975eb5f6bf4eea32f806e526ed28efea3590460e7e1de0a7279f050cb4927d6f28353a0e1661a67ca40a6188e317916ad7c28078f4b2463d0d182953ffd8735b560d8e3d33013eb58365e7bc41b95880863cbd6603fccfbc9e7b73e107ce2c26d467d660d370915db1f9e47510c5ae25d2364a28ef04a888be32d0c7ec488ee4cf9ba4b95538b0718414e161542667e83a570814dd144eaa9f11f4c987b78ccb6d55c5845008f71ba5d1038162f09eb8cf3aad01f9f5f8660874b534d3bff98d42be7596c8887fb19d9aea2bd92eaae41e53492d3537e7e83cdf1e5d991f5c1cfd42f24f1caabed25c6f45109a38054a484d499cc414e41308294fc6f1548b2b3d01fa87f070799792e523ced8afb6509ef9f5773fb26a894e274b4534abe253ced6fac998bb40fe9736f53418a3805caaeed533227275f38cfebb8159a1bed974f4b0156d2b8b6365037c3b0bdeeec6078baee7ce98e9a5b431f2f797741274643afc0d302d459d14c9553cb87dc9ccf912968ae49c368f797e321f59c1d2cf7c3875a31c7aa8f84d0ccd3e1bc32aa4917c27cc22483d35ef51732c4f32ad66b9a5ab8bebf8b9cbf6121e9d6f3252a15656ea53cc1df0412d34090dd7032de575e604894c2c0d85889a80a59fcb4107688b14b0b16c9ac4f37bcc6dd883464db4c2256a46f3b047ab500fc5882eafb9cb0d7ea2622c0d470a22bb2eafef7cb517dfa951ab5a1351d7f6d2496d81521b44f50763e904d6e4e48b5d8573d236674f8b7d1717125b45a6aecb4e7a0c5d0a08389eb237f70631fb8d749c30386284e4088eb28aa729031b283b96e3dfa7a2f672fbd1a3e5f9dce9a271dc42ae8614cd725e36b8dbe1aca968e010876e4804aa497a2b10c46d3c29d619cf35ecf1f22310bcec9b18da99db072526eb2cba920ca17a6552b7b6106660bd069f1e80a22fa96acd610db0abd71dc4d597b323ac841fa9985b9897253fe729ecc98606ba87c72a6ae519dfea259254cebbfce5542faed50921c4da30565076c934748adcbc21e05d7132e0bfb664cfe2c5c0bdad45d99f39a8e192c23c64d7c742439bf58f4f6d77998dd1de5a8b95abbd68aea76219c9af4a116298170cda8232fac41090dbcd9fe3aaa261cf10648c3057e099a06cb0a50eff4f3a640447da9a86f99ffc475539610a5375871c27ac918a80afde80cca3a69daf4252d21980221f1ca99d8e737beb4b78df00a88b2182934d801a44a21091421a18f7fe9d8c02db3d1eff73d2356c0f6b94216dfebd5f8287d0c766433f528e95d9456c50c6d5b4a1af52120e95f0c62cb98ca17c9bf555260c410777f3a706c1f29edeb538e80c276ea8914fc6edf8bd508a7c9fa7b6867f295102abb69164834e2c44fc16917b791dc9d2cb4fb22a01e6fd846c39f3d915f7048844388aa7124232d2a4029035977742e1657b3252bd88e45b0236f9a4f4f24c69a3299599ceff0253996cbedb4e249d669305cb4796fb2297b26a4d84022c9bb59c8efc7e6fa5dd9b7e4d1f76a5955bd5c6f7a8bf46ea8a63c9c0093a40c49d6ae9c7656e515d98324ad78c0e4f987f87e2780dc9ff7739251b8701743a519ea4f25c7122206d6a6e3dfef3c90a9d0b876bc922fc87b0b7b33d17885fe535578e261a3c7241672195fa2ef5b2176bd95628ddd67b91b0f1810344a67d67a8224df3a28bfa93166c0e7dbf3a7b79f38eaf3e20df98b36b5b8eff3c973010d1a812bc509b5b24d726944bd584a888a24a0def46df6bfe6e55416bd7435c1d85bf34481e07683a7847ba8afb58747b35a07f55a5364b52f95ff7b84bc5b3d22b86ec89b113c987ed601e47cbcd006f7cb976c488336583f49167124559942f7dd3627fc4daa587ed4ba950e6eed850ce5e8c031db1ed2e260aad7e441dcd23fb7eeb1f7fe93b81835f622b1c13a53fc013fae28345374cabe93dedf8403ab5a1a249272c996052068403b75e71d594db3d6c34d6071383ff8dceea6e56d452baf9bc3c6ac86226ebc4ff9dc7ae81efd17cbcc787248fe7d88359329ba97661f5fca609cf7b75cde4931b112553b3270526a5ba4eee04c993bee720005287fb943820bfdf72e9a1ab69e90af217d45f00457a58186ff6ff564515519b680c8950189d4d41c5754543caa618319be50b6f97cdda48d43421b719b44680408e80cc3d1872fcbbf83de1c80530a047ed228abcd6b367b9c12a126a0fb60e524c39b07f652d55ecb6b3a0398d7db3c0d2a1f9509eb221eeec8c8571b7e354bff4df654692b49dc4d43f50f8beb00e79a53466ecd46641d296b475ee519924b108978c29b714881d14364eff729a9cc39e6f5318455ef274205b849e467df4d284023080d9eb314476b9618b0c1bf9e4fc79ae80c0b3d51a0f5cb15f8ebf9701ef568d4c66742cf575dd800ace20cea9e90ee18ddf2e07996aecf709be9222a99e04c5ba19023b711e722401ece613c96d14f72b93f9d2cbfaaa596e96f09341fd09b69e6b94848ab15e10ec4f44574d7f7852a6317b13cd572646d4ddeacebf038d2dad9b706633774a9dc5877380fbca720f6b7b3942956f638970b731d7d068beca9d69374ec2dea840a6a5d53aa6dafe83ce6eac0cc1eb1508f19564b10fde58613d98bcc99a1954d43ffca34bd93b2a7fd49c47fad917cd8f58b0fa75c25bd0cb5376857a1b6a842484262d6635107550f2fe3f57ed9108c7b611c7f420f30c32c5881a39980c1da73dff2d5cdd334250bc93e7ad1e729cc41ef94029c708f7e89990309d00ab92ac138a9ac34c41bf6a882ee9b9643211c6bde8b670f95f9ab13ab50bb777eb71710ab11d13f83e694221eeef095ef50dfff2ec5b3cf82c280eb357feb244f2e66f58fc6eaf2531ce866365f2b9047289e16a2edafdcdbf757508aff0e6898b3bc951e5f34e71e618a3c367ea5e6afd1b0984e597c618f75eba302b5aac2c370acd627ba959ac3f690444f5719745b234ed6608313d47203b07110ba07172173eefbf19d700a60b3df02f17e1910dcbd07e98868cf3ca5a076788479903f30709859489514252e4d68d9206ee3f4b357cfe344a248fa26ed0f4c620442c1ea141425523d588c6d2fc6cd187b9f91624819f5f1143ed41aca898e37131ac714dc39572cf07c9df0b7fd4bd0fe21333c511710dbcaf5bdbd3ddd921aca706ddaa81114948858a0f58b2a30689a78fe7c3600fb778b5ef980a6eea1c1d103370186688fc0ee6403971dab8df672d18c191a445ee0893708e7bbf0aecd792f82ee1f284af9afd74e6dc90f34426b78a5176824577e4189cec86abc2ccc5a35b7ced211ce66b0951332dfe7a4e39fe26a6c6807954631eeb46a5e6077fd97a0c58a3c3213cba5f8ebccf82e1389c1f6dc8a85e03bda9d896042338eb8b9f7e1518485996061c1778be4c6972e2c18a2e6356807a3cd65121ab11bf73e6d955a11df38623941984db6a90e2af53623d161723ba32d7b9e4d5671f343a059e4144127b08c18bf26d1d286c1c7d253b7c0ab43edd2c467d34da25afd6c34b428a0d7dc7e9a5973b12d47c5134c0d750f494a7d6623733013cb68d1b9b782b20b34f8c056a9e0ee4c59322ea5b1b8df3ba3ea60cdc75824c38bd59216a645910043db4643dc7c088dbdfb23de64739d690f72a40a8a07d560be6d4718dcba85fee2f75c2f79d06850810db45c8ddb1bbdef2508add24094197f17d5b3ca1c24cfc43199d35d965c302341d053c496d72827e8ed2853d4007a81d3e32349b912972a8f90471bff9b0e85a7c2cd70c5375fde9122341de8b9dd220700cf6a99e3d7db6557e13f2f5e62ffd511425f46968609b5342e0fc20600000000000000af3e3bf2d4613695cbeba9ae0a50f5341e72f5f0ff2e9914818f637772fc3a4c4ce3f6f11cdb461a597cf97cefc2d78ca2981c532eac62defcbbab5434d45faf12b8d0335e918c76b0899f38979787cffe529d9640d94b9bf52c2173fcb734e9cbfa02b7c79925f349a1607b8c90617743b2337f2c5d54b746fd4b7b3801707e3e0dd6e91bb61f1f8f2e01b4f871494555fefd5f2e5d2af05cc74901b3a3fe4ead1ef4f1ab703d922ef81c16348040c08ff55cdd4cdd323e2093390afdc102921006ab150816724d83d8c8ef9df3588b248b3d42f7b59e9a4024dd4e127efa3d1f6c16ac63340384984ef154e6e8734d39c54148ce5e7786604c166a3472b95ddd374c93f26741da67b54139b8e76c09fca61ac678b49d1033544cebe29809ae2cffc37a76998ffad6f81b473d092b6665efca2b5a237f147f6c96aa97e7014421fcaafb8c90e5a376497155625fc996d3e319436f02bf0715fee0112cdb38e0b41393c546cdf20bc1c7ffa735c48a87a08ca645a4995e8dc79743ba78f8c4169fe48a10fec6b6c7687444108e850ee68e875854503e2950335a96d26db0f3fb5189f6bdb6d83e183db5f978a6655cdd89500955bf73c96255b9ceaf2ddbc6d1c0d2d0a221285a3accdd8e5de962359ffc1f795020931e48ae42450f087aaddd8a07839a71708606eac23191ab9f5915fa0f921e5a3574989d1766c708b004971cfdf7db1b2cf5d3b6838ee7bdf9099086052039bb453b4154e989245d01a07fa12735ab0d93b3381fb9fc0eb9525d400d0a91e6af948148d8f8ff1c16a7a30e3e4055210d9a52dd767f42a8ecf72d98cb2bb2de2a9c53a3f9e4092aafe39a79d40ed6eda4a5978af3beacea62210f5653aa0493f4e0e1739b243e72a47011d66b967dc221ebb37cffffffffffffff67aebc37b8bc60a4b38214c879e4ee3520e9761aa600", 0x1004, 0x9, 0x6}, {&(0x7f0000001140)="f14dee203797027433455e29f62fda4e27d88c08d0efe5671303b6355a3f8f520a84f452fdff75e0a0381759c75e59e173add309940640b2ad76aff63e8051bf02db8766b1f79c61e3ce34c3e535a9ed0633ef003e8f98c8a290ba2e9b474870938d78da43b94e6b1566ef8e8ca9bf8c1997311b28502e93bf191dd92717b58d", 0x80, 0x8, 0x2}], 0x2) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x60280, 0x0) r1 = dup2(r0, r0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e23}, 0x10) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x40, 0x80000) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x0, 0x10}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f00000001c0)={r3, 0x5}, 0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000240)={r3, 0x64, "ef744d108cd2441c8936b59f98c8ac6a4a918777563d44c0b159fa1e5c5e6a5b770e1a31665d1afb6c138937f2f54c77eede5f883910813cbb6f7641025f2ce1a1c59318cc8e79db9de7b217b68e8eb2ade6c88a8c4043112a8e4ab531fd915596092211"}, &(0x7f00000002c0)=0x6c) [ 1018.113331] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1018.113346] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1018.162858] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1018.170130] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1018.177416] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:48 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:48 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = socket(0x13, 0x7, 0x1) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x4139}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000100)={r1, 0xd3, "83231fde15b71b57d072377f76b2654957a147175fd21637e2609d45fdff061e190e72285916daa548d05130d78884a446e019f928df0974a747e6fca95a38b7abcfcc90ce853140f3981e047ceebd79eefed86b54ae26c7c1b16869bf5dddf70cd6838edecfb6bc0e3688086ab99b3bed596f669affac0adb1ffd69fafdc2bedb4599b85f035e0e34a5186dfed592b9a9eac9189e25b85a1a704db4c14f4cbdabd1d0510c5c42a4887c6d1cedf1f89dad3260c86f9f333f7177ffca804b7a73c35c9bedfc7a8d7ed2aaf331db706099d99e07"}, &(0x7f0000000200)=0xdb) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000040)) 10:09:48 executing program 2 (fault-call:4 fault-nth:27): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:48 executing program 1: lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getgid() getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) setresgid(r0, r1, r2) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$VT_GETMODE(r4, 0x5601, &(0x7f0000000100)) pread64(r3, &(0x7f0000000080)=""/64, 0x40, 0x0) 10:09:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000c1, 0x7ffffffff000) 10:09:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = geteuid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000039c0)={{{@in=@loopback, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000040)=0xe8) r3 = fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000003c00)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) fstat(r0, &(0x7f0000003d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000003d80)=0x0) lstat(&(0x7f0000003dc0)='./file0\x00', &(0x7f0000003e00)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003e80)={0x0, 0x0, 0x0}, &(0x7f0000003ec0)=0xc) r11 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003f00)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000004000)=0xe8) r13 = openat$dir(0xffffffffffffff9c, &(0x7f0000004600)='./file0\x00', 0x4002, 0xe8) stat(&(0x7f0000004040)='./file0\x00', &(0x7f0000004080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000004100)=0x0) lstat(&(0x7f0000004140)='./file0\x00', &(0x7f0000004180)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r18 = getpgid(0x0) stat(&(0x7f00000042c0)='./file0\x00', &(0x7f0000004300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004380)={0x0, 0x0, 0x0}, &(0x7f00000043c0)=0xc) r22 = gettid() r23 = syz_open_dev$midi(&(0x7f0000004640)='/dev/midi#\x00', 0x80000000, 0x401) sendmsg$netlink(r23, &(0x7f0000004880)={&(0x7f0000004680)=@proc={0x10, 0x0, 0x25dfdbff, 0x8000}, 0xc, &(0x7f0000004740)=[{&(0x7f00000046c0)={0x60, 0x1a, 0x410, 0x70bd2d, 0x25dfdbfb, "", [@nested={0x44, 0x96, [@generic="136d3f89f00166b9a25cdb650c83f6090f28a84d88d96fc98c2b9b3f9c28e0bb4bf51b890eba76bd7b78ee0ecf7b2d3baa72d8de", @typed={0xc, 0x94, @u64=0x6}]}, @typed={0xc, 0x48, @str='aead\x00'}]}, 0x60}], 0x1, &(0x7f0000004780)=[@cred={0x20, 0x1, 0x2, r15, r5, r20}, @rights={0x28, 0x1, 0x1, [r13, r13, r13, r0, r0]}, @rights={0x38, 0x1, 0x1, [r0, r13, r13, r13, r0, r13, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r11, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r1, r20}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r13, r13, r0]}], 0xe8, 0x4000}, 0x20000000) r24 = geteuid() fstat(r0, &(0x7f0000004400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 1018.465895] FAULT_INJECTION: forcing a failure. [ 1018.465895] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1018.477779] CPU: 0 PID: 12618 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1018.486276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1018.495637] Call Trace: [ 1018.498238] dump_stack+0x1d3/0x2c4 [ 1018.501888] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1018.507105] should_fail.cold.4+0xa/0x17 [ 1018.511209] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1018.516336] ? is_bpf_text_address+0xac/0x170 [ 1018.520853] ? check_preemption_disabled+0x48/0x200 [ 1018.525896] ? mark_held_locks+0x130/0x130 [ 1018.530145] ? rcu_softirq_qs+0x20/0x20 [ 1018.534143] ? rcu_softirq_qs+0x20/0x20 [ 1018.538204] ? unwind_dump+0x190/0x190 [ 1018.542115] ? is_bpf_text_address+0xd3/0x170 [ 1018.546632] ? kernel_text_address+0x79/0xf0 [ 1018.551056] ? unwind_get_return_address+0x61/0xa0 [ 1018.556003] ? __save_stack_trace+0x8d/0xf0 [ 1018.560337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1018.565881] ? should_fail+0x22d/0xd01 [ 