x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) 23:25:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 162.223832][T11274] FAULT_INJECTION: forcing a failure. [ 162.223832][T11274] name failslab, interval 1, probability 0, space 0, times 0 23:25:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 162.288758][T11274] CPU: 0 PID: 11274 Comm: syz-executor.5 Not tainted 5.2.0-rc6+ #9 [ 162.296691][T11274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.306742][T11274] Call Trace: [ 162.310037][T11274] dump_stack+0x1d8/0x2f8 [ 162.314377][T11274] should_fail+0x608/0x860 [ 162.318799][T11274] ? setup_fault_attr+0x2b0/0x2b0 [ 162.323831][T11274] __should_failslab+0x11a/0x160 [ 162.328773][T11274] ? __d_alloc+0x2d/0x6e0 [ 162.333102][T11274] should_failslab+0x9/0x20 [ 162.337603][T11274] kmem_cache_alloc+0x56/0x2b0 [ 162.342364][T11274] __d_alloc+0x2d/0x6e0 [ 162.346519][T11274] d_alloc_parallel+0xcc/0x1560 [ 162.351373][T11274] ? memset+0x31/0x40 [ 162.355356][T11274] ? d_hash_and_lookup+0x1c0/0x1c0 [ 162.360471][T11274] ? lockdep_init_map+0x2a/0x680 [ 162.365408][T11274] __lookup_slow+0xfc/0x410 [ 162.369906][T11274] ? lookup_one_len+0x2a0/0x2a0 [ 162.374753][T11274] ? trace_lock_acquire+0x11c/0x190 [ 162.379955][T11274] ? kasan_check_write+0x14/0x20 [ 162.384892][T11274] ? __down_read+0x1a/0x1a0 [ 162.389400][T11274] walk_component+0x363/0x830 [ 162.394345][T11274] ? follow_managed+0x930/0x930 [ 162.399186][T11274] ? path_init+0xfa0/0xfa0 [ 162.403576][T11274] ? path_init+0x8a7/0xfa0 [ 162.408157][T11274] path_lookupat+0x22d/0xcb0 [ 162.412725][T11274] ? __kasan_kmalloc+0x178/0x1b0 [ 162.417811][T11274] ? user_path_at_empty+0x2d/0x50 [ 162.422898][T11274] ? __se_sys_newstat+0xcd/0x210 [ 162.427807][T11274] ? filename_lookup+0x6d0/0x6d0 [ 162.432725][T11274] ? kasan_check_write+0x14/0x20 [ 162.437633][T11274] ? do_raw_spin_lock+0x143/0x3a0 [ 162.442632][T11274] filename_lookup+0x225/0x6d0 [ 162.447371][T11274] ? hashlen_string+0x120/0x120 [ 162.452209][T11274] ? __check_object_size+0x314/0x400 [ 162.457484][T11274] ? strncpy_from_user+0x33e/0x3b0 [ 162.462572][T11274] ? getname_flags+0x214/0x640 [ 162.467311][T11274] user_path_at_empty+0x40/0x50 [ 162.472150][T11274] __se_sys_newstat+0xcd/0x210 [ 162.477182][T11274] ? trace_x86_fpu_regs_activated+0x213/0x250 [ 162.483225][T11274] ? __x64_sys_newstat+0x70/0x70 [ 162.488134][T11274] ? switch_fpu_return+0x1ca/0x290 [ 162.493232][T11274] ? copy_init_fpstate_to_fpregs+0x150/0x150 [ 162.499189][T11274] ? check_preemption_disabled+0xb7/0x280 [ 162.504883][T11274] ? debug_smp_processor_id+0x1c/0x20 [ 162.510227][T11274] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 162.516440][T11274] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 162.522132][T11274] ? kasan_check_write+0x14/0x20 [ 162.527049][T11274] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 162.532490][T11274] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 162.538187][T11274] ? do_syscall_64+0x1d/0x140 [ 162.542841][T11274] __x64_sys_newstat+0x5b/0x70 [ 162.547590][T11274] do_syscall_64+0xfe/0x140 [ 162.552066][T11274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 162.557931][T11274] RIP: 0033:0x458835 [ 162.561801][T11274] Code: 0f 44 04 24 48 83 c4 18 c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 83 ff 01 48 89 f0 77 30 48 89 c7 48 89 d6 b8 04 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 03 f3 c3 90 48 c7 c2 d4 ff ff ff f7 d8 64 89 [ 162.581379][T11274] RSP: 002b:00007f6588da59e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000004 [ 162.589765][T11274] RAX: ffffffffffffffda RBX: 00007f6588da66d4 RCX: 0000000000458835 [ 162.597719][T11274] RDX: 00007f6588da5a20 RSI: 00007f6588da5a20 RDI: 00007f6588da5ba0 [ 162.605681][T11274] RBP: 0000000000000006 R08: 0000000000000000 R09: 000000000000000c [ 162.613643][T11274] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000004 [ 162.621598][T11274] R13: 0000000000000000 R14: 0000000000000005 R15: 0000000000000003 23:25:49 executing program 5 (fault-call:0 fault-nth:62): syz_read_part_table(0x0, 0x0, 0x0) 23:25:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}, 0x0) 23:25:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}, 0x0) 23:25:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 162.873602][T11311] FAULT_INJECTION: forcing a failure. [ 162.873602][T11311] name failslab, interval 1, probability 0, space 0, times 0 [ 162.937347][T11311] CPU: 0 PID: 11311 Comm: syz-executor.5 Not tainted 5.2.0-rc6+ #9 [ 162.946795][T11311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.956943][T11311] Call Trace: [ 162.960251][T11311] dump_stack+0x1d8/0x2f8 [ 162.964994][T11311] should_fail+0x608/0x860 [ 162.969414][T11311] ? setup_fault_attr+0x2b0/0x2b0 [ 162.974457][T11311] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 162.980193][T11311] __should_failslab+0x11a/0x160 [ 162.985140][T11311] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 162.990863][T11311] should_failslab+0x9/0x20 [ 162.995370][T11311] __kmalloc+0x7a/0x310 [ 162.999530][T11311] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 163.005557][T11311] tomoyo_realpath_from_path+0xdc/0x7c0 [ 163.011110][T11311] tomoyo_path_number_perm+0x1e0/0x740 [ 163.016566][T11311] ? trace_lock_acquire+0x190/0x190 [ 163.021764][T11311] ? __check_object_size+0x314/0x400 [ 163.027068][T11311] ? tomoyo_check_path_acl+0x180/0x180 [ 163.027094][T11311] ? strncpy_from_user+0x33e/0x3b0 [ 163.037675][T11311] ? fget_many+0x30/0x30 [ 163.037687][T11311] ? debug_smp_processor_id+0x1c/0x20 [ 163.037698][T11311] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 163.037710][T11311] tomoyo_file_ioctl+0x23/0x30 [ 163.037723][T11311] security_file_ioctl+0x6d/0xd0 [ 163.047290][T11311] __x64_sys_ioctl+0xa3/0x120 [ 163.047307][T11311] do_syscall_64+0xfe/0x140 [ 163.047320][T11311] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 163.047332][T11311] RIP: 0033:0x459387 [ 163.058136][T11311] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 163.058142][T11311] RSP: 002b:00007f6588da59f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 163.058150][T11311] RAX: ffffffffffffffda RBX: 00007f6588da66d4 RCX: 0000000000459387 [ 163.058159][T11311] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 163.067717][T11311] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000c 23:25:50 executing program 5 (fault-call:0 fault-nth:63): syz_read_part_table(0x0, 0x0, 0x0) 23:25:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}, 0x0) [ 163.067723][T11311] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000004 [ 163.067728][T11311] R13: 0000000000000000 R14: 0000000000000005 R15: 0000000000000003 [ 163.074323][T11311] ERROR: Out of memory at tomoyo_realpath_from_path. 23:25:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 163.265821][T11334] FAULT_INJECTION: forcing a failure. [ 163.265821][T11334] name failslab, interval 1, probability 0, space 0, times 0 [ 163.301504][T11334] CPU: 0 PID: 11334 Comm: syz-executor.5 Not tainted 5.2.0-rc6+ #9 23:25:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 163.309439][T11334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.319487][T11334] Call Trace: [ 163.319508][T11334] dump_stack+0x1d8/0x2f8 [ 163.319524][T11334] should_fail+0x608/0x860 [ 163.319535][T11334] ? setup_fault_attr+0x2b0/0x2b0 [ 163.319546][T11334] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 163.319562][T11334] __should_failslab+0x11a/0x160 [ 163.347275][T11334] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 163.352985][T11334] should_failslab+0x9/0x20 [ 163.352996][T11334] __kmalloc+0x7a/0x310 [ 163.353007][T11334] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 163.353019][T11334] tomoyo_realpath_from_path+0xdc/0x7c0 [ 163.353035][T11334] tomoyo_path_number_perm+0x1e0/0x740 [ 163.353046][T11334] ? trace_lock_acquire+0x190/0x190 [ 163.353060][T11334] ? __check_object_size+0x314/0x400 [ 163.367386][T11334] ? tomoyo_check_path_acl+0x180/0x180 [ 163.367400][T11334] ? strncpy_from_user+0x33e/0x3b0 [ 163.367439][T11334] ? fget_many+0x30/0x30 [ 163.367451][T11334] ? debug_smp_processor_id+0x1c/0x20 [ 163.367461][T11334] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 163.367474][T11334] tomoyo_file_ioctl+0x23/0x30 [ 163.378434][T11334] security_file_ioctl+0x6d/0xd0 [ 163.378451][T11334] __x64_sys_ioctl+0xa3/0x120 [ 163.378465][T11334] do_syscall_64+0xfe/0x140 [ 163.378479][T11334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 163.378491][T11334] RIP: 0033:0x459387 [ 163.388928][T11334] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:25:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) [ 163.388935][T11334] RSP: 002b:00007f6588da59f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 163.388945][T11334] RAX: ffffffffffffffda RBX: 00007f6588da66d4 RCX: 0000000000459387 [ 163.388952][T11334] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 163.388958][T11334] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000c [ 163.388964][T11334] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000004 [ 163.388969][T11334] R13: 0000000000000000 R14: 0000000000000005 R15: 0000000000000003 [ 163.472104][T11334] ERROR: Out of memory at tomoyo_realpath_from_path. 23:25:50 executing program 5 (fault-call:0 fault-nth:64): syz_read_part_table(0x0, 0x0, 0x0) 23:25:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 23:25:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 163.705741][T11364] FAULT_INJECTION: forcing a failure. [ 163.705741][T11364] name failslab, interval 1, probability 0, space 0, times 0 [ 163.765370][T11364] CPU: 0 PID: 11364 Comm: syz-executor.5 Not tainted 5.2.0-rc6+ #9 [ 163.773305][T11364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.783356][T11364] Call Trace: [ 163.786649][T11364] dump_stack+0x1d8/0x2f8 [ 163.790979][T11364] should_fail+0x608/0x860 [ 163.795392][T11364] ? setup_fault_attr+0x2b0/0x2b0 [ 163.800414][T11364] __should_failslab+0x11a/0x160 [ 163.805346][T11364] should_failslab+0x9/0x20 [ 163.809861][T11364] kmem_cache_alloc_node+0x65/0x270 [ 163.815048][T11364] ? __alloc_skb+0x9f/0x500 [ 163.819543][T11364] __alloc_skb+0x9f/0x500 [ 163.823873][T11364] alloc_uevent_skb+0x7f/0x230 [ 163.828650][T11364] kobject_uevent_env+0xcbb/0x1260 [ 163.833785][T11364] kobject_uevent+0x1f/0x30 [ 163.838281][T11364] __loop_clr_fd+0x544/0x8e0 [ 163.842876][T11364] lo_ioctl+0x11a7/0x2400 [ 163.847199][T11364] ? match_held_lock+0x280/0x280 [ 163.852126][T11364] ? __bfs+0x550/0x550 [ 163.856188][T11364] ? lo_release+0x1f0/0x1f0 [ 163.860692][T11364] ? register_lock_class+0xde/0x1110 [ 163.866217][T11364] ? match_held_lock+0x280/0x280 [ 163.871153][T11364] ? __bfs+0x550/0x550 [ 163.875213][T11364] ? __bfs+0x550/0x550 [ 163.879278][T11364] ? __bfs+0x550/0x550 [ 163.883334][T11364] ? __lock_acquire+0xcf7/0x1a40 [ 163.888613][T11364] ? match_held_lock+0x280/0x280 [ 163.893551][T11364] ? __lock_acquire+0xcf7/0x1a40 [ 163.898477][T11364] ? __bfs+0x550/0x550 [ 163.902545][T11364] ? __lock_acquire+0xcf7/0x1a40 [ 163.907483][T11364] ? __lock_acquire+0xcf7/0x1a40 [ 163.912422][T11364] ? trace_lock_acquire+0x190/0x190 [ 163.917633][T11364] ? __read_once_size_nocheck+0x10/0x10 [ 163.923184][T11364] ? unwind_next_frame+0x415/0x870 [ 163.928381][T11364] ? rcu_lock_release+0x9/0x30 [ 163.933138][T11364] ? stack_trace_save+0x1e0/0x1e0 [ 163.938154][T11364] ? rcu_lock_release+0x26/0x30 [ 163.943019][T11364] ? is_bpf_text_address+0x398/0x3b0 [ 163.948296][T11364] ? stack_trace_save+0x1e0/0x1e0 [ 163.953314][T11364] ? __kernel_text_address+0x9a/0x110 [ 163.959468][T11364] ? unwind_get_return_address+0x4c/0x90 [ 163.966048][T11364] ? arch_stack_walk+0x98/0xe0 [ 163.970816][T11364] ? stack_trace_save+0x111/0x1e0 [ 163.975880][T11364] ? lo_release+0x1f0/0x1f0 [ 163.980391][T11364] blkdev_ioctl+0x917/0x2c10 [ 163.984976][T11364] ? tomoyo_path_number_perm+0x587/0x740 [ 163.990601][T11364] ? trace_hardirqs_off+0x74/0x80 [ 163.996667][T11364] ? quarantine_put+0xb7/0x1f0 [ 164.001433][T11364] ? tomoyo_path_number_perm+0x587/0x740 [ 164.007057][T11364] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 164.012328][T11364] ? __kasan_slab_free+0x19d/0x1e0 [ 164.017425][T11364] ? __kasan_slab_free+0x12a/0x1e0 [ 164.022522][T11364] ? kasan_slab_free+0xe/0x10 [ 164.027184][T11364] ? kfree+0xae/0x120 [ 164.031153][T11364] ? tomoyo_path_number_perm+0x587/0x740 [ 164.036771][T11364] ? tomoyo_file_ioctl+0x23/0x30 [ 164.041700][T11364] ? security_file_ioctl+0x6d/0xd0 [ 164.046805][T11364] ? __x64_sys_ioctl+0xa3/0x120 [ 164.051648][T11364] ? do_syscall_64+0xfe/0x140 [ 164.056315][T11364] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.062373][T11364] ? kasan_check_write+0x14/0x20 [ 164.067300][T11364] ? do_raw_spin_lock+0x143/0x3a0 [ 164.072327][T11364] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 164.078132][T11364] ? rcu_lock_release+0x9/0x30 [ 164.082897][T11364] ? tomoyo_path_number_perm+0x5f0/0x740 [ 164.088527][T11364] ? trace_lock_acquire+0x190/0x190 [ 164.093722][T11364] ? tomoyo_check_path_acl+0x180/0x180 [ 164.099173][T11364] block_ioctl+0xbd/0x100 [ 164.103494][T11364] ? blkdev_iopoll+0x100/0x100 [ 164.108251][T11364] do_vfs_ioctl+0x7d4/0x1890 [ 164.112842][T11364] ? ioctl_preallocate+0x240/0x240 [ 164.117965][T11364] ? fget_many+0x30/0x30 [ 164.122201][T11364] ? debug_smp_processor_id+0x1c/0x20 [ 164.127565][T11364] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 164.133629][T11364] ? tomoyo_file_ioctl+0x23/0x30 [ 164.138557][T11364] ? security_file_ioctl+0xa1/0xd0 [ 164.143662][T11364] __x64_sys_ioctl+0xe3/0x120 [ 164.148334][T11364] do_syscall_64+0xfe/0x140 [ 164.152834][T11364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.158712][T11364] RIP: 0033:0x459387 [ 164.162600][T11364] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 164.182206][T11364] RSP: 002b:00007f6588da59f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 164.190610][T11364] RAX: ffffffffffffffda RBX: 00007f6588da66d4 RCX: 0000000000459387 [ 164.198575][T11364] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 164.206535][T11364] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000c [ 164.214494][T11364] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000004 [ 164.222460][T11364] R13: 0000000000000000 R14: 0000000000000005 R15: 0000000000000003 23:25:51 executing program 5 (fault-call:0 fault-nth:65): syz_read_part_table(0x0, 0x0, 0x0) 23:25:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 23:25:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) 23:25:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 164.446113][T11381] FAULT_INJECTION: forcing a failure. [ 164.446113][T11381] name failslab, interval 1, probability 0, space 0, times 0 [ 164.480831][T11381] CPU: 1 PID: 11381 Comm: syz-executor.5 Not tainted 5.2.0-rc6+ #9 [ 164.488769][T11381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.498821][T11381] Call Trace: [ 164.502106][T11381] dump_stack+0x1d8/0x2f8 [ 164.506523][T11381] should_fail+0x608/0x860 [ 164.510929][T11381] ? setup_fault_attr+0x2b0/0x2b0 [ 164.515952][T11381] __should_failslab+0x11a/0x160 [ 164.520881][T11381] ? skb_clone+0x1cc/0x380 [ 164.525294][T11381] should_failslab+0x9/0x20 [ 164.529794][T11381] kmem_cache_alloc+0x56/0x2b0 [ 164.534559][T11381] skb_clone+0x1cc/0x380 [ 164.538792][T11381] netlink_broadcast_filtered+0x5d1/0x1000 [ 164.544604][T11381] netlink_broadcast+0x3a/0x50 [ 164.549358][T11381] kobject_uevent_env+0xcf0/0x1260 [ 164.554470][T11381] kobject_uevent+0x1f/0x30 [ 164.558960][T11381] __loop_clr_fd+0x544/0x8e0 [ 164.563548][T11381] lo_ioctl+0x11a7/0x2400 [ 164.567873][T11381] ? match_held_lock+0x280/0x280 [ 164.572802][T11381] ? lo_release+0x1f0/0x1f0 [ 164.577300][T11381] ? __lock_acquire+0xcf7/0x1a40 [ 164.582231][T11381] ? match_held_lock+0x280/0x280 [ 164.587165][T11381] ? update_load_avg+0x156/0xc00 [ 164.592095][T11381] ? __bfs+0x550/0x550 [ 164.596155][T11381] ? trace_lock_acquire+0x190/0x190 [ 164.601344][T11381] ? __perf_event_task_sched_out+0x14f3/0x1830 [ 164.607488][T11381] ? __bfs+0x550/0x550 [ 164.611550][T11381] ? check_preemption_disabled+0x47/0x280 [ 164.617351][T11381] ? check_preemption_disabled+0x47/0x280 [ 164.623067][T11381] ? __this_cpu_preempt_check+0x1c/0x20 [ 164.628601][T11381] ? __lock_acquire+0xcf7/0x1a40 [ 164.633528][T11381] ? __bfs+0x550/0x550 [ 164.637593][T11381] ? __lock_acquire+0xcf7/0x1a40 [ 164.642528][T11381] ? __lock_acquire+0xcf7/0x1a40 [ 164.647467][T11381] ? trace_lock_acquire+0x190/0x190 [ 164.652851][T11381] ? __read_once_size_nocheck+0x10/0x10 [ 164.658384][T11381] ? unwind_next_frame+0x415/0x870 [ 164.663497][T11381] ? rcu_lock_release+0x9/0x30 [ 164.668258][T11381] ? stack_trace_save+0x1e0/0x1e0 [ 164.673285][T11381] ? rcu_lock_release+0x26/0x30 [ 164.678469][T11381] ? is_bpf_text_address+0x398/0x3b0 [ 164.683751][T11381] ? stack_trace_save+0x1e0/0x1e0 [ 164.688767][T11381] ? __kernel_text_address+0x9a/0x110 [ 164.694130][T11381] ? unwind_get_return_address+0x4c/0x90 [ 164.699839][T11381] ? arch_stack_walk+0x98/0xe0 [ 164.704600][T11381] ? stack_trace_save+0x111/0x1e0 [ 164.709702][T11381] ? lo_release+0x1f0/0x1f0 [ 164.714284][T11381] blkdev_ioctl+0x917/0x2c10 [ 164.718864][T11381] ? tomoyo_path_number_perm+0x587/0x740 [ 164.724577][T11381] ? trace_hardirqs_off+0x74/0x80 [ 164.729587][T11381] ? quarantine_put+0xb7/0x1f0 [ 164.734341][T11381] ? tomoyo_path_number_perm+0x587/0x740 [ 164.739965][T11381] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 164.745329][T11381] ? __kasan_slab_free+0x19d/0x1e0 [ 164.750423][T11381] ? __kasan_slab_free+0x12a/0x1e0 [ 164.755522][T11381] ? kasan_slab_free+0xe/0x10 [ 164.760386][T11381] ? kfree+0xae/0x120 [ 164.764353][T11381] ? tomoyo_path_number_perm+0x587/0x740 [ 164.769972][T11381] ? tomoyo_file_ioctl+0x23/0x30 [ 164.774898][T11381] ? security_file_ioctl+0x6d/0xd0 [ 164.779996][T11381] ? __x64_sys_ioctl+0xa3/0x120 [ 164.784837][T11381] ? do_syscall_64+0xfe/0x140 [ 164.789503][T11381] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.795564][T11381] ? kasan_check_write+0x14/0x20 [ 164.800493][T11381] ? do_raw_spin_lock+0x143/0x3a0 [ 164.805607][T11381] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 164.811418][T11381] ? rcu_lock_release+0x9/0x30 [ 164.816184][T11381] ? tomoyo_path_number_perm+0x5f0/0x740 [ 164.821816][T11381] ? trace_lock_acquire+0x190/0x190 [ 164.827007][T11381] ? tomoyo_check_path_acl+0x180/0x180 [ 164.832457][T11381] block_ioctl+0xbd/0x100 [ 164.836777][T11381] ? blkdev_iopoll+0x100/0x100 [ 164.841532][T11381] do_vfs_ioctl+0x7d4/0x1890 [ 164.846123][T11381] ? ioctl_preallocate+0x240/0x240 [ 164.851236][T11381] ? fget_many+0x30/0x30 [ 164.855473][T11381] ? debug_smp_processor_id+0x1c/0x20 [ 164.860834][T11381] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 164.866892][T11381] ? tomoyo_file_ioctl+0x23/0x30 [ 164.871821][T11381] ? security_file_ioctl+0xa1/0xd0 [ 164.876926][T11381] __x64_sys_ioctl+0xe3/0x120 [ 164.881596][T11381] do_syscall_64+0xfe/0x140 [ 164.886090][T11381] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 164.891979][T11381] RIP: 0033:0x459387 [ 164.895864][T11381] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 164.915544][T11381] RSP: 002b:00007f6588da59f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 164.923941][T11381] RAX: ffffffffffffffda RBX: 00007f6588da66d4 RCX: 0000000000459387 [ 164.931903][T11381] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 23:25:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 164.939864][T11381] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000c [ 164.948557][T11381] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000004 [ 164.956520][T11381] R13: 0000000000000000 R14: 0000000000000005 R15: 0000000000000003 23:25:52 executing program 5 (fault-call:0 fault-nth:66): syz_read_part_table(0x0, 0x0, 0x0) 23:25:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) 23:25:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) [ 165.173406][T11402] FAULT_INJECTION: forcing a failure. [ 165.173406][T11402] name failslab, interval 1, probability 0, space 0, times 0 [ 165.215814][T11402] CPU: 1 PID: 11402 Comm: syz-executor.5 Not tainted 5.2.0-rc6+ #9 [ 165.223836][T11402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.233884][T11402] Call Trace: [ 165.237176][T11402] dump_stack+0x1d8/0x2f8 [ 165.241502][T11402] should_fail+0x608/0x860 [ 165.246104][T11402] ? setup_fault_attr+0x2b0/0x2b0 [ 165.251129][T11402] __should_failslab+0x11a/0x160 [ 165.256067][T11402] ? skb_clone+0x1cc/0x380 [ 165.260480][T11402] should_failslab+0x9/0x20 [ 165.264975][T11402] kmem_cache_alloc+0x56/0x2b0 [ 165.269734][T11402] skb_clone+0x1cc/0x380 [ 165.273974][T11402] netlink_broadcast_filtered+0x5d1/0x1000 [ 165.279782][T11402] netlink_broadcast+0x3a/0x50 [ 165.284537][T11402] kobject_uevent_env+0xcf0/0x1260 [ 165.289659][T11402] kobject_uevent+0x1f/0x30 [ 165.294152][T11402] __loop_clr_fd+0x544/0x8e0 [ 165.298747][T11402] lo_ioctl+0x11a7/0x2400 [ 165.303072][T11402] ? match_held_lock+0x280/0x280 [ 165.307998][T11402] ? __bfs+0x550/0x550 [ 165.312057][T11402] ? lo_release+0x1f0/0x1f0 [ 165.316556][T11402] ? register_lock_class+0xde/0x1110 [ 165.321835][T11402] ? match_held_lock+0x280/0x280 [ 165.326765][T11402] ? __bfs+0x550/0x550 [ 165.330828][T11402] ? __bfs+0x550/0x550 [ 165.334889][T11402] ? __bfs+0x550/0x550 [ 165.338944][T11402] ? __lock_acquire+0xcf7/0x1a40 [ 165.343868][T11402] ? match_held_lock+0x280/0x280 [ 165.348799][T11402] ? __lock_acquire+0xcf7/0x1a40 [ 165.353725][T11402] ? __bfs+0x550/0x550 [ 165.357792][T11402] ? __lock_acquire+0xcf7/0x1a40 [ 165.362731][T11402] ? __lock_acquire+0xcf7/0x1a40 [ 165.367673][T11402] ? trace_lock_acquire+0x190/0x190 [ 165.372872][T11402] ? __read_once_size_nocheck+0x10/0x10 [ 165.378406][T11402] ? unwind_next_frame+0x415/0x870 [ 165.383527][T11402] ? rcu_lock_release+0x9/0x30 [ 165.388373][T11402] ? stack_trace_save+0x1e0/0x1e0 [ 165.393388][T11402] ? rcu_lock_release+0x26/0x30 [ 165.398402][T11402] ? is_bpf_text_address+0x398/0x3b0 [ 165.403681][T11402] ? stack_trace_save+0x1e0/0x1e0 [ 165.408680][T11402] ? __kernel_text_address+0x9a/0x110 [ 165.414028][T11402] ? unwind_get_return_address+0x4c/0x90 [ 165.419637][T11402] ? arch_stack_walk+0x98/0xe0 [ 165.424383][T11402] ? stack_trace_save+0x111/0x1e0 [ 165.429383][T11402] ? lo_release+0x1f0/0x1f0 [ 165.433859][T11402] blkdev_ioctl+0x917/0x2c10 [ 165.438421][T11402] ? tomoyo_path_number_perm+0x587/0x740 [ 165.444028][T11402] ? trace_hardirqs_off+0x74/0x80 [ 165.449044][T11402] ? quarantine_put+0xb7/0x1f0 [ 165.453785][T11402] ? tomoyo_path_number_perm+0x587/0x740 [ 165.459391][T11402] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 165.464655][T11402] ? __kasan_slab_free+0x19d/0x1e0 [ 165.469744][T11402] ? __kasan_slab_free+0x12a/0x1e0 [ 165.474825][T11402] ? kasan_slab_free+0xe/0x10 [ 165.479470][T11402] ? kfree+0xae/0x120 [ 165.483423][T11402] ? tomoyo_path_number_perm+0x587/0x740 [ 165.489029][T11402] ? tomoyo_file_ioctl+0x23/0x30 [ 165.493937][T11402] ? security_file_ioctl+0x6d/0xd0 [ 165.499020][T11402] ? __x64_sys_ioctl+0xa3/0x120 [ 165.503841][T11402] ? do_syscall_64+0xfe/0x140 [ 165.508493][T11402] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 165.514533][T11402] ? kasan_check_write+0x14/0x20 [ 165.519450][T11402] ? do_raw_spin_lock+0x143/0x3a0 [ 165.524466][T11402] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 165.530422][T11402] ? rcu_lock_release+0x9/0x30 [ 165.535163][T11402] ? tomoyo_path_number_perm+0x5f0/0x740 [ 165.540764][T11402] ? trace_lock_acquire+0x190/0x190 [ 165.545948][T11402] ? tomoyo_check_path_acl+0x180/0x180 [ 165.551379][T11402] block_ioctl+0xbd/0x100 [ 165.555681][T11402] ? blkdev_iopoll+0x100/0x100 [ 165.560417][T11402] do_vfs_ioctl+0x7d4/0x1890 [ 165.564983][T11402] ? ioctl_preallocate+0x240/0x240 [ 165.570074][T11402] ? fget_many+0x30/0x30 [ 165.574293][T11402] ? debug_smp_processor_id+0x1c/0x20 [ 165.579636][T11402] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 165.585681][T11402] ? tomoyo_file_ioctl+0x23/0x30 [ 165.590594][T11402] ? security_file_ioctl+0xa1/0xd0 [ 165.595678][T11402] __x64_sys_ioctl+0xe3/0x120 [ 165.600332][T11402] do_syscall_64+0xfe/0x140 [ 165.604829][T11402] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 165.610693][T11402] RIP: 0033:0x459387 [ 165.614564][T11402] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 165.634141][T11402] RSP: 002b:00007f6588da59f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 165.642531][T11402] RAX: ffffffffffffffda RBX: 00007f6588da66d4 RCX: 0000000000459387 [ 165.650483][T11402] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 165.658430][T11402] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000c 23:25:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 165.666379][T11402] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000004 [ 165.674328][T11402] R13: 0000000000000000 R14: 0000000000000005 R15: 0000000000000003 23:25:52 executing program 5 (fault-call:0 fault-nth:67): syz_read_part_table(0x0, 0x0, 0x0) 23:25:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64000000000004", 0x39}], 0x1}, 0x0) 23:25:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 165.883096][T11426] FAULT_INJECTION: forcing a failure. [ 165.883096][T11426] name failslab, interval 1, probability 0, space 0, times 0 [ 165.900180][T11426] CPU: 1 PID: 11426 Comm: syz-executor.5 Not tainted 5.2.0-rc6+ #9 [ 165.908096][T11426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.918152][T11426] Call Trace: [ 165.921444][T11426] dump_stack+0x1d8/0x2f8 [ 165.925765][T11426] should_fail+0x608/0x860 [ 165.930177][T11426] ? setup_fault_attr+0x2b0/0x2b0 [ 165.935202][T11426] __should_failslab+0x11a/0x160 [ 165.940911][T11426] should_failslab+0x9/0x20 [ 165.945407][T11426] kmem_cache_alloc_trace+0x5d/0x2c0 [ 165.950680][T11426] ? kobject_uevent_env+0x2cd/0x1260 [ 165.955954][T11426] ? dev_uevent_filter+0xb0/0xb0 [ 165.962538][T11426] kobject_uevent_env+0x2cd/0x1260 [ 165.969737][T11426] kobject_uevent+0x1f/0x30 [ 165.974233][T11426] __loop_clr_fd+0x544/0x8e0 [ 165.978817][T11426] lo_ioctl+0x11a7/0x2400 [ 165.983143][T11426] ? match_held_lock+0x280/0x280 [ 165.988073][T11426] ? __bfs+0x550/0x550 [ 165.992130][T11426] ? lo_release+0x1f0/0x1f0 [ 165.996630][T11426] ? register_lock_class+0xde/0x1110 [ 166.001903][T11426] ? match_held_lock+0x280/0x280 [ 166.006834][T11426] ? __bfs+0x550/0x550 [ 166.010896][T11426] ? __bfs+0x550/0x550 [ 166.014962][T11426] ? __bfs+0x550/0x550 [ 166.019016][T11426] ? __lock_acquire+0xcf7/0x1a40 [ 166.023946][T11426] ? match_held_lock+0x280/0x280 [ 166.028875][T11426] ? __lock_acquire+0xcf7/0x1a40 [ 166.033799][T11426] ? __bfs+0x550/0x550 [ 166.037868][T11426] ? __lock_acquire+0xcf7/0x1a40 [ 166.042805][T11426] ? __lock_acquire+0xcf7/0x1a40 [ 166.047741][T11426] ? trace_lock_acquire+0x190/0x190 [ 166.052945][T11426] ? __read_once_size_nocheck+0x10/0x10 [ 166.058478][T11426] ? unwind_next_frame+0x415/0x870 [ 166.063586][T11426] ? rcu_lock_release+0x9/0x30 [ 166.068343][T11426] ? stack_trace_save+0x1e0/0x1e0 [ 166.073354][T11426] ? rcu_lock_release+0x26/0x30 [ 166.078191][T11426] ? is_bpf_text_address+0x398/0x3b0 [ 166.083468][T11426] ? stack_trace_save+0x1e0/0x1e0 [ 166.088482][T11426] ? __kernel_text_address+0x9a/0x110 [ 166.093846][T11426] ? unwind_get_return_address+0x4c/0x90 [ 166.099465][T11426] ? arch_stack_walk+0x98/0xe0 [ 166.104231][T11426] ? stack_trace_save+0x111/0x1e0 [ 166.109276][T11426] ? lo_release+0x1f0/0x1f0 [ 166.114277][T11426] blkdev_ioctl+0x917/0x2c10 [ 166.118855][T11426] ? tomoyo_path_number_perm+0x587/0x740 [ 166.124480][T11426] ? trace_hardirqs_off+0x74/0x80 [ 166.129495][T11426] ? quarantine_put+0xb7/0x1f0 [ 166.134248][T11426] ? tomoyo_path_number_perm+0x587/0x740 [ 166.139868][T11426] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 166.145138][T11426] ? __kasan_slab_free+0x19d/0x1e0 [ 166.150242][T11426] ? __kasan_slab_free+0x12a/0x1e0 [ 166.155342][T11426] ? kasan_slab_free+0xe/0x10 [ 166.160009][T11426] ? kfree+0xae/0x120 [ 166.163977][T11426] ? tomoyo_path_number_perm+0x587/0x740 [ 166.173334][T11426] ? tomoyo_file_ioctl+0x23/0x30 [ 166.178257][T11426] ? security_file_ioctl+0x6d/0xd0 [ 166.183385][T11426] ? __x64_sys_ioctl+0xa3/0x120 [ 166.188227][T11426] ? do_syscall_64+0xfe/0x140 [ 166.192888][T11426] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 166.199206][T11426] ? kasan_check_write+0x14/0x20 [ 166.204130][T11426] ? do_raw_spin_lock+0x143/0x3a0 [ 166.209169][T11426] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 166.214975][T11426] ? rcu_lock_release+0x9/0x30 [ 166.219741][T11426] ? tomoyo_path_number_perm+0x5f0/0x740 [ 166.225364][T11426] ? trace_lock_acquire+0x190/0x190 [ 166.230560][T11426] ? tomoyo_check_path_acl+0x180/0x180 [ 166.236012][T11426] block_ioctl+0xbd/0x100 [ 166.240335][T11426] ? blkdev_iopoll+0x100/0x100 [ 166.245090][T11426] do_vfs_ioctl+0x7d4/0x1890 [ 166.249675][T11426] ? ioctl_preallocate+0x240/0x240 [ 166.254879][T11426] ? fget_many+0x30/0x30 [ 166.259115][T11426] ? debug_smp_processor_id+0x1c/0x20 [ 166.264477][T11426] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 166.270534][T11426] ? tomoyo_file_ioctl+0x23/0x30 [ 166.275465][T11426] ? security_file_ioctl+0xa1/0xd0 [ 166.280569][T11426] __x64_sys_ioctl+0xe3/0x120 [ 166.285241][T11426] do_syscall_64+0xfe/0x140 [ 166.289737][T11426] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 166.295615][T11426] RIP: 0033:0x459387 [ 166.299503][T11426] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 166.319093][T11426] RSP: 002b:00007f6588da59f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 23:25:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 166.327585][T11426] RAX: ffffffffffffffda RBX: 00007f6588da66d4 RCX: 0000000000459387 [ 166.335717][T11426] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 166.343678][T11426] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000c [ 166.351635][T11426] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000004 [ 166.359597][T11426] R13: 0000000000000000 R14: 0000000000000005 R15: 0000000000000003 23:25:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) 23:25:53 executing program 5 (fault-call:0 fault-nth:68): syz_read_part_table(0x0, 0x0, 0x0) 23:25:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) 23:25:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 166.563734][T11443] FAULT_INJECTION: forcing a failure. [ 166.563734][T11443] name failslab, interval 1, probability 0, space 0, times 0 23:25:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 166.620608][T11443] CPU: 0 PID: 11443 Comm: syz-executor.5 Not tainted 5.2.0-rc6+ #9 [ 166.628565][T11443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.638634][T11443] Call Trace: [ 166.641936][T11443] dump_stack+0x1d8/0x2f8 [ 166.646276][T11443] should_fail+0x608/0x860 [ 166.650715][T11443] ? setup_fault_attr+0x2b0/0x2b0 [ 166.655743][T11443] ? tomoyo_encode2+0x273/0x5a0 [ 166.660609][T11443] __should_failslab+0x11a/0x160 [ 166.665556][T11443] ? tomoyo_encode2+0x273/0x5a0 23:25:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) 23:25:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 166.670424][T11443] should_failslab+0x9/0x20 [ 166.674945][T11443] __kmalloc+0x7a/0x310 [ 166.679138][T11443] tomoyo_encode2+0x273/0x5a0 [ 166.683831][T11443] tomoyo_realpath_from_path+0x769/0x7c0 [ 166.689487][T11443] tomoyo_path_number_perm+0x1e0/0x740 [ 166.694958][T11443] ? trace_lock_acquire+0x190/0x190 [ 166.700252][T11443] ? __check_object_size+0x314/0x400 [ 166.705619][T11443] ? tomoyo_check_path_acl+0x180/0x180 [ 166.711083][T11443] ? strncpy_from_user+0x33e/0x3b0 [ 166.716226][T11443] ? fget_many+0x30/0x30 [ 166.720483][T11443] ? debug_smp_processor_id+0x1c/0x20 [ 166.725866][T11443] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 166.731942][T11443] tomoyo_file_ioctl+0x23/0x30 [ 166.736714][T11443] security_file_ioctl+0x6d/0xd0 [ 166.741653][T11443] __x64_sys_ioctl+0xa3/0x120 [ 166.746332][T11443] do_syscall_64+0xfe/0x140 [ 166.751885][T11443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 166.757769][T11443] RIP: 0033:0x459387 [ 166.761662][T11443] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 166.781276][T11443] RSP: 002b:00007f6588da59f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 166.789684][T11443] RAX: ffffffffffffffda RBX: 00007f6588da66d4 RCX: 0000000000459387 [ 166.789691][T11443] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 166.789696][T11443] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000c [ 166.789701][T11443] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000004 [ 166.789707][T11443] R13: 0000000000000000 R14: 0000000000000005 R15: 0000000000000003 [ 166.793476][T11443] ERROR: Out of memory at tomoyo_realpath_from_path. 23:25:54 executing program 5 (fault-call:0 fault-nth:69): syz_read_part_table(0x0, 0x0, 0x0) 23:25:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475b", 0x30}], 0x1}, 0x0) 23:25:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475b", 0x30}], 0x1}, 0x0) 23:25:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 166.993730][T11481] FAULT_INJECTION: forcing a failure. [ 