1018.569777] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1018.569804] __alloc_pages_nodemask+0x34b/0xdd0 [ 1018.569819] ? save_stack+0x43/0xd0 [ 1018.569832] ? kasan_kmalloc+0xc7/0xe0 [ 1018.569845] ? kmem_cache_alloc_trace+0x152/0x750 [ 1018.569862] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1018.569882] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1018.569897] ? do_syscall_64+0x1b9/0x820 [ 1018.569923] ? find_held_lock+0x36/0x1c0 [ 1018.569962] ? trace_hardirqs_off+0xb8/0x310 [ 1018.569981] cache_grow_begin+0x91/0x8c0 [ 1018.569997] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1018.570015] ? check_preemption_disabled+0x48/0x200 [ 1018.570036] kmem_cache_alloc_trace+0x67e/0x750 [ 1018.570062] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1018.592183] ? skcipher_setkey+0x1ab/0x2e0 [ 1018.592208] setkey+0x21f/0x410 [ 1018.592230] ? crypt_done+0xa0/0xa0 [ 1018.592254] skcipher_setkey+0x163/0x2e0 [ 1018.605980] skcipher_setkey+0x3f/0x50 [ 1018.605997] ? hash_accept_nokey+0x90/0x90 [ 1018.606011] alg_setsockopt+0x306/0x3b0 [ 1018.606033] __sys_setsockopt+0x1ba/0x3c0 [ 1018.624063] ? kernel_accept+0x310/0x310 [ 1018.624085] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1018.624104] ? trace_hardirqs_on+0xbd/0x310 [ 1018.624124] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1018.624144] ? trace_hardirqs_off_caller+0x300/0x300 [ 1018.645812] __x64_sys_setsockopt+0xbe/0x150 [ 1018.645836] do_syscall_64+0x1b9/0x820 [ 1018.645853] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1018.645871] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1018.645891] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1018.716557] ? trace_hardirqs_off+0x310/0x310 [ 1018.721070] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1018.726106] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1018.731140] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1018.736013] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1018.741213] RIP: 0033:0x457579 [ 1018.744416] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 sendmsg$netlink(r0, &(0x7f00000045c0)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)=[{&(0x7f00000011c0)={0x256c, 0x16, 0x0, 0x70bd25, 0x25dfdbfe, "", [@generic="afac16700052bc48d55397bddea8c7b2da3540eb6c5cb052baa9d61df9fc1442d94d9c3a8655ff0910e997844d96032cfecfe34b9c21451fc78a0cd3387a9eb5a547167e835736ba869ea3d319810a44ddc8e2b4d1d42d30983174ae37133c3db9701470eac8cac89179e62b85150c3589", @nested={0x4, 0x89}, @generic="070e941a6320fe47fe0c85720a043f1b18be678179d08a4bddabcfc4f73838cff49c6f1efe175933039cae49dfa74e0ef18b809c60143629f173c73d3dcc9079cd31884e660d94b67901ea", @generic="055c941617390e93a00464576a01079db5af89ef387412cf1ea9a82f48c3de45b8cbb73136a2b0d8e5886f03cfb487c68fadd5451c816dfcf5c4ddb1930bce428974be8dfb41fd4afa2b08e7e260316cd8da92c994da90f05fc96330c7e600e7daf0d6cdf7eca9f478f7defcf696e5dbc25fd23bc48d501c65baaaec9dca34697142bceb28de8cd2befadda1be1748ee9597", @generic="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", @nested={0x14c, 0x15, [@typed={0xc, 0x73, @str='aead\x00'}, @typed={0x4, 0x12}, @typed={0xc, 0x13, @u64=0x9ac}, @generic="2c94c600773b33ce707363150dacf349708eeec6bd04cc40fe6483afdf024d3ee62019c40fbb7617b88d27990837600d3232347093ffb07c40b4692840056a31d1d2d3215c49b44ce79e4efa105aa20a08545c1e89f1c10f0a0276f5688d50853b3e53fc8459c8127d7bbcedb8656fa92efdf5253978f4043f66b8aa3c1faa7edb0d1ee091ea2231216d6b64441d565d4020471c0e2df4dc", @typed={0xc, 0x30, @u64=0xffffffffffffffe1}, @generic="bc744f8a562842891563c179f66a8291db3ad37fc850ca6ce83b2c11ff0f1ff51ae5d4f5ab0b64ff594a046596e1fb9296e86db8a7e2100c71a6b653e93fa07a471f3950640d1f1ad19bc7ebf9b076e2459ad03cb42f34fd34e0b89221ed5ee37400c297174cb51a73bd3e39887a29caab8a", @generic="ac32e9b4d49b35645284d7ccd0884640d68ae12b77"]}, @typed={0x8, 0x3f, @ipv4=@multicast2}, @nested={0x12b4, 0x45, [@generic="e0cea00670db8e272c07a49d3747569f02b53d6aaa168ad09eed405bf28f98340a3dafe4adc051adbd998e2fbc87bab724edcadd5435712a2da1547f0bc3ae4fb0bf088f154e3894381dc7d8391a046be81def139a324f396b1212510e5d91263d6846db4e5294aa1f1ccf90630cb9548304b0457c1b97532e06de1727d3c3c1f8655c5cb2e7f065dc613d176e98c0c11419800a2ecd59fc06a80f58cd80832ba4e6145c8803dc43e9adc780c22270fbb2ce1a381f0ad3f604226b63c9ae3f84e3852dc798de9aca16866abc6373813147d24bfdfae4c51f6dd0ffd8812b2a1294ed109e78ea5e52c29cc23d32ac7bfa586031ee06f4827ea5621be7fb7da8b8065837d9a5f2cb38af0202aa9210a57334a966cd9a37dc06625fd614119a5c644cf5feaef899dd47d56b2e3fbf753e7836577b9605c684616934b047bde421c2ee85fafc1089a5052add1d943475ecee551bf0da62e97094ddec69af77881514c68a27f867f750d92a2c221d548553f9b48dee811aa24f1804e82e4c0b20f971baf2aede437241d0cc220b1d7ddf7dffe0a2e33769d1c88150fe935e85dafc05df6b76c02a75e96829fb853dad375660bc1e9f8c2343c763ab5cdeb4f27e96c08509f65cc1356d9470fb8ceef5a4e91204abd5f8348019c7db16958ab27e595526f3ddb0fc542fca8503b1fb6b171397ca3ccf21aaea9014a5acdb62b779cbb44abd6e5009d88f496a9e1392c9401779f4bb886bd6d9d383cbd0ef618d0710670b4bf61ce80ef41b3feadaffdebc24921661a13198ad6d787d39bdb3168c46c6be762e0577313e06715007353388dc4416adf4fc2647f4c2578808980cfa7dccbcf52161b5f1119c9c828aa0f6ce2817ca03f5d20ff2c7eec76b8715acedb95d3664729b426c500cb29217ead4c6d81e5f84d00213b49d6e7220a217e12c2f2dbfe832f986a265019f18d7cc798945e423cf7e11f37aaf547b3c4d949a3e5e94c803faeddfb7ede67f7aec41c1acd319c5364e737859889c9b4e13b4c1b866e178600788e024e6f529182d0322733f6d6ea7fe0c7d56513572945c7e7bef43b87edf985724872d79c26d2c9e8428757e8364f68d5bdccf946cd502dc4109c5faff2283204a71a3e909368d53d50e38583a5749f001ad2d62eb3fc35b2b09cfb98027001a1bf6ff30154077f05f91869e26f06534fafaafe3698c3702b3dc41e29d4e879aeff180a3c55a329aa9b16eb17623c3bc9892f773fc72969c3b5232740cc9b2ed6bec3a9c5af5aa478aea65f0b5b2fb7861c7cdb94162dad5cff689c6a35980e18cb9bac74b8fb5d68ccd1a8448afc294e2f63743ed08c74f558e9e0c6f4bc8e6084353d9819d59a119ed381321b68514902ed0f2cfadc7f862bb1e8d0c731592e6b92a55bfa76c90933eb846845b987159a9a536f4bc77b2de1f781fd9e468298266bf7b31f8d109b6d24f00d61d6cbc9bebebd8d6a0221f1d1be8fa877ac1b8c3c8713f90f8c3f7812a1bc9a5d41bb7a163387eff9fc03fd12e635f4c180745453078b3659d3a2e733ea19af64f48aa04ac0ba4dcf0a22f692b46d15c94416e0d8a4319827c1f0142ca55369e25ba5d73c3754b74b4bbc0a2b9197afd6c3fabca8cae375ed772755860e549d6adfa4a9ad965b8d617a8c0d4d1b12467e3b773a9a0cd3f0948980d5eab3a9f749856a729807c114f5328c1d1099ad77a6a117886f493d4c578a9bd1d7da56910641dd7d8cf321a4509b2068ed34b6f789451c781e03b8285e6989cbe3ada7d11dd76294783279c7661be4ebdc36c772fb6551e13bfaa454ecb89f03c24039cee57f55ba331bb3ab77e8d6c4815661703d10b4b7489d26a53c2e2e4ccf134ae31d6ee3a114b650c8ea3ac84b0e70b9329ad5dfcdb875962962da3e2b2119cd2064a24849c9665eb48c21cb51db7f61f798fa76d323226cd12098f2757dea9c93653229c4bdc1eafef8458600a08c45458214504cf16ad7e81010890cfda1253d1465c4059f8ef997621339d7e281a6570d6c8164199097af84e0808525a70d815cd18b26d598336cb404a4be99f8ed7edfb324699a923416c82eed17340bb10fa3e26a90b7d6790475c14e5104ff2b232c25189c4136c8c0fef513df0f4c30121730cb38e4e9a7ce55fbc689248007dd792be02e2014a732b2b374a1bd848b527f24b38154b03984d161ade7edb3072e7b63efe9ff60b3cd7111fa65a812988cd88e69b7a447ba1181aba449fea7e40214668d4f33ba124b4fa3440c3682d90efc11eb7a581be4d1f0ee081012b3075b66e73a7eb5b1196e31acbd2886cb7cd3de54b42591d0afc6e3529ac4240d93143f80be565bd1baea8b27cd98a26d16a2974d9e6670795ac1e4141d9bf333a5e6cd88ca270d1ab5536b050a6dc20c210b5b881ccc24c3ee66b9b7d7133982ccc6c573c253cb17306b3eb428d153fd52cfca759a5090ef597f62742908b8dbab87c3ae9f036b9b4c667b9d16d46f698c85f2c0cec6229cb43a4b8b0250ea1192be4d9e6b5535b8da4c47e6c1a13cce875152d39e8825e139ac754ed0954b6afc31f386ad22ca81fc810f7d4375c244440d7058d16ced21150468a17ae79a5f0a11c1f50677cb6c70088b1b7797e7967901e986faf571bd717857248f1042fdf5c4745e032764fc60d19a8fe1da505c71ecdacca17d9a696c815708614e8ef84ba9e4831bfcb2b885ebe5119f59d77ee0a0731321c31cacaa95255362cc196bafb178670b56ec16a2cdac124f4ea5b0540a9915d2938d6bcf31752666d5dd33f3c9f5c26b3fee81a51effac3d550dd62621f8ff387015a61628b0c4b4c95da932e4e42ac28bcb68d7799feb8116b9ee18bffd97b43e825532ae89a575096605b099f28434d856ba4c392acc103807e7a2ef8fd8b540ed79259e50fca56b9a2a3d5704774d392a69f7f1cb525614910c6aa0145e2764f9438662525dde5874ed67602298e522a3b5f214097c708a33da6111529d2deb61732ad60441949c17ff73e22dc9a51b0a28e0343bdbd64c94ce4074e937df57d7ae7142333867df8d678afd50baa690ee4e36dda3417e1951177514385e4ab0446cda0797996b9e01cb8105070062557d3ef7ea48695fa95ee26aabc353e15362c0e893abb4326201bd0bbaf1c3848844a6da00de225eeda14a07d21ea9e7fd109e4888619a606162a0ea55a2a7559451d09091407e6d5726744bda2282913305163abb9dbd77844a6fc4d648b7beb15947a89db38403471587011c220f5059ac4520f5f0f1ef49bac4be6853422c70581dd4644279ddf958ecfa07dcaed7de1873d95a75e46b1ee04c843e5eb361930045aa020f79323db201736a30f15f17bf57e03daf1bcd6aabc688beafcde253a44bbf72bcd5e2d15a9f50d6c5cc51db0c43c555731c6121a790f0440b965a99e9d43f80cf76be3a13d164fb46222783b1f3529f8f1e3908785b3947093ec6161cc47565230f2153347acd6a8c0205d412eeb74f0ed779a29744b6def9d67b565fd39273138d8e92be8399d687a3411ee1b13821194f70ede5ecf3fc553aa6aab5967a3da9f0e447d043416d78c46a7240fc75c5e4b34a76c2d625b4312dd97d49a7e3e6dddcfc2d34ae6a5dec1b4b3c2d18891dc41a69e07b195106de8d4f4eeb415410922e46fd2fd0e6b7679bc242266e46952907333ba29bc1ee329f2a9346effd6946070b24fcf8fc81c602e1f3e832f423a784829833729b75ee75d9a5c1fb910b09bf43c5424ea60887550edfdcc9ea007f52318d0b97f6555e02f57c35043580b7d921022e124114a2230b43ed704681ee9dcf33177b4197843b54cb39a4075c0bff986cd2e97c8bd4272a2789479a89b6c79b4942a86cfb34311d1ffd0312e32ae5241e60e7c99006c93e52f4c115d5bb8b6d1bfa3970ea813e342f6d288edb728758d1f55b013c5aafeafb079fae01d7058ee6135158587ddb29e7a138d6ce2f446c99592d71f91812814c4e324b8fab004f0dda40596c2170939fe30729574023081b3a82eb7fb0c68a5fdd33d9b5bb028fb99e1a36995ecd301422c70f9703866e69bffe65f460c3d22fb981ab8b16bd8b5584c1df353984c43b3b90d0a7b7bacb982f448ecd753ecf75faf2e1820cf908fe8a00b7094ab3c566fda12e2c7a5d5b9a69f5afd30425e11de00e6eab7522e8114eb250afc803b60b99877255fb20cb81349ae58288d343041329e1b677d96a34235b981c49c68ace7348ca575fa9a8e5e8937f22c7860c1953c258960f8c06dbbf613bc536516328372451d54c69b570fd5f34c71cb8c1f612bfb80de9ab9fc12d2ea21a7b10b607cf8cf4c100f858c360d0cbe45a73bf3cc65887e5a5a8e6f3ee100c6bcf9368d11fd0a55f1d29a2fd817416e10f628f85411b2832a6c100edf83e8f40aa57613ff6576173b69f5a6ffcef87af5dc93f7100a88cf45a5dfd213fd5a2a7224a412bd79d78796812eabff3ff2fbb5084c0e153c4bea4c2219b46a1704b6d4ac48dbac74f0383a053f628df70b81ea50d05fbc534465733bd990e263bd3d2722ec937fddd77a4a28047e51a4b3416a2b9f7ae4e9dbb29da7db90ef3d000c3f86289150fb434fb65bb9ebc72d9642f6158a657985d5939b99126a48ddef8cd35bcf2312d8943106f209e34fe0085ddf831a540987da640731b9cdcfc4ee6c8f27173fb9a2a1bc40d821872aa99ba864195484f5f5a06bb98ac41ab6bdddbf0157793bc3fe94ba2cac9c757eba7b013350de66da225a660ea7a459d37026ea81f4391fcaddfe6aac9ff92f649096ad9e0955278cf9469388935856db15537f58a87a0d0b9d766bc38b6e7565eb1cecab9a3869f5e132d1389a710c4f05d6b412be414a3e87d2c0ec7da3cd5d98ceffc23c5145aee9104be86300d8443060a16dbd51138b2d4cb59dd922748fc8c2044a6445e82b999689e622dd5dca6e9706d9b76f5334f2f3572d4a615e843829d8602c7e88407f13641f46eba18bd29e2aee336bf9408c689d387152b809a2db1fcf316cae24f8c34c8335741dce74ea04dd1ae4d4ed81ac3a1614e9cd177d1c17fac357597258be0839d67c64bde42b5f44ccc63cb9819b1665531922a4eeaf093762190e77e987f4b3ed1a576c9177ce674a8262d81f40af2caaffb42fc7bc98b50d139b4ac65edd05659c0c024fb13d5faa6ad1205c4656a30e1f8f64e7d39927939b4773941bd0c552fbac5665b1d9e5e2284967003724a4d2ca4a249173e7ab3bb6965bf10bfc2cfc8b8350468cd9a5395051ab24014bb5dd0900a63cab567d01b5611d14fc925a7dab3671eaf23428ef76036103212c0b14cedd9dbc6a4c0f25c6848f80dc407947ffcb7688eefe84a8072afc31b74e695ea978999654887bbe93284c84f1dbd81101351cc7e00242bbc4ec8cfc720d7488b3c5c181b654307d95c8bdc9334ae1f1a4d90a178a5b9e2255a854b6a87463f2c1439253262174ce323fc18e1537af77bd6100937b836506862be70b1b8de7bcd1693774ee5652819f8be9b28448e1e678cf781e334cbfcd4dcd3eec829eb526edc6b69df71657b42f5fc7c1c7ffe06728d64c41a7d5f0a0ce5f45084e487d61c87967d166e529c449026cc26646cc492c9eba4a7bf5dbe45b8173595bb79c262cf013e6f42ae2fa60dc4af1b88adf0e34e415fabc03fef80ec1ff937fc01dc8f310218ed69ecf60586ce594d459c77d211de373717d0b5070050c6240c9bd1c145d634588b13bd6eeb5140d7da0b16937eda9f937c2", @generic="1f5599398fb4fb8690fedecb2b6788a3f0862286583052e57d3459888f0c9fd1c9bbb12060954250291134f0eb871caa9527671ac7ba4e944d16307e1455e0c873cb292b4da80230c704dbb34bb4d1b5ab23aa589ec35bda9fdd2179cc7036568d0c96ec9a5ccbb38f4c94362d101726c026fcf4bc75318aaaaae1fd3ce31df0e8e062d72d53fa8accc5fc4bde3709af4549ccfc023697b9350bdea0cd30ab262122ac7192f0cbfd5c6576e33103ef80a647d236611d38332f3fc52453d54ccb813991485c98ff9e98cce993e4979a3f82", @typed={0x14, 0x18, @ipv6=@local}, @typed={0x8, 0x81, @uid=r1}, @typed={0xa8, 0x6c, @binary="f01e2dea8b2799da1658327eba6ade2a544fb5c3fb2fef33512b940c6031f77bf113f31add8c05f3a74f916cfe2f833a9ea697b5d224614997f199a8940ec6b2ff3274948f47a7c6dfb5832564c72ee36bb9f9d3e90815f8bd05045fa9374c8ee5ddf60679be41a795b8cc2776209c219376aa4a06ff135640e1ce8c00a4bda7d7f0d45065bf7b76ce7058af37751dfdd103710b155cb177f59986a4115b8a60417fb0"}, @typed={0x8, 0x0, @fd=r0}, @typed={0x8, 0x16, @fd=r0}, @generic="99c2a2ff50bcbe92ca71eb870afee9cc37db7b0704ab9242019029c4c1d6eada74be848466fa858aa464e2a6db91dc1bddb89180cafb1581d26284c15930818f2a4c360114435a2452d0fa94f239b34b971b00274b68728b93a03841b29f80d8e6584eadd2bc2e83b311495cff7152855190e354724a719ac701", @generic="1c13f6ab1cb2e826d731c38a60afb6bcf1710b3ab16d4b83445bb4438066ed5d5170271b2dffc6a5085dae324cb900e53a352b5a10447faa6944632dede91e0df455f6aa23824a1bcfbac476a07611dc2ab6f197c378f1fbfae7e290952ba744848c4e7be65951d38928dba3434289d5d96065148c34829a685841aa031e3f9aa7de1223c6a529a55c44a7c04151"]}]}, 0x256c}, {&(0x7f0000003740)={0x108, 0x3c, 0x514, 0x70bd2a, 0x25dfdbfe, "", [@nested={0xf8, 0x85, [@generic="109dbbbcabe83ca7ec1dc2f3655350bfb595f8735c4f2581bb8a2c5bb3ee33c721797870ebf04df3cca103d3ef3837df4b6c696ccaf0e9ed541149e7f72461d249e725ec0d12dbfe32b68d52402ea8d5d3cb6a51c8d574cff1cd4a22f726f8", @generic="622a679bf8721c1f710d76fe21573b7cc577d0f1faf6943bafdac6581a31ddb5273f4e2a220bb05debb3bf5ae84e902ff49d41d9546e7d1952b610480b1fa3dcb6240c570738a2c1c79814bb8f6e7267f70775ba425ae881e5e0a8a3ebc1216745430b92ae40dc10edf9762a946036c97189cd11ac28b9b384888fcd52c3ea9fbefb85173879a086b12ae0351e9230b27bce3b7fd4"]}]}, 0x108}, {&(0x7f0000003880)={0x12c, 0x23, 0x300, 0x70bd2b, 0x25dfdbfb, "", [@typed={0x18, 0x7f, @str='rfc4106-gcm-aesni\x00'}, @typed={0x40, 0x6, @binary="f831b0eeb153ecf3f4f8860fa294fcb3f90dca25e028f04f56e372deb5adc99e00f3af65c4dd7d8edcd614b489f0d70287d95763f6b687caeab72a"}, @typed={0x8, 0x72, @ipv4}, @typed={0xbc, 0x13, @binary="b1c0d813621dc67ec3b72417eec02322588b846206b722a29d6c7d4a24eccacde8056286da104f2aff2ba040a4b265c705fd91ae16679157da4c94570547ff0118e1df998325073c604ab797b3319aa88925f64cc255878b3d17843f3edbe3953789b52d73950b172d7ce37d2a24fea1a97c79dc37827376123261831747568779a21e7e2e61278d535d1e8507c5d12aa8cfdf3e03689b58d31d1a0ca8aacaaaff4a5862de5e96d7a015b85f810509640bb4d23fe1f58d"}]}, 0x12c}, {&(0x7f0000003ac0)={0x104, 0x3d, 0x1, 0x70bd2b, 0x25dfdbfd, "", [@generic="840226c4655c4843fe10906a2170c6ba36c9f4d7a7ee4327c13d6f4fd65306ad4ca5425771d4084f533aab82de186d7882b302e77ba14a7c97fc2c41802d0daf6b18c86effe6e585f5a173a94f14c9fea1d0230a9d651b72a3bcd0ccd8a3e6c3f9f0f9ea629bd95e1d2792f3d87e028ac9f76b05647b452059535da41153", @typed={0x8, 0x5e, @uid=r2}, @generic="6086aa9535343b6d09c14c592f0043d97aafb5f4281c2b02e5f6ec0a1685a41b6ae73cde0366b069bdebc93724820ffb4999b02d08051ed55f0a3613caebac6f42005ac83ce710d35b28f554913a670dc54922377724b511a2f77e60564af4a4e67a9546070bc9a46e9edb778619"]}, 0x104}], 0x4, &(0x7f0000004480)=[@cred={0x20, 0x1, 0x2, r3, r4, r6}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r7, r8, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r14}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r18, r19, r21}, @cred={0x20, 0x1, 0x2, r22, r24, r25}], 0x118, 0x24008004}, 0x40) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="620bfc98d59001ef60d4a147707686b7c6341cf46c1c1378674e3f764bf5b72a7eff84f7149047e8a4feaabe8fc069c30e86ed08d3b67b8b14268358235d9fa629bf29252f71a2ac356b16c47a8af3984afdcc1f8a863987872cb64686783b6d089c6d00bb38129743333dfb6ebc9fcffb74335e3f2b6a72cda0d40635366e264f25a015fd7e8f3cd9850508a39512b94f4249dca3c4dac865a3e60143f6a253a9cabe1f64d4ac2c353e266981279f379350d8b6557408a3014e97725b782e98897e457eca6c71dfa6621cb3cf22591b9f4539185cf64037d450a1e94d92c94623966ca7c46cfc6538dc6f207ca1d885e4067acbf3eff287053ab88a3873290e7bed2b1a460f5ba3a9910f35d424afc5377043409c1ec5247e4105a766e4b8f04665c3debdcd393c8333c5aa1f30bebc762983dd82858d9e85c6c49ceb860af670ce81e180cbeb6040358d22497fae0c514863b31148af24be2d252ce708aaf2df6fc1b20cb47d6b0abde51ae78743d1b2ef4d971d73f6e625888cf222b4c90a5c6d4c80e05ab849fe624a570a4287d6bfd3128c8c22a8080e2be5294648a55c6db60f0993319ae4c31a174da3f12c2b279e90f833dd89875eaba88dde40f8df8f9fa4324ffb729673565a51a476ea479294642305932b9f5e153f3d7560eb2eb5bd813fa7465f3582226542e686d88892ae431764528961d4d7ef738f746c5f330b909bd13eb15fd77385f7bd8d87fc5c0c5b978547e96880a265b675381dfa263aba982a3aa5e012135a712d47d419a873a092c5fd9af84438e33c2a85c9c6dbc7374035bd216157d5a0a5c2a912363cf05f519df8bd2f5ee6dda37fed1e11184de1394413380ff95f7495a36dbf7027fb642ece1f2de5ba4a33300f9eb1c2d037e66228645b9ae5cf461bb28b77d891497520375be6cd6f82bb6eb5a9e8b196e8f842fe2ecede7324f05fb339e0ef5939d59a90ccb9211179609ec6de5e34c7949f4b314575ccba9ba7164a7e10f353c2fee35eb96e4037485d8f87129d396c33a961a194cf0425631ee2d388193b71fe992404810ec5d96824a83989da815350cda8ec117ebf9ffa40709b2eacffaf0bc1e60fd9e2b2ae6ee6e06fec25107ba18a2504f62690cb9c5535d9cf54bc3f6052168e6a727930b4fda804f68ef7b0151b65ffc263d3d5b3585fde030badcc56932b302744269c0f60d918ecb88d23670ba661f99c67c16e1bb1c82eb256825c8d7d570937b651fe07db7a5b5e06d6ebd921fb085bb1187ff55361cd5b28ec541469e8b503e061aa6b32a1bc81e7a6132af6eb22bb2603fda404ed64b63afafa9c0a8aad538d0b9950d7685e2cbf5f1bebe24e0e38c3dff69448250aaf1124152bbdbf272c9b54468dc9cb13896c60a042de3e17036da2819f67d10fe95d0d7fbf36844a9cde300a8d642a79e487f181082d559e66d1dff0b6c79966b40120e34900867598dd6b48881fb1930e3b9f533e11e28270560908c08a575933b8a5dfc490b92f9685a60ad9cb95c4fe0979c09ffa5ceda0f49c95f6e32edc7e20a5f32d80b7882338aac527e8d44a623eb95cf1646ae1871b9a21061d669fe9149a7fff91ed4b621c09262491eae628d9903cf4b7b8fce94ac9ab7035234e74067a777d9e1f96019fe9fcbc1fd92a9337f02494492609165ab6014f2edcb4f2bdd80664c8efa8521a0de0a024f20c75cf87db33e01dc2bd4ced802ff34527cf53bac34aba017bf3f20e1227a3e7d7cc80490a7753221bc2126a9b62405442eb1ab6d6c07a3a25e473ef5ef05411bac1804506c1bd6453281002206a419d0a683ec0c71b98f90fc0774b408f7ca5f89a7c95bf2f7a45fc415378125fd29ec18762fd9d369cca50c2a79e6697489cf5939feb4e4166248934bbe8c4ecad53afff6f0813e4a37c6ab3795dc03e306c085ed270739c19913547c333eb36c217804a114a7b42013e4c93358a800276098cb064b525a5038714dc2db85f5bfe603ea26739e35282212a761afec754752bb146241c95dc7c60836ad753425b9a23e4d8608d834fc5716b30b26917db681b94411625e4acc5c18b0f148829926952a462f72b14588ae955780e4bf55caa4fa42ea53e94e546c35d2c0b71036689714200b9d45d745f0925fc23bcd6cd03fcd62a922ee0cdab9df54be7709463ddb9c7f4bb7ae1104b6bb8e034aa53f8d29fcacac859aca96aa631d29f6ddf89b587550abf91c17defa27297969906db2ae6272de802407c75b4cebe65293ece69588652a01eab85c5b0c16764c6762917263736f0f011403a42e23b926a1387d89621097eb5ba73238e2a12b30cbb0be75625bbe965898c2483aea39c3d4b0a59d03d4555447ab55e331d998237922af0c35f471c28d9ddae70c21e12b0f5aa8252aad2ec184915930484bb149c7a4a30e5852391bc7ee8b9a6f987cad47035420804a8dc9524759a1023a8193badba7c4f7b7ef3331fcb1087d3a042babc2a80f8c3aba81cbb3305ddc5fd16072e233fb40579f0dd69a79b692080b3250c04a9b7ee94039992a9bd53ef1059c811b855ea2e967c97adc22e0d2805ceb4d9473ef96e1d858ba467aae59a24e0b29583708d54d553ca08159f0a65840231fc47306dd142e3bfc2bab69a9841adc41993df24190698a6df69ea19d8d2698530b7c7218f76f6b70caa3a49025986d3f9902dd0319d9f3ee535b91fd07d8bc56b8ea9a8dd87b9879c25577546554203d593a74f63dc31a486e0dae767d98247243f7ea0c2ce50300d7d5919233b7bd2ee26178ab17c425fb562a7c84c48ee00d33c42b02f976d0cff802606392e124bd6e73fceb9695e013a28fdafec51607996ab1bbaf2e3b8d686a2ed3bfded9e090e3256323fe8c73ef8379489479c505963c846248c6506732c2e180699d3eaca00751f3ef904b9e845586b49630498825a7a0bfa4d26c190ef37ab84863651c3118496e227145b1a70ea2a0812a696e4181ef4b28d0daab13e681ec5068840d8ff004307986470c48c6d58ace680b14227f74ca719d5807ab72bd408000000bd7e025791ec57cfa36176516c1ca1c6665caf1782dbf02e61bbd4d72bb7671792a19674d1d6c689f90311d92533ac7f80d23fec2da104fbdd2a4c909b4ecc9ff8713b65b6d6b3bf617148bf3b54b6a58f5ac6bc39942f32fdd3d8f1d1db0054aa0bba93676c19fcf6982403d5aad66c5d5630b77c140fadd8b7985b1b486f88f2a3876e7a020f0b91b43412b05a0f9d94b4908400042b0110538b3c19445b39ca8494aecc471e22855ce6d5128e64a75bff427d24e7d699de5ee0698ef17d3f453cd7ca87784059e15c00bf7f24c9f00dee927c5a8dd031164d76c7ef0529adc40758d3fa2b7dea1458d9d13e45b9ad4cdda9b8329b9cfd036d4ac148bc3f49c2fa7de17a3e956c2d3ce639fca7c7c15604bcfcc6ae71e2740a0c5ceb91fd535ce9cc3c6b582fbb37765bdf3cb0b99913d9d1044513ba854bb4baac7266e1709813b264063439abdb461465686eb852cfb0385df52ccd6bcb0cac91c294db899f1f8797eed7346e18328df8c24f67c5bf38b56371ef25a1981cef994a2becda42f1fd7f1a5946b433b89180c3f4cbb7ac3221273149523f180f0d4e35ebd6e28cbacc1b367d478bb772fb548961335c0c07c644d663b52a210582ed0e41a0b07d423e11378d45d8d4065b8f56e051f6d5f15891bd6a3116e0834a3bbc6cc3d3fe4044c4bc43540e2a4ee2ff0e8c5683118d4d7d5f6032f1174371e06b112f84aec2fde8b2375584435bd893244c54c2a43d06772ea000265c65e86abf33f88bd2da9a9e24da098c535e35146f9127e16c7bde7ec97903e0f99f9520e545f09299131dd89caa847e12b90c6692f3172398905f597edbb4b363061ab65e75ea76d0d207c9494cfc70cc425d19ae635b41e64e370a73df05952aed0ab8af2a67fa6656ac863a37781fa5a9f615cdf6aa6dac82de2b201f5423de7f492dcf8f94c428e798d8fee509b4b160cf49a2ec91653c537706af65af445e8f64cd3089b5de67c79b2eb1f860acc345095798e5adfe06adf9bb25473b1e8f6c6277d8c56844995d60d394cc76c2ca1595fa96cc0a58888fc444c8e7446462b58bfb446ac52108a53b19c57d82b84dfe18836ecfb98a83f04022cf88d133e223c46784a28b9afe7b078df06ffae1835c24678f892306796557f52bf40c20d9c926251a993febe9c54ed8aa47631739d371d3669f733d7042cb4f7339a787ec5c7a5422d23cda1e1572da971348e2f0493f165e2636407a8ccece78bb2f707bd89e48aaacb7b82ab28aa362a29a3d0c86cc476969c37bd3385af29af4bdc4d45f56697bae6743805ee6e4605acb3069f2e5b29b87e1637460448d04cb51d4c15df291de7e753085c4eb65dde4d4c876eb87261c974f75161c2b0c1dd799f8c9b3df548284bff0f0042c14146bfb6fd720ec256ba37d1577bb85921ce70c8fd2d863cbe66cae971255aafac10f73fbd75d0a155c78c6d228cfea197d7ba8a4bdd0eb27c40f7f36cdc20177b01560a53a3eb21a47d698618b570dc5f82185da65ce98e1d4535d2246bd2913387f03366fbcc934b1701c51783642ae39dd387a5aaab3dce5962321ff6e2b7d86c9bdeae3c4f09fa17694e117258da17b983aa448d8b4ff4a57b2091a152af2a9824783ceb1ed0edad18d24330831541c658393dda1a7b20c59fc5c8ff110f79c1e72d07de1c5e85d93d2ffd3e0b865c0150e2e3783a9442786fdb1357c2a8eda003c1e171e76a1f53ac05c7fbdce5f44e379ffb581a436508491b5cbc3a3654396f63fa2c0c8ad4a2df16c73ce304d33698edaef204ebcb4ff67a5fc0f948377259bbef0a12106b777d1ebeb8a5b5a607153d18b3b2a3a9e12562e99c3fd9c11dd276ceac727840c720d86e4c67d27bfeb33ef119cb58ae0b01b32bfeb2aa1926ee450effac92eaddfabe5b10b02f1fb7ce365ecfbb70d9f769125f7b450082cbb958678732e22ac9e21a7113f90fa0657fca00da82c74412c10935c1fb27d107579be016c3f44896d5d2b6e710a55e7b5a3214df5d607a71abd77e982e1dc9b7f7dbc664e750d5280976d9f5a41843043a65f2df736e7bb9a6df01546ba507908f7fe78769a076a5dc6783d044aa2490971b8f6b667214dacf2eb0e0a603002de20858581c80da014ff65ee26b53d5a015acb9ef82a445cb27072cb59b290a8ff99f8cdd4d2e9449663dc06419d984fc9fa5c1ce23200842da857afd6ef383e3539cabd136246d1ed876d4ac5d01b73abd5f11fc91baa08cc62fd8a11db9193ba5b0b10fec1212e5ec592ee447d47889ffdb62853c6af9b5c76be3b5b06c4006e78bbc2f61014856548baf4e2cdcd83d4605356649af2322bd5ee6913b7400f66fc36dfc0c2744bd98e9cea6ae4ab9e9550de8c9a4d1497e690a3e9978542d5eaeb12dd16298877c46b36ad2c311ab9d3fad8671a2b5aa475a197dbcad8c74ded2e89231d96d75e4f7b8515a2e735e8b3ad40d62c76e45e1d66e18d68f7f324918d406ae4c441f2dbd126f4405e7c968572fe272c34d5679c718e56ff1d525ccdd1d7ac64e187d72eb2445283be72a6b62dd07b7718fa6f4248995831cf77998ce7127b9284273a458927147d35341bb834ee4b6249b3cb63a35230ee2a14b169ea78b2e87766d8fa39d5ccbb5f0ffb22954b2b5eba76219503c2a282c8f56c245ded574a597e276c47614896b66735544004f6ec31ae26db94e27ef27edfaaab404a", 0xfffffffffffffedd) 10:09:48 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) sched_getattr(r0, &(0x7f0000000080), 0x30, 0x0) kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000100)=""/106, &(0x7f0000000040)=0x6a) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b0", 0xfffffffffffffdd6) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}}}, &(0x7f0000000340)=0xe8) write$P9_RSTATu(r0, &(0x7f0000000380)={0x71, 0x7d, 0x1, {{0x0, 0x57, 0x80000001, 0x37f, {0x40, 0x1, 0x7}, 0x2000000, 0x1, 0x86, 0xa40, 0x0, "", 0x12, 'rfc4106-gcm-aesni\x00', 0x0, "", 0x12, 'rfc4106-gcm-aesni\x00'}, 0x5, 'aead\x00', r1, r2, r3}}, 0x71) 10:09:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x68) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000140)) ioctl$TIOCEXCL(r1, 0x540c) request_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000240)='aead\x00', 0xfffffffffffffffd) 10:09:48 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0e11d20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040), 0x17f) sendfile(r0, r1, &(0x7f0000000000)=0x45, 0x4) 10:09:48 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10000, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000040)) openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x10000, 0x0) 10:09:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000023f, 0x7ffffffff000) 10:09:48 