166.993730][T11481] name failslab, interval 1, probability 0, space 0, times 0 [ 167.061462][T11481] CPU: 0 PID: 11481 Comm: syz-executor.5 Not tainted 5.2.0-rc6+ #9 [ 167.069401][T11481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.079464][T11481] Call Trace: [ 167.082766][T11481] dump_stack+0x1d8/0x2f8 [ 167.087112][T11481] should_fail+0x608/0x860 [ 167.091540][T11481] ? setup_fault_attr+0x2b0/0x2b0 [ 167.096659][T11481] ? tomoyo_encode2+0x273/0x5a0 [ 167.101871][T11481] __should_failslab+0x11a/0x160 [ 167.106816][T11481] ? tomoyo_encode2+0x273/0x5a0 [ 167.112775][T11481] should_failslab+0x9/0x20 [ 167.112787][T11481] __kmalloc+0x7a/0x310 [ 167.112804][T11481] tomoyo_encode2+0x273/0x5a0 [ 167.112819][T11481] tomoyo_realpath_from_path+0x769/0x7c0 [ 167.112836][T11481] tomoyo_path_number_perm+0x1e0/0x740 [ 167.121460][T11481] ? trace_lock_acquire+0x190/0x190 [ 167.121475][T11481] ? __check_object_size+0x314/0x400 [ 167.121487][T11481] ? tomoyo_check_path_acl+0x180/0x180 [ 167.121503][T11481] ? strncpy_from_user+0x33e/0x3b0 [ 167.158392][T11481] ? fget_many+0x30/0x30 [ 167.162630][T11481] ? debug_smp_processor_id+0x1c/0x20 [ 167.168000][T11481] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 167.174060][T11481] tomoyo_file_ioctl+0x23/0x30 [ 167.178821][T11481] security_file_ioctl+0x6d/0xd0 [ 167.183749][T11481] __x64_sys_ioctl+0xa3/0x120 [ 167.188420][T11481] do_syscall_64+0xfe/0x140 [ 167.192917][T11481] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 167.198802][T11481] RIP: 0033:0x459387 [ 167.202692][T11481] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 167.222282][T11481] RSP: 002b:00007f6588da59f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 167.230685][T11481] RAX: ffffffffffffffda RBX: 00007f6588da66d4 RCX: 0000000000459387 [ 167.238649][T11481] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 167.246620][T11481] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000c [ 167.254586][T11481] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000004 23:25:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475b", 0x30}], 0x1}, 0x0) [ 167.262555][T11481] R13: 0000000000000000 R14: 0000000000000005 R15: 0000000000000003 [ 167.275623][T11481] ERROR: Out of memory at tomoyo_realpath_from_path. 23:25:54 executing program 5 (fault-call:0 fault-nth:70): syz_read_part_table(0x0, 0x0, 0x0) 23:25:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f640000", 0x35}], 0x1}, 0x0) 23:25:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f640000", 0x35}], 0x1}, 0x0) 23:25:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 167.503193][T11508] FAULT_INJECTION: forcing a failure. [ 167.503193][T11508] name failslab, interval 1, probability 0, space 0, times 0 [ 167.522207][T11508] CPU: 0 PID: 11508 Comm: syz-executor.5 Not tainted 5.2.0-rc6+ #9 [ 167.530117][T11508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.540160][T11508] Call Trace: [ 167.543452][T11508] dump_stack+0x1d8/0x2f8 [ 167.547788][T11508] should_fail+0x608/0x860 [ 167.552292][T11508] ? setup_fault_attr+0x2b0/0x2b0 [ 167.557431][T11508] __should_failslab+0x11a/0x160 [ 167.562362][T11508] ? skb_clone+0x1cc/0x380 [ 167.566766][T11508] should_failslab+0x9/0x20 [ 167.571263][T11508] kmem_cache_alloc+0x56/0x2b0 [ 167.576051][T11508] skb_clone+0x1cc/0x380 [ 167.580292][T11508] netlink_broadcast_filtered+0x5d1/0x1000 [ 167.586102][T11508] netlink_broadcast+0x3a/0x50 [ 167.590895][T11508] kobject_uevent_env+0xcf0/0x1260 [ 167.596029][T11508] kobject_uevent+0x1f/0x30 [ 167.600529][T11508] __loop_clr_fd+0x544/0x8e0 [ 167.605634][T11508] lo_ioctl+0x11a7/0x2400 [ 167.609959][T11508] ? match_held_lock+0x280/0x280 [ 167.614897][T11508] ? __bfs+0x550/0x550 [ 167.618953][T11508] ? lo_release+0x1f0/0x1f0 [ 167.623453][T11508] ? register_lock_class+0xde/0x1110 [ 167.629081][T11508] ? match_held_lock+0x280/0x280 [ 167.634015][T11508] ? __bfs+0x550/0x550 [ 167.638075][T11508] ? __bfs+0x550/0x550 [ 167.642144][T11508] ? __bfs+0x550/0x550 [ 167.646202][T11508] ? __lock_acquire+0xcf7/0x1a40 [ 167.651125][T11508] ? match_held_lock+0x280/0x280 [ 167.656060][T11508] ? __lock_acquire+0xcf7/0x1a40 [ 167.660982][T11508] ? __bfs+0x550/0x550 [ 167.665048][T11508] ? __lock_acquire+0xcf7/0x1a40 [ 167.669983][T11508] ? __lock_acquire+0xcf7/0x1a40 [ 167.674918][T11508] ? trace_lock_acquire+0x190/0x190 [ 167.680131][T11508] ? __read_once_size_nocheck+0x10/0x10 [ 167.685680][T11508] ? unwind_next_frame+0x415/0x870 [ 167.690802][T11508] ? rcu_lock_release+0x9/0x30 [ 167.695586][T11508] ? stack_trace_save+0x1e0/0x1e0 [ 167.700602][T11508] ? rcu_lock_release+0x26/0x30 [ 167.705441][T11508] ? is_bpf_text_address+0x398/0x3b0 [ 167.710713][T11508] ? stack_trace_save+0x1e0/0x1e0 [ 167.715727][T11508] ? __kernel_text_address+0x9a/0x110 [ 167.721091][T11508] ? unwind_get_return_address+0x4c/0x90 [ 167.726806][T11508] ? arch_stack_walk+0x98/0xe0 [ 167.731567][T11508] ? stack_trace_save+0x111/0x1e0 [ 167.736675][T11508] ? lo_release+0x1f0/0x1f0 [ 167.741170][T11508] blkdev_ioctl+0x917/0x2c10 [ 167.745769][T11508] ? tomoyo_path_number_perm+0x587/0x740 [ 167.752008][T11508] ? trace_hardirqs_off+0x74/0x80 [ 167.757043][T11508] ? quarantine_put+0xb7/0x1f0 [ 167.761795][T11508] ? tomoyo_path_number_perm+0x587/0x740 [ 167.767416][T11508] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 167.772771][T11508] ? __kasan_slab_free+0x19d/0x1e0 [ 167.777871][T11508] ? __kasan_slab_free+0x12a/0x1e0 [ 167.782971][T11508] ? kasan_slab_free+0xe/0x10 [ 167.787633][T11508] ? kfree+0xae/0x120 [ 