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1018.763330] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1018.771048] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1018.778327] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1018.785604] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1018.792884] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1018.800163] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:49 executing program 2 (fault-call:4 fault-nth:28): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:49 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0xfffffffffffff000) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000040)=0x4) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0xa3b4ad6928333dbb, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x1, 0x0) fcntl$setlease(r3, 0x400, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000200)={0x1, 'gretap0\x00', 0x2}, 0x18) 10:09:49 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x200801c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x84, 0x2200) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) eventfd(0x1000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1019.024508] QAT: Invalid ioctl [ 1019.073970] QAT: Invalid ioctl 10:09:49 executing program 5: inotify_init() kexec_load(0x0, 0x0, &(0x7f0000000180), 0x3e0001) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x80000, 0x0) 10:09:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1019.099579] FAULT_INJECTION: forcing a failure. [ 1019.099579] name failslab, interval 1, probability 0, space 0, times 0 10:09:49 executing program 1: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) socket$pppoe(0x18, 0x1, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000000)="b494dc6f73b44b969d8259e68ffb37b6f0831e955fe91579de8e259d79e1c3f2a13196548e20f3a8660fc34475a0292cbfd30cf7ef1fca318a0c3af93926a9983b9774fd13", &(0x7f0000000100)=""/101}, 0x18) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000188, 0x7ffffffff000) 10:09:49 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0a11f20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1019.247373] CPU: 1 PID: 12675 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1019.256386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1019.265749] Call Trace: [ 1019.268357] dump_stack+0x1d3/0x2c4 [ 1019.272013] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1019.277226] ? __kernel_text_address+0xd/0x40 [ 1019.281766] ? unwind_get_return_address+0x61/0xa0 [ 1019.286716] should_fail.cold.4+0xa/0x17 [ 1019.290796] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1019.295920] ? save_stack+0xa9/0xd0 [ 1019.299567] ? graph_lock+0x170/0x170 [ 1019.303374] ? save_stack+0x43/0xd0 [ 1019.307007] ? kasan_kmalloc+0xc7/0xe0 [ 1019.310940] ? kmem_cache_alloc_trace+0x152/0x750 [ 1019.315806] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1019.320485] ? setkey+0x21f/0x410 [ 1019.323956] ? graph_lock+0x170/0x170 [ 1019.327767] ? __sys_setsockopt+0x1ba/0x3c0 [ 1019.332097] ? __x64_sys_setsockopt+0xbe/0x150 [ 1019.336687] ? do_syscall_64+0x1b9/0x820 [ 1019.340758] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1019.346143] ? find_held_lock+0x36/0x1c0 [ 1019.350233] ? __lock_is_held+0xb5/0x140 [ 1019.354320] ? ttwu_stat+0x5c0/0x5c0 [ 1019.358059] __should_failslab+0x124/0x180 [ 1019.362313] should_failslab+0x9/0x14 [ 1019.366122] kmem_cache_alloc_trace+0x2d7/0x750 [ 1019.370814] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1019.375328] ? skcipher_setkey+0x1ab/0x2e0 [ 1019.379582] setkey+0x21f/0x410 [ 1019.382873] ? crypt_done+0xa0/0xa0 [ 1019.386521] skcipher_setkey+0x163/0x2e0 [ 1019.390602] skcipher_setkey+0x3f/0x50 [ 1019.394503] ? hash_accept_nokey+0x90/0x90 [ 1019.398751] alg_setsockopt+0x306/0x3b0 [ 1019.402744] __sys_setsockopt+0x1ba/0x3c0 [ 1019.406909] ? kernel_accept+0x310/0x310 [ 1019.410992] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1019.415591] ? trace_hardirqs_on+0xbd/0x310 [ 1019.415611] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1019.415631] ? trace_hardirqs_off_caller+0x300/0x300 [ 1019.425313] __x64_sys_setsockopt+0xbe/0x150 [ 1019.425342] do_syscall_64+0x1b9/0x820 [ 1019.438723] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1019.444103] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1019.449041] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1019.453949] ? trace_hardirqs_off+0x310/0x310 [ 1019.453968] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1019.453987] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1019.463531] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1019.463576] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1019.478596] RIP: 0033:0x457579 10:09:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001c7, 0x7ffffffff000) [ 1019.481804] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1019.500715] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1019.508431] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1019.515704] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1019.515718] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1019.530248] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1019.530258] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:49 executing program 2 (fault-call:4 fault-nth:29): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x20000, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000000)={0x10000, 0xda, 0xec0d}) 10:09:49 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xb90ae7137d7ff951}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x114, r1, 0x42a, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xa28e}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7ff}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @remote}}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x81}]}, 0x114}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) 10:09:49 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0c12920, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000281, 0x7ffffffff000) 10:09:49 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x202021c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1019.702460] FAULT_INJECTION: forcing a failure. [ 1019.702460] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1019.714318] CPU: 0 PID: 12724 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1019.722904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1019.732265] Call Trace: [ 1019.734876] dump_stack+0x1d3/0x2c4 [ 1019.738532] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1019.743756] should_fail.cold.4+0xa/0x17 10:09:49 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x101200, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x90000000}) [ 1019.747842] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1019.752964] ? is_bpf_text_address+0xac/0x170 [ 1019.757482] ? check_preemption_disabled+0x48/0x200 [ 1019.762528] ? mark_held_locks+0x130/0x130 [ 1019.766777] ? rcu_softirq_qs+0x20/0x20 [ 1019.770762] ? rcu_softirq_qs+0x20/0x20 [ 1019.774780] ? unwind_dump+0x190/0x190 [ 1019.778685] ? is_bpf_text_address+0xd3/0x170 [ 1019.783199] ? kernel_text_address+0x79/0xf0 [ 1019.787616] ? unwind_get_return_address+0x61/0xa0 [ 1019.792555] ? __save_stack_trace+0x8d/0xf0 [ 1019.796892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1019.802444] ? should_fail+0x22d/0xd01 [ 1019.802478] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1019.802504] __alloc_pages_nodemask+0x34b/0xdd0 [ 1019.802519] ? save_stack+0x43/0xd0 [ 1019.802532] ? kasan_kmalloc+0xc7/0xe0 [ 1019.802550] ? kmem_cache_alloc_trace+0x152/0x750 [ 1019.811552] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1019.819831] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1019.819848] ? do_syscall_64+0x1b9/0x820 [ 1019.819890] ? find_held_lock+0x36/0x1c0 [ 1019.819928] ? trace_hardirqs_off+0xb8/0x310 [ 1019.828632] cache_grow_begin+0x91/0x8c0 [ 1019.828652] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1019.828670] ? check_preemption_disabled+0x48/0x200 [ 1019.828691] kmem_cache_alloc_trace+0x67e/0x750 [ 1019.828719] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1019.838390] ? skcipher_setkey+0x1ab/0x2e0 [ 1019.838413] setkey+0x21f/0x410 [ 1019.838442] ? crypt_done+0xa0/0xa0 [ 1019.846546] skcipher_setkey+0x163/0x2e0 [ 1019.854993] skcipher_setkey+0x3f/0x50 [ 1019.893757] ? hash_accept_nokey+0x90/0x90 [ 1019.898003] alg_setsockopt+0x306/0x3b0 [ 1019.901998] __sys_setsockopt+0x1ba/0x3c0 [ 1019.906160] ? kernel_accept+0x310/0x310 [ 1019.910251] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1019.914854] ? trace_hardirqs_on+0xbd/0x310 [ 1019.919200] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1019.924644] ? trace_hardirqs_off_caller+0x300/0x300 [ 1019.929763] __x64_sys_setsockopt+0xbe/0x150 [ 1019.934200] do_syscall_64+0x1b9/0x820 [ 1019.938108] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1019.943486] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1019.948428] ? trace_hardirqs_off_thunk+0x1a/0x1c 10:09:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000290, 0x7ffffffff000) [ 1019.953383] ? trace_hardirqs_off+0x310/0x310 [ 1019.957907] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1019.962940] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1019.967981] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1019.972847] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1019.978046] RIP: 0033:0x457579 [ 1019.981251] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:09:50 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x800) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000180)=0x7, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000080)=0x5, 0x4) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$TIOCMBIC(r3, 0x5417, &(0x7f0000000100)=0xfacd) sendmsg$unix(r0, &(0x7f0000001400)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001340)=[{&(0x7f0000000240)="097874587b1fadc0737ad9249b34b0db76781918bbfbd8ac4d58f9e8f2ef7de1b48a8b04d74ad76e2fe5a898ab47c502dd8ff06ab52341c08a7b8c0dc8dd5c77f7f120de591be8db2e2cd644ac6665b9929b15535db81458544e260b58f14e0b503ab0336e0f48be13a069caaeff2d6d69e5a26395220649eaa1340216124d2afc8e97844537e2f30b0e76ef96edb4da9788f890867d94cb3655512a2a978a7d7b56a8455e3de8aeb28f3e51a3d266ea92cf17854f6f0ba01fbcaf063e661b3a8582e34346ee549f9aaa1c7cf1e6a1f49623135b269cfa7467a0478269d2df7a20eaaec0740b90b1e92e6100323796060487c5878fce5ea57cbafe7ed81e449ce66655facdf0955307249a50e4127e5874eec83d00a8be10096b5f97797e46f41535c54944600e66e727140acfab2781ef583a072d533e55244322dc9672cb3be06cf7c37bd5e285e69fda37498b47a1acdff541c19842e8418f6b6f078b635054d8ac1dfa2e940cb963a20eec891b2488401f3f811c7869218de3b452e3d0914531f248628fc503cb8039c0e6e79c15c8df5aa222499483df73a36bf7f57d5113d35f89de7c53e4a06aa02a7c835384efd76e24a3734cec3c1841472c29c4b9d177186233fa218f0cf09dc54a211bbda7c13d940a2ae12f02638e58da7b3f2568877f6d50887288115e4f39c99049ed183fb35357fa9fc787a863a0e64c1cff3278737f0ec93a534cb33e090d7f0d549eb5f929fb8d67a1143e85524c6c2dee59c0ae370411d05a36113f8aef86c15c975d28b892de04f687dbacbbe4ce02843d58175bd00991811f980230e1e646adf46383db05a8e192c2aa626c444dbd511a203771616e59b6631ab307a4b767dac86df16719d2dae264b34b95fd696bcfae1445f78a588ba84fca268ffc17e6ae20359ba76ba4504f7e578e029e425e9306e9bdb4be0a24c3b0b6b74fd25caf10ec2827bc42f2d5a832c775f81bcb8fa3be9f0bdc33ec31608ca5e3ef475a972e9e74daad8539430c3140f2b4d7974c174c3e4582cced1eec3d795225468f55d6ae601705eae554a9de628979d1530dc443c18412903fa95156c5f907724c36aecf49fec3ee196a5a0ffbba7c7028b992d682f840174f2c024c31ba7639ed60c4126c1bd4d3ff8538fa7e93a85ccf01e247461e9cc3238fed24e8dcdef27ad4070c02dfa7292eaf0e3c1d17da4f25822c134a5e51cc9afce9b75dfa467fc2a6313fe25e38191f7f6221c3b22d85ebac7d0f8eb636c72739c20978bd1a4025eb5a28e81b724ac8aeb0eb72a6bc01c753c71a18f9167c4d2936ef598fd78de6e40a73fb2a7f4c01f365521c26bedb35ac04e9984622ead7ff8e0bd5d6618236ef17e4dedf8cf9ac5553ed705a35d317ebdc6091bc3d3c4a3d0e8c6b01d89b73ac14f7a6e168cb6070fd60e1e4491bc3e069aa0deaf6813ec9f4147e8c06fd24d7fd9bb2e52885dd2be56a980d263036060826e7ac31bd10a9764aadc1049d8be661531317036af97f2f65db8995f17813c94b91da6c5d4687969649b75d39a6bc1a21fb99759763ea16958888c32a0f7a077f7f81ee716481fcc17a27255a5c7a21e10c735ade333c11273caf46b2acb1fff2ee1a6349ea79b674614da2b3474743da37474914cc1ec09eb633a1e942a928b24043ec7cdc49cd48eea388a24775472b9df3ffbf5ee0ece051c6d3254b37fe2bab6d8beea6b756800623ca76420f7571daff60f4c5b96341576ad4cbed069e2c2ad569e48554a51d13ff564db9c60c12fb3828e18d9abb651b6d9f1bfa07b3feb55aa072f02421b41731b7a6cbd3cd92d2c92de857e6fcbc8a77a7d18dc8969ca68e1914b63db88a4d875481c765a57c0195316a001cdbb73d62999beaa333a09996e3f088e6bda8b701cf24474ec12a6397c451b1f066f91fc388b0466a00dba60d2ab440b541db8f8ffa0f61be4a517d426f08dbbe91f87cf6974e14ef50a3da4c8baa0b358842e1b2e8341370c46b0dc3ee62cf2274350709aa71b5298f8af8d40b6ca3b942a87a94261cbe49b52b92e76d1b2cea86ea60c9f2ae2574889289efc099bc479749da974595cc7c77e189e386ab6d09d91a3333a9b522bf1f032811c7882d87c3dcff72aaf9b6482e86489d1f3292354017c4d0011ea181e0240c12b5750bc38915f4f3fa8500047aaf2834a7a16556773ddad50cec53cfbd66d8f4b404e8e6f1d192ebf9dec1a5ad747c3288c56a0a2b28e4835b6c6da4c536393ed27ca70fa946b816fd0d48ff9bd9820262446186469f8d011c9305b1f9ce155918031aa604e48625c1ad884306b2c0ce9308e0251fd9e8b6bf31166ae432feaf0080b151093eb980942334764264bbddb785293a9a64cc76a46047ddbc5646792034ea66b9bdec6543502dcf4a8b246d6b6e56b94fca313dbf3597c6c935ac8059d19c28ac001185234f2846569505e4cdf3d5cd6fd3f8214af247cb6f65fced2c7124247d3a67d5e7f0fd669a574a722593a6ee267910a15ceda2dffa6fca3419fc7c607e2eba4c734893e9ac7e180bd21356f7a4dbdbc81846bdff2f251cb4224e59bcd67d61a44c4ffcc840976538e879be4b27493b66b7e7e55fd1d749e6170d1a0f273f283bd1153279b6c16f61205f166375c4b35832f814fcfd503423755268823a5dd044a7e867d243cb98424270e917628e5b2df74e761ee0ad41dae34a4598b06d613d378796bbe6e6c7301a009c8c0947a0521c7ec76717dcfb9ece3f6be7e252659c9becae09081fed0acbd225505fd981751589bb2eaaf0994e22ac249895df592b4d21f4e21847781c8834902e2028f7a9d3383e79ea31e1918ed8295e0f5186e0555e630b377c28ea4ffc939859854412469d198df0932b55dec84de897a00e37bd1a37580a8d57374f45e6024adef7adfa98bd1b7b366dd8a48f5bed407f73215ee4c334e0b909a35f905733d609b10a5a6f0f1ccb69a82dc01601812827bbe55f6e2f14e619756918aa435a27eb0f29597296139dc3d424d72c22a0796ab7aede32fc8fab2684dcc5daa8e0c01433dd31fab724381cbf4c472a56dbe8f47a550cb9f323935de0c9a04d5471c194f0bca9a52b5bf120259aacc20f45d2c15d9e60657d624199df5de32fc5b2867054822fa09da7d71d79060ee6782a34e5ff43239dcdc2e06bbf2c5702d143717d96195d648bd81416f7789c3a86996dd9a98ccd08ae81dea50f9916b813c4c2dcc72b409d3c1f617df6491f39624d5646ea8762746c6318140197c435829db2c8dece6c55e1008eb70db009ec6e92025c631bfc23df14b0801a3bcc7a5ccbc139a0be14a5b03299dda6361484b4d46d3ede99fa58d6aa7316dbcec0660527fb38c817d2024d2a83b14e8e66940ac289e2378372ec5b4291b6cea7382d24c77c5532d0f49b312cb5c8daa72a1e977f5e21b9802c2ec3f8bc9e54a8c605767e24235b323cf218c5fbdd43f8d7bb5d7bb0e9d0c2d1dc1ee21d608245f9c226840a86198f9674617bb276bd54af4cb2000f56b4fb6a9672e1737060bc76f7fddbb99013f69299bcae702145a2769d9a81b1d2bbcea1f31f72bedc46117839c68fe00e2cc60a9470c55ed944ddd8819ff51727786318efa6443f4f88c11c448ac226d8bcff111ea21754b2632443e8cd187c0cf42cef6037f94806d496e4991a8ebbf90637533a9cc9459211a913f5d86c1c4819f61d77b0e8aec2c7f632a81c0e59b250253613e5c63e9f6cba970d4f9cc8097086320a5b58b8dae89dd44c9755a1808f321c3008d678fe8e7336941b6546ef7790b5b7cf12e6be6b393881516e890f2b14ef3c4a8e6165cb15bfc8869ea5e009baa06c06ffde70475ca21b168466c013293468efbca6f18559721c639fefc135f8c293040da13752822e582c72144334e5f621bbabfd32bda7e6cdd3e5d034e520af85bc4f0b50ebe6f0ca0e5b16a28f6473cd4f1192e376f2d3887e99513ead8c2b88f6b15f3d36270c9e3326666ba9a703b6977e61b95596a7956fbfa8251bdf9ddfe1828214deba26152c3f96132651907a394c0f3f7e71d06a3388686585d33f02bc7a6f542b286227ba9a48e4745a9359971265a40ce63095f57354443ab399a377fedb3f3731f019aa0265a7d7dddb130be910c68af18a42df99b1059c8c56fb44b95793395aed925fdc9ee7ae8b3565ea69ef8df580bded55bfac68a9256cc5e6bda53d338b7cc4ef82d76df7dcbced9789b02dffadf1acde9f669e4486158fab80727498be8796e3dff421922a93f3c0bad57bdf7ca0c6d88a93cec46014b91a774952db83ac5d4bf8092b662112c84ab72d4f48c3a14d46bf45e664614091af6d72142970b5f90d89206acd44018d04a9271c91e674bf9e437d1a66133e76970aefc275cc8ea470284fbb1cad79598d51a4c8b65558c097de1251e1c745afecf8295651f7aa97fa1396952b9067afc81a54b33104a9011cd1c1c1478c493a9dd761ee66282bba571c4b11434bd23bbaccb03f637b1abe31270f59d3c73d130d53efe45c6f8ba5d19a93b83cefc7f2c5894b693d4d50c5ff7b25b8ddcb02e64d982cb7832729dafbaf72fd8de038518c245d11f7ca99cc61b88b47f42ae618464f6499cad4fa88027f20f6d160b61e66247f00e8ce52a2fc2acf6cb247e26306a67941b517fdf234619abfe2b39d5e487bdd15679a4b33fbf0d812e6068e18c8292874abebdeb7d1ad7f591098c9304e555ef76e9c8c1899fc4b566290d7069ba5e07a9ec03fa131b387b1005d35fa21953dac695c99618a405d34dccc3335a999a190afa620661cae80a1b5549495c17fdc9f48247f29304b52432157195e6127578adb3ea3dd28833c6b694b43e1b8ff90b6840dbd9a79ff4167f0e12ab3be3de08ffa8a9047fdc83a35ab6441775f1d936d552ddabe2d3900198b7cf1836d34dd77919f740a604860991271249af8b33d399db3bc1f4d50f3acb02783b05068649443e7e444cec65f6324cf3ef1015615ee8a5517d922b485bc83275cfbd7bdb7b95bd561b17f9a117df7e7accccdf6336ec2730553b2e1c944e44e79831ceeb910a1e45f3bb5d35ed0eea2f425a2785727229c98bd57384cc3df262874b1c0caf7b5f53370f78e1edd80f68497c17121c0f63f86172bc5824b1214174f716be7183016b9e45a936cc356ef947eedd6e8ea5350f467256295e402f6e6440233940610fe1e8db251b61f8723e41d078944e8704ffd4121a59da37ea7c1daeba7c1058313b22ec3c9bb5d156a3ab804630597e4524b28250f191cfcf0142e708873e46500c4d4d2c3cf2baaf32bba9dc1e70f7b3ba191dc2109a7255cabc27159a1a362c86d143b996137f882633e7c00a7c8105da5166cde20322b62e34b45f03b725e16fae874b66cc1ac4a1a21852226f407ab9b612da453ef48facefa65f9adb796ec4d000224de57241da006a87900b1db3ab0c0f3411b52fad4ba3a74061121fb1c259a3d772f1e2496448e9831c1b2c607982f9ac7fad02463598a3e3ab2d6d8f332bb79c68464ffaf735fcb4e804fb37b49b5d532a552c9e4075ca8164b94d53208c614a5bba57dcc273599612a02a29c16b78afda719af5f2a7fc3e803e3a8b0f02ff5a9569e01b4a1e36f29542b611c753c6f20fd9829489fe451a6f3b43e05b967d6a5b1ce719186d5ad4c28bc09e429f51f2407f082c4518de1f44cc34e1e19c914198d72f2683d64c2011026b11f63e7147d0152182235217b5c90a152a0a4a3dea713cb966cda4369d85e", 0x1000}, {&(0x7f0000001240)="d4272274cff83e9ece88566299b8947cb6fbaa8d3d65606d94c6ada2324b6a530b9b51f6d18e7ea8cdf06e0d0e4398c07f7f8753a5402239", 0x38}, {&(0x7f0000001280)="8af59c7712f5474ec234b34680921b4c50ea1d8828b917caab44f1b8d12f268172a97549dd47e49c430b68b379338f4d845f213313b7ff88340293f5be0aaad5ff3d6d316def5ffe61699bcba541d8f66458e0f8d50c0e45a8da280f33f7ebf0e4a8f9222fc71cf477f568b31803134f574184411a01cfcfdbe45487bec78dbb3a904605326cdfca6b8ab4c558d5880841", 0x91}], 0x3, &(0x7f0000001380)=[@rights={0x30, 0x1, 0x1, [r1, r2, r0, r1, r1, r3, r1, r0]}, @rights={0x28, 0x1, 0x1, [r3, r1, r3, r0, r2]}, @rights={0x20, 0x1, 0x1, [r1, r0, r3]}], 0x78, 0x20000010}, 0x20000000) [ 1020.000162] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1020.007895] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1020.015176] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1020.015191] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1020.029727] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1020.037020] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x102, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040)=0x8000, 0x4) 10:09:50 executing program 2 (fault-call:4 fault-nth:30): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:50 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:50 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0e1062000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001e2, 0x7ffffffff000) 10:09:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="d956acd5c80e403801000000010000005d9cb6a06d1005c47abd807a0c747998ae36a9d0afaca8a9263badcfb2b7eb9896ad49910cd14e4e34a65379ea0e8c35eff8375c72df14d740288085b9f8246af6a2b5420a183e40110a08cb1460ed2d8e6fb296262232b97f1d78eb7f7ed77c4c0f0e8f88d010377df102099c4d627625980beac4", 0xfffffeea) 10:09:50 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0f12920, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:50 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={r1, r2, r3}, 0xc) kexec_load(0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000000040)="9a4accdcbdc391640ca6ebf19f7aeb69586c4a3d7215f3350e931db33563c20c2f05204f469413d8674735b32dc911e1e749f115d61ea03ed6ec5da786d0a305850aadccfc53b271fb69febb84e0fd60a1173d7245f2c82489e7bc1d9b8deb86cb94202f293f6297de4a097a9a2f86547fdc094d353a5ce4d3ab41a486fd68b0f87fb0e721398957072cd72e7f8d320f34da09b7171ee89104a6d53f78ff8b69be3525a3ba81ed55ea41", 0xaa, 0x8000, 0x7}, {&(0x7f0000000100), 0x0, 0x1, 0x3390}], 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) [ 1020.241403] FAULT_INJECTION: forcing a failure. [ 1020.241403] name failslab, interval 1, probability 0, space 0, times 0 [ 1020.299899] CPU: 0 PID: 12766 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1020.308442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1020.308450] Call Trace: [ 1020.308476] dump_stack+0x1d3/0x2c4 [ 1020.308500] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1020.308527] ? __kernel_text_address+0xd/0x40 [ 1020.333757] ? unwind_get_return_address+0x61/0xa0 [ 1020.338703] should_fail.cold.4+0xa/0x17 [ 1020.342785] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1020.347903] ? save_stack+0xa9/0xd0 [ 1020.347921] ? graph_lock+0x170/0x170 [ 1020.347934] ? save_stack+0x43/0xd0 [ 1020.347949] ? kasan_kmalloc+0xc7/0xe0 [ 1020.347962] ? kmem_cache_alloc_trace+0x152/0x750 [ 1020.347978] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1020.347992] ? setkey+0x21f/0x410 [ 1020.348008] ? graph_lock+0x170/0x170 [ 1020.348028] ? __sys_setsockopt+0x1ba/0x3c0 [ 1020.384036] ? __x64_sys_setsockopt+0xbe/0x150 [ 1020.388634] ? do_syscall_64+0x1b9/0x820 [ 1020.392708] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1020.398090] ? find_held_lock+0x36/0x1c0 [ 1020.398112] ? __lock_is_held+0xb5/0x140 [ 1020.398142] ? ttwu_stat+0x5c0/0x5c0 [ 1020.398181] __should_failslab+0x124/0x180 [ 1020.406285] should_failslab+0x9/0x14 [ 1020.418011] kmem_cache_alloc_trace+0x2d7/0x750 [ 1020.422712] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1020.427230] ? skcipher_setkey+0x1ab/0x2e0 [ 1020.431489] setkey+0x21f/0x410 [ 1020.434791] ? crypt_done+0xa0/0xa0 [ 1020.438453] skcipher_setkey+0x163/0x2e0 [ 1020.442534] skcipher_setkey+0x3f/0x50 [ 1020.446428] ? hash_accept_nokey+0x90/0x90 [ 1020.450681] alg_setsockopt+0x306/0x3b0 [ 1020.454675] __sys_setsockopt+0x1ba/0x3c0 [ 1020.458835] ? kernel_accept+0x310/0x310 [ 1020.462911] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1020.467508] ? trace_hardirqs_on+0xbd/0x310 [ 1020.471845] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1020.477573] ? trace_hardirqs_off_caller+0x300/0x300 [ 1020.482699] __x64_sys_setsockopt+0xbe/0x150 [ 1020.487131] do_syscall_64+0x1b9/0x820 [ 1020.491046] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1020.496442] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1020.501388] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1020.506248] ? trace_hardirqs_off+0x310/0x310 [ 1020.510758] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1020.515792] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1020.520826] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1020.525693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1020.530892] RIP: 0033:0x457579 10:09:50 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0713420, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000f7, 0x7ffffffff000) 10:09:50 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) [ 1020.534096] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1020.553033] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1020.560755] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1020.568034] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1020.575332] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1020.575347] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1020.589881] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:50 executing program 5: getpid() syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x5, 0x4000) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x80000, 0x0) r1 = geteuid() getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) write$P9_RSTATu(r0, &(0x7f00000002c0)={0x69, 0x7d, 0x2, {{0x0, 0x49, 0x1, 0x5, {0x52, 0x1, 0x5}, 0x40310000, 0x7, 0x7, 0xffffffff, 0x4, 'em0:', 0x0, "", 0x7, 'posix_acl_access', 0x2, ',:'}, 0xb, '/dev/vsock\x00', r1, r2, r3}}, 0x69) 10:09:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = memfd_create(&(0x7f0000000040)='\x00', 0x2) ioctl$KDGETLED(r1, 0x4b31, &(0x7f00000001c0)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/igmp6\x00') setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e20, 0x3, @mcast2, 0x40}, {0xa, 0x4e23, 0x81, @ipv4={[], [], @multicast2}, 0x4}, 0x80000000, [0x8, 0x1ff, 0x8c9, 0x0, 0x80000001, 0x4, 0xe0f7, 0x70b8]}, 0x5c) chdir(&(0x7f0000000240)='./file0\x00') setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:50 executing program 2 (fault-call:4 fault-nth:31): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:50 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:50 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0011c20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001e1, 0x7ffffffff000) 10:09:50 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x6}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000100)={r1, 0x1, 0xdd, "adc2c583d442133dcae1df25a4b416fe27e52ad78aea132db635206fcdd92c04d7c3cfe80b94e5f084b27e70992b02efc326eaf36771bf3b64e78dcf0bf9188c8d77cb8889ea2d52ef1b96a0010e82f78921970d613e53130c94476cd669b740dd10297e750ec5af5b039d704c9f4cc299c78188e49af6abc6890f95ad57812fc7d8c815caa1cfee00972d840f7e489f2cd7383335eced1e0e7d123ee7aa5d45082a846dc87de88d6bfab468e26ea31bfbbf9d3603bf37320dd2c8c20284b788afbc39195505f9370947e99c1173ecdf26afdb68f370e69dc4d18964ec"}, 0xe5) kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) [ 1020.853168] FAULT_INJECTION: forcing a failure. [ 1020.853168] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1020.865037] CPU: 0 PID: 12814 Comm: syz-executor2 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1020.873534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1020.882892] Call Trace: [ 1020.882919] dump_stack+0x1d3/0x2c4 [ 1020.882947] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1020.882969] ? print_usage_bug+0xc0/0xc0 [ 1020.883000] should_fail.cold.4+0xa/0x17 [ 1020.889207] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1020.889227] ? is_bpf_text_address+0xac/0x170 [ 1020.889248] ? check_preemption_disabled+0x48/0x200 [ 1020.889274] ? mark_held_locks+0x130/0x130 [ 1020.889289] ? rcu_softirq_qs+0x20/0x20 [ 1020.889304] ? rcu_softirq_qs+0x20/0x20 [ 1020.889323] ? unwind_dump+0x190/0x190 [ 1020.933263] ? is_bpf_text_address+0xd3/0x170 [ 1020.937773] ? kernel_text_address+0x79/0xf0 [ 1020.942206] ? unwind_get_return_address+0x61/0xa0 [ 1020.947146] ? __save_stack_trace+0x8d/0xf0 10:09:51 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) fstat(r0, &(0x7f0000000000)) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x40, 0x0) fcntl$dupfd(r0, 0x0, r0) 10:09:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000440)={0x5, 0x70, 0xffffffffffff0000, 0x84a7, 0x401, 0x8, 0x0, 0x7, 0x10, 0x9, 0x0, 0x9, 0x400, 0x9, 0x307, 0x7, 0x4, 0x3, 0x1f, 0x1000, 0x29, 0x0, 0xff, 0xa84, 0x1f, 0x1000, 0x2, 0x4, 0x0, 0x5, 0x1f, 0x4, 0x9, 0x6, 0x3, 0x3, 0x2, 0x1000, 0x0, 0x2, 0x2, @perf_config_ext={0x101, 0x24d80000000}, 0x80, 0x80000001, 0x4, 0x1, 0x2, 0x4e, 0x2}, r2, 0x10, r1, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000100)=0x2, 0x4) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) write$UHID_CREATE2(r1, &(0x7f0000000140)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0xe2, 0x2, 0xb80, 0xc6, 0x80, 0x1, "05ccfc6006b0c4c8887825a25ad7b3e1730b1d4a352701dd190b33cdadaae79ac79af717eb395d8b39678dfe759414382e575699675a0bd18ac4b42c75fc7a1a4b7809104f75dba9ab63e1bbaec00b7bfe88e6c401790c7eeb985666db96263fa5169f4218ca790d89a0712dbd70f120f20b2a0be9ead8094a9a2759e118e26e430f1b28b180ba36c4ae2533092065cfbedc2f36cc7ff776e6ae0c4c31eb53d8d7349c964ec78a9acfe70c0c3d8835c63d0e48129beaeaee367bdbbe23c401bf7db813c2556d04f7cdb0287f2b947c5047a137dc69dc4098c320f5f188bffd6412d3"}, 0x1fa) r3 = shmget$private(0x0, 0x1000, 0x200, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000340)=""/239) [ 1020.951492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1020.957039] ? should_fail+0x22d/0xd01 [ 1020.960942] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 1020.966071] __alloc_pages_nodemask+0x34b/0xdd0 [ 1020.970757] ? save_stack+0x43/0xd0 [ 1020.974395] ? kasan_kmalloc+0xc7/0xe0 [ 1020.978299] ? kmem_cache_alloc_trace+0x152/0x750 [ 1020.978316] ? gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1020.978339] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 1020.978355] ? do_syscall_64+0x1b9/0x820 [ 1020.978380] ? find_held_lock+0x36/0x1c0 [ 1020.987907] ? trace_hardirqs_off+0xb8/0x310 [ 1020.987926] cache_grow_begin+0x91/0x8c0 [ 1020.987946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1020.987963] ? check_preemption_disabled+0x48/0x200 [ 1020.987985] kmem_cache_alloc_trace+0x67e/0x750 [ 1020.988012] gf128mul_init_64k_bbe+0xa5/0x7e0 [ 1021.015245] ? skcipher_setkey+0x1ab/0x2e0 [ 1021.015268] setkey+0x21f/0x410 [ 1021.015288] ? crypt_done+0xa0/0xa0 [ 1021.040585] skcipher_setkey+0x163/0x2e0 [ 1021.044683] skcipher_setkey+0x3f/0x50 [ 1021.048582] ? hash_accept_nokey+0x90/0x90 [ 1021.052825] alg_setsockopt+0x306/0x3b0 [ 1021.052848] __sys_setsockopt+0x1ba/0x3c0 [ 1021.052866] ? kernel_accept+0x310/0x310 [ 1021.052888] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1021.069629] ? trace_hardirqs_on+0xbd/0x310 [ 1021.073969] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1021.079348] ? trace_hardirqs_off_caller+0x300/0x300 [ 1021.084478] __x64_sys_setsockopt+0xbe/0x150 [ 1021.088903] do_syscall_64+0x1b9/0x820 [ 1021.092805] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1021.098198] ? syscall_return_slowpath+0x5e0/0x5e0 10:09:51 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0611d20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1021.103162] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1021.108031] ? trace_hardirqs_off+0x310/0x310 [ 1021.112563] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1021.117593] ? prepare_exit_to_usermode+0x291/0x3b0 [ 1021.122802] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1021.127663] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1021.127676] RIP: 0033:0x457579 10:09:51 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) socketpair$inet6(0xa, 0x6, 0x7f, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x5, 0x80c80) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000100)={r1, r2}) kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) [ 1021.127693] Code: 1d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1021.127701] RSP: 002b:00007f4573057c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1021.127718] RAX: ffffffffffffffda RBX: 00007f4573057c90 RCX: 0000000000457579 [ 1021.127727] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000004 [ 1021.127742] RBP: 000000000072bf00 R08: 0000000000000010 R09: 0000000000000000 [ 1021.184510] R10: 0000000020000180 R11: 0000000000000246 R12: 00007f45730586d4 [ 1021.191790] R13: 00000000004c397c R14: 00000000004d58e8 R15: 0000000000000005 10:09:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001ad, 0x7ffffffff000) 10:09:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="4ba975b001343d915defe8f2325e23346cc8bbe2c77298dd964b31681cc4805ac1570004a370d58358000351c3fa0db4ba", 0x31) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x0) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) 10:09:51 executing program 2 (fault-call:4 fault-nth:32): r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:51 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0b12620, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1021.383307] QAT: Invalid ioctl 10:09:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) r1 = dup(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000100)={0xa, 0x4, 0xfa00, {r2}}, 0xc) 10:09:51 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x202851c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1021.437081] QAT: Invalid ioctl 10:09:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:51 executing program 5: kexec_load(0x0, 0x80000c2, &(0x7f0000000080), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x62e1, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) 10:09:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000e4, 0x7ffffffff000) 10:09:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000600)='/dev/autofs\x00', 0x141e40, 0x0) sendmsg$rds(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/72, 0x48}, {&(0x7f00000001c0)=""/239, 0xef}, {&(0x7f00000002c0)=""/182, 0xb6}], 0x3, &(0x7f0000000500)=[@cswp={0x58, 0x114, 0x7, {{0x8, 0x3}, &(0x7f0000000380)=0xbe, &(0x7f00000003c0)=0xefe, 0x80, 0x7, 0xb5, 0x5, 0x20, 0xc7}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000400)=""/173, 0xad}, &(0x7f00000004c0), 0x4}}], 0x88, 0x4000}, 0x85) 10:09:51 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x200371c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x3, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:51 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0x48, "20600a626878a859c3f877f1a087dd221199ca36ad212b0da1bee90dd32945791c8c9f3e759d042b76799fe8b58f62fe2244b7bae8f677ef875b3376a1f406f8aa1d25b2a185bea2"}, &(0x7f0000000100)=0x50) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r1, 0x2}, &(0x7f0000000180)=0x8) kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) 10:09:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b0", 0x0) 10:09:51 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc041382000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000e1, 0x7ffffffff000) 10:09:51 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:51 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x280, 0x0) sendmsg$unix(r0, &(0x7f0000000440)={&(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000340)="fe2a1910301e29b79f2b6ff0f94a6f00d3aa268861bfa942a1a8978b6b8f8634fc79ac7bc9e790f70ddaa657cbd97a6eb859dad947551072b0c3962f3a1a1c6c3bde62d2a2564fcefe16809aa99050b25e5221e95d21466998be93abf99f8ec0f8f25179aa7a3681f18d782a3bd926abb089b4096b1e9a704d56de9ddf6141a19faa9e50184b26feead6b712db4dcd6186ba77bc98ca214a478921ab1fc07ba9057daa40d818b1ed3017d7276e49fbe0e49f65e6", 0xb4}], 0x1, 0x0, 0x0, 0xc801}, 0x4) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4100, 0x0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000240)={0x8, 0x4f24}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x6000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="da0000ea10d7a657f72a233762b3e23b39a040edcc905c29677cf631825107273786d96542ff42e7a89d769edbcf964e845cf726c31e9449ca35bb287d04b88361319f02e6f3aa8b929d06ac9485efeb457fb7d006706d37aaa0b7544bff76faae5b3e9ebbf6cf0baae503f4bc25a5ed2a56604851c339987bf637f6b8055d2bff3bcc5ece10c315fc28dd6c5a1021a367d20ac45cd4c1553158e69c347811011a9a3dd0aa4b38b558933ffac406fae82aa9742f72d81e4abab673797728a04eb03a6ff7929a64eed1a0a29bc318ecab4f56e48707deae66af80868435b3"], &(0x7f0000000180)=0xe2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000001c0)={r3, 0x5d67}, &(0x7f0000000200)=0x8) 10:09:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x5, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x300, 0xdb26efbffc2c3495) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000080)={0x7, [0x5, 0x4, 0x71c, 0x3, 0x200, 0x9, 0x5]}, &(0x7f00000000c0)=0x12) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'ip_vti0\x00', 0x8}) socket$alg(0x26, 0x5, 0x0) 10:09:52 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x1f) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, r2, 0x20, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7ff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x47}]}, 0x44}, 0x1, 0x0, 0x0, 0xd1}, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) ioctl$TIOCGPTPEER(r0, 0x40045436, 0x14) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x8, 0x80802) ioctl$ASHMEM_SET_PROT_MASK(r3, 0x40087705, &(0x7f0000000080)={0x3d82, 0x7fff}) getsockname(r3, &(0x7f0000000300)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000380)=0x80) sendmsg$IPVS_CMD_GET_DAEMON(r4, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x4c, r2, 0x101, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xa80}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffffffffff81}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x4814) 10:09:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000194, 0x7ffffffff000) 10:09:52 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc071222000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:52 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x10, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) getsockopt$sock_int(r0, 0x1, 0x3f, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="cafa3232add4e1945bb4004d1e02000000000000c5c8e52808c19ff8b5eaf6a3a39ce541192eef31d91bae5369e44b", 0xffffffffffffff84) 10:09:52 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0a10d2000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:52 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x3) 10:09:52 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0xffffff1f, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000092, 0x7ffffffff000) 10:09:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = dup(r0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000001440)={0x1, 0x8, 0x3f, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'gre0\x00'}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x400000) sendmsg$nfc_llcp(r2, &(0x7f0000001400)={&(0x7f0000000100)={0x27, 0x1, 0x1, 0x5, 0x5bd, 0x4, "853d29bf7941d82543875e638ba9c85ef0697a3be8502286f23be38f48ede8cf6119a0f3e863e06fdbcf8962b33bc2c24faf299b2b82e3cd2caeeca0d33da9", 0x2c}, 0x60, &(0x7f0000000040)=[{&(0x7f00000001c0)="3f41e94811bdaafc5b444adcf61db9b7bed034a3800e5b2d2a6a552c6f71713fd0e2bbac2157ea6fc376d0dcfb75831d4831683cb6acfa1ea7ddf0bfd82cb24126832452405f53515a1da087db6394d5f31342", 0x53}, {&(0x7f0000000240)="3c14e5705ff2d3255c2269b58f0836806305a10fbfc24f83f583a04a096d71bdf657ca212ff0c087f09e0b65f20bb3d9e1b8d26e37c58623cac8e1ea385dbc0c1dedc026e6a8da128fd3bc1c6b3a74f9c5ad23e85055928b5296b234ad770a734fcf4adc449cc196b0785291177243ef5b50e2bec1632ff9e6d9f0e79390788db932647af4147cca5dc11b2f73a2632041a16237c1ec06b7138e3a0c48a057", 0x9f}, {&(0x7f0000000300)="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", 0x1000}], 0x3, &(0x7f0000001300)={0xe0, 0x10f, 0x3ff, "0a4ef74afc088866988115f4fd753d782b712f4b5b82a0c03fcdf77d1aed74abdaa1d580ac7d09b0b9c6ca6aab73f757052d2cddb189f0156a981e0b8869350acac0faa3e8982972bbaeb50913793f439c8a90b349ceccf27375231a74be28f09991680599a24c491d432cde98cc5d4fb1d3cc8ca824020ea5a18535b0909941afe249818d49a4edadee25e27c738473892855eada02261d53249e857a407f210131da8af3acebe4c34da7c95fb1380e4b99614315c3e48e06c01738f7eaac41953516d1db90fed154"}, 0xe0, 0x4}, 0x80) 10:09:52 executing program 5: socketpair(0x9, 0x80000, 0x8, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="674466980100000000000200030000002bb11752e14af1f74cb7db5bdae1bc98f3a14e19faad8b68213bd48048f67b9881789159198aa4514dec5dad542ca313ffa22d502b0225c9fc68c60123d56f803ed7bb37e9d69123e1bb569c476aa76d6ca3ccd7207abe0794985adccd525bb9733233b8fcc7afe33f285d4f8e947441af75f743342fa65841ca913642d316bc77aa219f21159b4d95435d5eb6898ddc80383c6ad56da439c743166a38a00a2ff6382590f4470f0fa6"], 0xb9) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) fchmod(r1, 0xb0) 10:09:52 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0912b2000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:52 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0xff00, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0xfffffe5e) 10:09:52 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0711e20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:52 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x33fe0, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x200000000000007e, 0x7ffffffff000) 10:09:52 executing program 5: nanosleep(&(0x7f0000001600)={0x0, 0x989680}, &(0x7f0000001640)) kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x10000, 0x0) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f00000000c0)) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f00000015c0), 0x4) clock_gettime(0x7, &(0x7f0000000040)) readv(r0, &(0x7f00000016c0), 0xf4) 10:09:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000040)=0x100000000, 0x4) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000107, 0x7ffffffff000) [ 1022.679161] netlink: 212940 bytes leftover after parsing attributes in process `syz-executor4'. 10:09:52 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0e13820, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="100775b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:52 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0xf, r2, 0x601}, 0x33fe0}}, 0x0) 10:09:52 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xc4, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xd5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2e}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x4}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xf4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xe35}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x83}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffffb}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0xc4}, 0x1, 0x0, 0x0, 0x800}, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000580)='nbd\x00') r3 = syz_open_dev$mouse(&(0x7f00000005c0)='/dev/input/mouse#\x00', 0xb219, 0x4000) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rfkill\x00', 0x4000, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640)='/dev/rtc0\x00', 0x101080, 0x0) r6 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vhci\x00', 0x0, 0x0) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/zero\x00', 0x101000, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000b00)={'vcan0\x00', {0x2, 0x4e21, @local}}) socketpair(0x9, 0x8000f, 0x800, &(0x7f00000009c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000ac0)={&(0x7f0000000540), 0xc, &(0x7f0000000a80)={&(0x7f0000000a00)={0x54, r2, 0x302, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000001380)={0x77359400}, &(0x7f00000013c0)) r9 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') r10 = syz_open_dev$amidi(&(0x7f0000000b40)='/dev/amidi#\x00', 0x44f, 0x602001) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000b80)={'ip6gre0\x00', 0x0}) sendmsg$kcm(r10, &(0x7f0000001340)={&(0x7f0000000bc0)=@ll={0x11, 0x7, r11, 0x1, 0x1d93, 0x6, @broadcast}, 0x80, &(0x7f0000001140)=[{&(0x7f0000000c40)="7553370cf418e43b4265a242af048abd087aca3e7e1743f7155669d8ec09c3b9a08fb33d6ba8dc5583d42c704d1d3adcfe6f84b54ca3ab291f7adcf15810639ef61f325a7e0ea30dd582f9c2e7e630fb9454895fc817c34b08f72dee89c770346154ed9aa94076a760cfbab9391d618bcc3a37a19778a753e0c067487a3e00", 0x7f}, {&(0x7f0000000cc0)="57a5702d971398a9cffd52abf86a8e2dd9e0fdf308b1e9410774b125725724c2f1b24b3b30711834af59bb65d9ad2067479588a752ac3947d9ccf9f9fc7156fe93fcb0d7abd2d07c94ea6b6fad23768a7427af1c3f9f", 0x56}, {&(0x7f0000000d40)="b02f4b3e2b43ae5851fa252a731184f762aca28557b19a710128cb0b9a65b1c4af540cc25bd713c8ade50c22f98cba58a6eb5788ad54b7235275a596a38bde7b77765ea456a790878d483293c76651f5a7859bc56b96f8fb4b589300428bcb5230bcb24a83931ae6ea201948ce9ba60b7337c7d73ad9ed9e00d9ba100c6489d3aa6c1914f1f47e63274637b060a60f8cac4b0a7f3969f59f2aeeac5cdedca85598044cae6bec0e6705a58d2acfe1740c1623bce6b3439924999047c18dd8602580f37f3cf5efe648d25977eeeb64e1b5a9ef035cab5f3d44e717893f440202733e881aeb6431da4bcb8bc8567c5b", 0xee}, {&(0x7f0000000e40)="e0ec94bb3d93377960c90954", 0xc}, {&(0x7f0000000e80)="54b89668c63f8f59d03677edd147422c10b9acfc4b95bf69543461d5ff28c081b33e4d1d3dc70c7c043f646f60a8f6d488560740cc84d9a96bea6177f14a52fb8d9579919ccb41a5cb592f2b14ca31fee493e53bae34599bcfe62372884f32f690f08c2e5db08a158f956014d204a87cd8e6154eb4361b98215ad8c019155321ba3d7d474d8d10fa9318bdf6537206cc83af", 0x92}, {&(0x7f0000000f40)="6bbfbce23e8a2fc5b710e878b50ec320c81c330ad2cb01dfb20819a3b6", 0x1d}, {&(0x7f0000000f80)="db71c4b3a851b64a4abe656427865bdcd375f3a3a73454970fd1220d67247bd14a794610e91cc3f6e392d03e716037beff4cd7ed288e31a014bcbbad5ceaa6b89e687ce244321b363dc3a8614ae1fb35129439a8a6f7dca1fe336de4ffb001f7f4196f56c33f29d7134eb7de362b03210d8771b58f64d2ed33d8193c1817fb3ea50fa204ac9211a9a781c2cd82527997cb18d559429634476ddf3c67fc439d07273f6955e799cecbeeb8e22d30", 0xad}, {&(0x7f0000001040)="5c8caa96f41097840d4695a23375e4dff8228c3d5aa0fa7a83c857d0e5a97125c8fec97e2e7dd24cd46dfa0c12c52a9c05b1636f38af618131ed7e43e1544d7eadf34c0514d2519517acb76d137b795919c4678b9ed20d8daa0539d55601c2bcc7c15be4cdf12052f055329d2cfec134ca7275cc5eb841b820e37c8f277b", 0x7e}, {&(0x7f00000010c0)="ada18c489a7c6a066f3e1c49f199a0b39f77c69a846d0d496955bffa0b5693c6066d21706e02fdaa49d9cb1e31943ece372dcaef6885b50123b461643ca6f1de3cebc8ceb22a8db9c8f8a6e192d762", 0x4f}], 0x9, &(0x7f0000001200)=[{0x20, 0x1bf, 0xaef, "6d088f8da2b9160eb62a02913622"}, {0xf0, 0x0, 0x401, "9780109fccd56a150e1bc99bd92c1ca63dc5e0dff7ca10bf448efad3f051b2acec7426cba2ca01a2705750add72576f5fe716ab3e0a56e1c9ecffb9086a361f5deab7cbd9e64c32bb32fd211281c0282d849c23229865aa1c70d3da7fa42d92ae42e53fdecb2a5123626de1feba4b5f9d760e3b6bc8d0b36a612106f1a734c4f45c4058e8a540cb3bfed662b86ff98812e0c8fe0177760337befe7f42a0d1262bce6a949919c641f16620d0bff22b931048bba167326b84cbc10ae0152790e68b3c2dad5ff43ff948724311c86df0df16b244dd5e592a90e1f8a076a"}], 0x110, 0x800}, 0x4) getsockname$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000340)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000440)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000004c0)=0x14) ioctl$KVM_SET_SIGNAL_MASK(r5, 0x4004ae8b, &(0x7f0000000780)={0xfffffffffffffef6, "a2eeaddaff13add8da298e388e40fc207703b359979c4e5d9f0cb0957062fdb07d5ea6505ca1ba04e291832103b7428d62e6e3960a7b0f0818f21958792f9aa1b3b5ee0c8187486f4cf13b3ae1cfa5860a8366475d6cdb929e3ead7b9d39ba40eda0a7ebafff23176618a94895bc46d66c207b38b1d5dee80f07e744a00aedf934aca4dc2fd0345dde00420945e7cd3ac1833ecdae30362f00e0d82400000000000000000000000000"}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'syzkaller0\x00', 0x0}) mq_notify(r7, &(0x7f00000015c0)={0x0, 0x3a, 0x2, @thr={&(0x7f00000014c0)="b6a2ab78af9e30a5c6963aeefc7d66d3a20117896d724e59648256579037ae3b2a0c0ad5841dda573e49ce4b597a215efac1b15f35036f2308c2bab6e1d6162d1413ca1fbbb25dc84e4c62f39de0b8198c9af3bb0ede2f3959301d7d6a2fecc70dd096789f6553d05e6e0376eb1f6f8e7581a5941c34f36a723814950fdb1a2b6946aea2f3440bce881681a6db334e2edea0483c123e9d0d287d3d5c5f87b7b5382f18a3f04ec773f4e375eee3ba36512bb0aa325340238b21d481ae3f1ab4", &(0x7f0000001580)="b9512c298859923430534beed838ed"}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000740)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000700)={&(0x7f0000001600)=ANY=[@ANYBLOB="81b7c834934a3c54031b67344785de4b12910a61422dcd04f6b1288e944baeda41a8b334f8cd41ead693f5c4c87cb1f62d91fd85581af9787afbe2b2f873a27b513638081882f6653d031491e93f8e2f5f868b84b9e383f53fae2aaf26a03214f39abfcb3c38e5641931a8929f15bfcd2bf8181b19ce5b", @ANYRES16=r9, @ANYBLOB="00082abd7000ffdbdf250100000008000100", @ANYRES32=r12, @ANYBLOB="7401020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003e10200000008000400e01ac6c3e63fe7", @ANYRES32=r13, @ANYBLOB="080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400ffffff7f08000600", @ANYRES32=r14, @ANYBLOB="7c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000004c000400f8ffff08ff0f00001f000005ff0100009e00ff01ff0f000040001f060d1600000200f9090500000006000709260000000400020908000000010000b10000000008000704feea000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400040000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r15], 0x190}, 0x1, 0x0, 0x0, 0x4008004}, 0x4010) 10:09:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) 10:09:52 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x203bc1c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a1075b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @remote}}}, &(0x7f0000000040)=0x84) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r2, 0x9}, 0x8) 10:09:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0875b005e381e5b3b60ced5c54dbb7", 0x10) 10:09:53 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x608}, 0x33fe0}}, 0x0) 10:09:53 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0813b20, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000001d9, 0x7ffffffff000) 10:09:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b008e381e5b3b60ced5c54dbb7", 0x10) 10:09:53 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0f12020, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x3cd) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) accept$alg(r0, 0x0, 0x0) 10:09:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000002a0, 0x7ffffffff000) 10:09:53 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x603}, 0x33fe0}}, 0x0) 10:09:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b010e381e5b3b60ced5c54dbb7", 0x10) 10:09:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$sock_bt(r1, 0x8907, &(0x7f0000000100)="4266c37bccbcce20b888ab9edb984edb957fd3d63a52bedce85c3667df71c6cc21ed0dd889b51c4619a18d34f3dd8affcc019fef814535628645aa81038fcae9cb350b465968c903b7f71efcc660885f9bec87644d175a5ad28bf10005cb1c8ce2e3d3adb68b71acd4c1bf81f96530a5f39bff43913e88d456b6f762f51394b622729c27c2cde8dcc00f") bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b00d546dce0a5817fa776fb1a0bfe0c04195985193436fd50c19c85f27e8e4fbcdac0b0e87", 0xfffffffffffffe94) 10:09:53 executing program 5: kexec_load(0x0, 0x0, &(0x7f0000000180), 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x3c, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\x00') ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000080)={0xb, 0x4dab, 0x400}) 10:09:53 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x202e71c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:53 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x602}, 0x33fe0}}, 0x0) 10:09:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x10001, 0x0, 0x6}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r2, 0x0, 0x41}, &(0x7f00000001c0)=0xc) 10:09:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b610ed5c54dbb7", 0x10) 10:09:54 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x202a01c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:54 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') 10:09:54 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601, 0xf}, 0x33fe0}}, 0x0) 10:09:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x20000000000000fd, 0x7ffffffff000) 10:09:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x17, &(0x7f0000000040)=0x9, 0x4) listen(r0, 0x2) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="070075b05104805dc9ac29521b3ee8a871c21e150b0933d0348978ef8865b52cbaa327d8b27fa03aa6e5", 0xfffffffffffffd77) 10:09:54 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc051102000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x4) 10:09:54 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601, 0x3}, 0x33fe0}}, 0x0) 10:09:54 executing program 5: r0 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_ifreq(r0, 0x8995, &(0x7f00000000c0)={'veth1_to_bond\x00', @ifru_flags}) 10:09:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) readahead(r0, 0x200, 0x1825) r1 = accept(r0, 0x0, &(0x7f0000000000)) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000011c0)={@nl=@unspec, {&(0x7f00000001c0)=""/4096, 0x1000}, &(0x7f0000000140), 0x4}, 0xa0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x1c, &(0x7f0000000040)=""/2, &(0x7f0000000100)=0x2) socket$alg(0x26, 0x5, 0x0) 10:09:54 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0f1292000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000142, 0x7ffffffff000) 10:09:54 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601, 0xffffff7f00000000}, 0x33fe0}}, 0x0) 10:09:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x8) 10:09:54 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc0113320, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:54 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff034}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000000), 0x4000000000000fe, 0x0) 10:09:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_buf(r0, 0x1, 0x37, &(0x7f0000000000)=""/9, &(0x7f0000000040)=0x9) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) 10:09:54 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601, 0x300000000000000}, 0x33fe0}}, 0x0) 10:09:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x9) 10:09:54 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x202b81c0, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) [ 1024.733821] kasan: CONFIG_KASAN_INLINE enabled 10:09:54 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x201ef1c0, 0x1, &(0x7f0000000180)=[{&(0x7f00000001c0), 0xc091392000000000, 0x1cbef1000, 0x1000000}], 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x40, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x1) 10:09:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x6, 0x0, 0x38, 0x0, 0x1, 0x0, 0x20, 0x0, 0x6, 0x5, 0x800}, [{0x60000007, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd7, 0xe57d}], "", [[], []]}, 0x258) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') preadv(r0, &(0x7f0000000480), 0x2000000000000209, 0x7ffffffff000) [ 1024.762527] kasan: GPF could be caused by NULL-ptr deref or user memory access 10:09:54 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000100), 0xc) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x601, 0x3000000}, 0x33fe0}}, 0x0) [ 1024.817714] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 1024.822890] kobject: 'loop4' (0000000051ce71af): kobject_uevent_env [ 1024.824000] CPU: 0 PID: 13205 Comm: syz-executor5 Not tainted 4.19.0-rc5-next-20180925+ #79 [ 1024.838864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1024.847454] kobject: 'loop4' (0000000051ce71af): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1024.848269] RIP: 0010:__skb_flow_dissect+0x3b5/0x5980 10:09:54 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775b0", 0xc89d1f79) 10:09:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x30) [ 1024.848288] Code: 48 c1 ea 03 80 3c 02 00 0f 85 a6 4d 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 77 10 49 8d be 80 05 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 5c 4d 00 00 4d 8b b6 80 05 00 00 48 b8 00 00 00 [ 1024.881788] RSP: 0018:ffff880195796d50 EFLAGS: 00010202 [ 1024.887163] RAX: dffffc0000000000 RBX: ffff880195797120 RCX: ffffc9000a280000 [ 1024.894454] RDX: 00000000000000b0 RSI: ffffffff8612a888 RDI: 0000000000000580 [ 1024.895396] kobject: 'loop1' (000000003af62ef6): kobject_uevent_env [ 1024.901734] RBP: ffff8801957974b0 R08: ffff8801c0224240 R09: ffffed003b5a5b57 10:09:55 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0xffffffffffffff3b) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="0a0775b0", 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000)={0x1}, 0x4) [ 1024.901743] R10: ffffed003b5a5b57 R11: ffff8801dad2dabb R12: ffffffff8a521d24 [ 1024.901752] R13: ffffffff8a521d26 R14: 0000000000000000 R15: ffff8801d5b732c0 [ 1024.901765] FS: 00007f3f7ae1d700(0000) GS:ffff8801dac00000(0000) knlGS:0000000000000000 [ 1024.901774] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1024.901782] CR2: 0000000000625208 CR3: 00000001bbc3c000 CR4: 00000000001406f0 [ 1024.901793] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1024.901808] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 10:09:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="0a0775b005e381e5b3b60ced5c54dbb7", 0x5000) [ 1024.938609] kobject: 'loop1' (000000003af62ef6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1024.944098] Call Trace: [ 1024.944119] ? kasan_check_read+0x11/0x20 [ 1024.944135] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1024.944153] ? rcu_softirq_qs+0x20/0x20 [ 1024.991265] kobject: 'loop2' (000000005e509115): kobject_uevent_env [ 1024.991362] ? rcu_softirq_qs+0x20/0x20 [ 1025.001728] ? skb_flow_dissect_tunnel_info+0xd80/0xd80 [ 1025.007118] ? kernel_text_address+0x79/0xf0 [ 1025.011549] ? __kernel_text_address+0xd/0x40 [ 1025.016217] ? arch_uprobe_analyze_insn+0xfa0/0x16a0 [ 1025.020399] kobject: 'loop2' (000000005e509115): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1025.021339] ? __save_stack_trace+0x8d/0xf0 [ 1025.035091] ? save_stack+0xa9/0xd0 [ 1025.038726] ? save_stack+0x43/0xd0 [ 1025.042355] ? kasan_kmalloc+0xc7/0xe0 [ 1025.046248] ? __kmalloc_node_track_caller+0x47/0x70 [ 1025.051352] ? __kmalloc_reserve.isra.39+0x41/0xe0 [ 1025.056287] ? __alloc_skb+0x150/0x770 [ 1025.060219] ? alloc_skb_with_frags+0x133/0x7d0 [ 1025.064904] ? sock_alloc_send_pskb+0x865/0xab0 [ 1025.069643] ? unix_dgram_sendmsg+0x50b/0x1750 [ 1025.069989] kobject: 'loop2' (000000005e509115): kobject_uevent_env [ 1025.074236] ? unix_seqpacket_sendmsg+0x11f/0x1b3 [ 1025.074250] ? sock_sendmsg+0xd5/0x120 [ 1025.074263] ? ___sys_sendmsg+0x51d/0x930 [ 1025.074277] ? __sys_sendmmsg+0x246/0x6d0 [ 1025.074295] ? __x64_sys_sendmmsg+0x9d/0x100 [ 1025.089855] kobject: 'loop2' (000000005e509115): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1025.093536] ? do_syscall_64+0x1b9/0x820 [ 1025.093553] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1025.093569] ? rcu_softirq_qs+0x20/0x20 [ 1025.093589] ? print_usage_bug+0xc0/0xc0 [ 1025.102676] kobject: 'loop2' (000000005e509115): kobject_uevent_env [ 1025.111559] ? check_preemption_disabled+0x48/0x200 [ 1025.111579] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 1025.111593] ? rcu_pm_notify+0xc0/0xc0 [ 1025.111614] ? __lock_acquire+0x7ec/0x4ec0 [ 1025.111629] ? kmem_cache_alloc_node_trace+0x34b/0x740 [ 1025.111647] ? kasan_unpoison_shadow+0x35/0x50 [ 1025.115983] kobject: 'loop2' (000000005e509115): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1025.121223] ? kasan_kmalloc+0xc7/0xe0 [ 1025.121244] ? mark_held_locks+0x130/0x130 [ 1025.121262] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1025.121281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1025.121294] ? __alloc_skb+0x4c1/0x770 [ 1025.121307] ? skb_scrub_packet+0x490/0x490 [ 1025.121321] ? mark_held_locks+0x130/0x130 [ 1025.121347] ? __lock_acquire+0x7ec/0x4ec0 [ 1025.176775] kobject: 'loop3' (00000000c4570f68): kobject_uevent_env [ 1025.177614] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1025.177631] ? refcount_add_not_zero_checked+0x21e/0x330 [ 1025.177649] ? refcount_dec_if_one+0x180/0x180 [ 1025.181897] kobject: 'loop3' (00000000c4570f68): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1025.187411] ? alloc_skb_with_frags+0x508/0x7d0 [ 1025.187429] ? mark_held_locks+0x130/0x130 [ 1025.187461] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1025.206772] kobject: 'loop4' (0000000051ce71af): kobject_uevent_env [ 1025.209629] ? refcount_add_checked+0x2f/0x70 [ 1025.209647] ? graph_lock+0x170/0x170 [ 1025.209663] skb_get_poff+0x9b/0x1c0 [ 1025.209676] ? skb_get_poff+0x9b/0x1c0 [ 1025.209693] ? __skb_get_poff+0x2f0/0x2f0 [ 1025.217414] kobject: 'loop4' (0000000051ce71af): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1025.221630] ? __lock_is_held+0xb5/0x140 [ 1025.221728] bpf_skb_get_pay_offset+0x15/0x20 [ 1025.221749] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1025.305747] ? sk_filter_trim_cap+0x38e/0xa60 [ 1025.308446] kobject: 'loop0' (00000000f7fc8548): kobject_uevent_env [ 1025.310258] ? bpf_l3_csum_replace+0x4d0/0x4d0 [ 1025.310280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1025.316692] kobject: 'loop0' (00000000f7fc8548): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1025.321276] ? skb_copy_datagram_from_iter+0x451/0x660 [ 1025.321294] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1025.321313] ? unix_dgram_sendmsg+0x76c/0x1750 [ 1025.321333] ? lock_downgrade+0x900/0x900 [ 1025.355269] ? unix_stream_connect+0x1270/0x1270 [ 1025.360015] ? aa_af_perm+0x5a0/0x5a0 [ 1025.363813] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1025.369359] ? _copy_from_user+0xdf/0x150 [ 1025.373497] ? aa_sock_msg_perm.isra.12+0xba/0x160 [ 1025.378413] ? unix_seqpacket_sendmsg+0x11f/0x1b3 [ 1025.383243] ? unix_dgram_sendmsg+0x1750/0x1750 [ 1025.387900] ? sock_sendmsg+0xd5/0x120 [ 1025.391774] ? ___sys_sendmsg+0x51d/0x930 [ 1025.395933] ? copy_msghdr_from_user+0x580/0x580 [ 1025.400681] ? graph_lock+0x170/0x170 [ 1025.404479] ? __fget+0x4aa/0x740 [ 1025.407926] ? __fget_light+0x2e9/0x430 [ 1025.411884] ? fget_raw+0x20/0x20 [ 1025.415361] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1025.420884] ? sockfd_lookup_light+0xc5/0x160 [ 1025.425363] ? __sys_sendmmsg+0x246/0x6d0 [ 1025.429500] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 1025.433808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1025.439335] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1025.444873] ? put_timespec64+0x10f/0x1b0 [ 1025.449004] ? finish_task_switch+0x1f5/0x900 [ 1025.453483] ? nsecs_to_jiffies+0x30/0x30 [ 1025.457620] ? do_syscall_64+0x9a/0x820 [ 1025.461592] ? do_syscall_64+0x9a/0x820 [ 1025.465552] ? lockdep_hardirqs_on+0x421/0x5c0 [ 1025.470119] ? trace_hardirqs_on+0xbd/0x310 [ 1025.474427] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1025.479958] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1025.485310] ? trace_hardirqs_off_caller+0x300/0x300 [ 1025.490401] ? __x64_sys_sendmmsg+0x9d/0x100 [ 1025.494797] ? do_syscall_64+0x1b9/0x820 [ 1025.498845] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 1025.504201] ? syscall_return_slowpath+0x5e0/0x5e0 [ 1025.509117] ? trace_hardirqs_off+0x310/0x310 [ 1025.513596] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 1025.518619] ? recalc_sigpending_tsk+0x180/0x180 [ 1025.523371] ? kasan_check_write+0x14/0x20 [ 1025.527608] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1025.532444] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1025.537790] Modules linked in: [ 1025.542376] ---[ end trace 5242073dc9e52c42 ]--- [ 1025.547158] RIP: 0010:__skb_flow_dissect+0x3b5/0x5980 [ 1025.552445] Code: 48 c1 ea 03 80 3c 02 00 0f 85 a6 4d 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b 77 10 49 8d be 80 05 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 5c 4d 00 00 4d 8b b6 80 05 00 00 48 b8 00 00 00 [ 1025.571406] RSP: 0018:ffff880195796d50 EFLAGS: 00010202 [ 1025.576769] RAX: dffffc0000000000 RBX: ffff880195797120 RCX: ffffc9000a280000 [ 1025.584081] RDX: 00000000000000b0 RSI: ffffffff8612a888 RDI: 0000000000000580 [ 1025.591384] RBP: ffff8801957974b0 R08: ffff8801c0224240 R09: ffffed003b5a5b57 [ 1025.598678] R10: ffffed003b5a5b57 R11: ffff8801dad2dabb R12: ffffffff8a521d24 [ 1025.605967] R13: ffffffff8a521d26 R14: 0000000000000000 R15: ffff8801d5b732c0 [ 1025.613271] FS: 00007f3f7ae1d700(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 1025.621540] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1025.627442] CR2: 00007fd0b010a000 CR3: 00000001bbc3c000 CR4: 00000000001406e0 [ 1025.634713] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1025.642006] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1025.649294] Kernel panic - not syncing: Fatal exception [ 1025.655717] Kernel Offset: disabled [ 1025.659343] Rebooting in 86400 seconds..