167.791602][T11508] ? tomoyo_path_number_perm+0x587/0x740 [ 167.797220][T11508] ? tomoyo_file_ioctl+0x23/0x30 [ 167.802141][T11508] ? security_file_ioctl+0x6d/0xd0 [ 167.807238][T11508] ? __x64_sys_ioctl+0xa3/0x120 [ 167.812079][T11508] ? do_syscall_64+0xfe/0x140 [ 167.817275][T11508] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 167.823334][T11508] ? kasan_check_write+0x14/0x20 [ 167.828256][T11508] ? do_raw_spin_lock+0x143/0x3a0 [ 167.833290][T11508] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 167.839093][T11508] ? rcu_lock_release+0x9/0x30 [ 167.843853][T11508] ? tomoyo_path_number_perm+0x5f0/0x740 [ 167.849482][T11508] ? trace_lock_acquire+0x190/0x190 [ 167.854681][T11508] ? tomoyo_check_path_acl+0x180/0x180 [ 167.860153][T11508] block_ioctl+0xbd/0x100 [ 167.864472][T11508] ? blkdev_iopoll+0x100/0x100 [ 167.869238][T11508] do_vfs_ioctl+0x7d4/0x1890 [ 167.873841][T11508] ? ioctl_preallocate+0x240/0x240 [ 167.878955][T11508] ? fget_many+0x30/0x30 [ 167.883202][T11508] ? debug_smp_processor_id+0x1c/0x20 [ 167.888573][T11508] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 167.894629][T11508] ? tomoyo_file_ioctl+0x23/0x30 [ 167.899563][T11508] ? security_file_ioctl+0xa1/0xd0 [ 167.904672][T11508] __x64_sys_ioctl+0xe3/0x120 [ 167.909426][T11508] do_syscall_64+0xfe/0x140 [ 167.913922][T11508] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 167.919973][T11508] RIP: 0033:0x459387 [ 167.923941][T11508] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 167.943536][T11508] RSP: 002b:00007f6588da59f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 167.951932][T11508] RAX: ffffffffffffffda RBX: 00007f6588da66d4 RCX: 0000000000459387 [ 167.959910][T11508] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 167.972562][T11508] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000c [ 167.980524][T11508] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000004 [ 167.988488][T11508] R13: 0000000000000000 R14: 0000000000000005 R15: 0000000000000003 23:25:55 executing program 5 (fault-call:0 fault-nth:71): syz_read_part_table(0x0, 0x0, 0x0) 23:25:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f640000", 0x35}], 0x1}, 0x0) 23:25:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f6400000000", 0x37}], 0x1}, 0x0) 23:25:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 168.233802][T11527] FAULT_INJECTION: forcing a failure. [ 168.233802][T11527] name failslab, interval 1, probability 0, space 0, times 0 [ 168.271470][T11527] CPU: 1 PID: 11527 Comm: syz-executor.5 Not tainted 5.2.0-rc6+ #9 [ 168.279403][T11527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.289465][T11527] Call Trace: [ 168.292760][T11527] dump_stack+0x1d8/0x2f8 [ 168.297095][T11527] should_fail+0x608/0x860 [ 168.301508][T11527] ? setup_fault_attr+0x2b0/0x2b0 [ 168.306530][T11527] __should_failslab+0x11a/0x160 [ 168.311460][T11527] should_failslab+0x9/0x20 [ 168.315964][T11527] kmem_cache_alloc_node_trace+0x6e/0x280 [ 168.321673][T11527] ? __kmalloc_node_track_caller+0x3c/0x60 [ 168.327475][T11527] __kmalloc_node_track_caller+0x3c/0x60 [ 168.333099][T11527] ? alloc_uevent_skb+0x7f/0x230 [ 168.338032][T11527] __alloc_skb+0xe8/0x500 [ 168.342375][T11527] alloc_uevent_skb+0x7f/0x230 [ 168.347137][T11527] kobject_uevent_env+0xcbb/0x1260 [ 168.352252][T11527] kobject_uevent+0x1f/0x30 [ 168.356745][T11527] __loop_clr_fd+0x544/0x8e0 [ 168.361335][T11527] lo_ioctl+0x11a7/0x2400 [ 168.365663][T11527] ? match_held_lock+0x280/0x280 [ 168.370591][T11527] ? __bfs+0x550/0x550 [ 168.374652][T11527] ? lo_release+0x1f0/0x1f0 [ 168.379144][T11527] ? register_lock_class+0xde/0x1110 [ 168.384453][T11527] ? match_held_lock+0x280/0x280 [ 168.389383][T11527] ? __bfs+0x550/0x550 [ 168.393446][T11527] ? __bfs+0x550/0x550 [ 168.397513][T11527] ? __bfs+0x550/0x550 [ 168.401573][T11527] ? __lock_acquire+0xcf7/0x1a40 [ 168.406505][T11527] ? match_held_lock+0x280/0x280 [ 168.411522][T11527] ? __lock_acquire+0xcf7/0x1a40 [ 168.416446][T11527] ? __bfs+0x550/0x550 [ 168.420516][T11527] ? __lock_acquire+0xcf7/0x1a40 [ 168.425539][T11527] ? __lock_acquire+0xcf7/0x1a40 [ 168.430479][T11527] ? trace_lock_acquire+0x190/0x190 [ 168.435682][T11527] ? __read_once_size_nocheck+0x10/0x10 [ 168.441216][T11527] ? unwind_next_frame+0x415/0x870 [ 168.446417][T11527] ? rcu_lock_release+0x9/0x30 [ 168.451176][T11527] ? stack_trace_save+0x1e0/0x1e0 [ 168.456208][T11527] ? rcu_lock_release+0x26/0x30 [ 168.461057][T11527] ? is_bpf_text_address+0x398/0x3b0 [ 168.466336][T11527] ? stack_trace_save+0x1e0/0x1e0 [ 168.471355][T11527] ? __kernel_text_address+0x9a/0x110 [ 168.476719][T11527] ? unwind_get_return_address+0x4c/0x90 [ 168.482342][T11527] ? arch_stack_walk+0x98/0xe0 [ 168.487105][T11527] ? stack_trace_save+0x111/0x1e0 [ 168.492124][T11527] ? lo_release+0x1f0/0x1f0 [ 168.496622][T11527] blkdev_ioctl+0x917/0x2c10 [ 168.501202][T11527] ? tomoyo_path_number_perm+0x587/0x740 [ 168.506828][T11527] ? trace_hardirqs_off+0x74/0x80 [ 168.511844][T11527] ? quarantine_put+0xb7/0x1f0 [ 168.516608][T11527] ? tomoyo_path_number_perm+0x587/0x740 [ 168.522228][T11527] ? __blkdev_driver_ioctl+0xc0/0xc0 [ 168.527512][T11527] ? __kasan_slab_free+0x19d/0x1e0 [ 168.532614][T11527] ? __kasan_slab_free+0x12a/0x1e0 [ 168.537710][T11527] ? kasan_slab_free+0xe/0x10 [ 168.543232][T11527] ? kfree+0xae/0x120 [ 168.547202][T11527] ? tomoyo_path_number_perm+0x587/0x740 [ 168.552820][T11527] ? tomoyo_file_ioctl+0x23/0x30 [ 168.557742][T11527] ? security_file_ioctl+0x6d/0xd0 [ 168.562836][T11527] ? __x64_sys_ioctl+0xa3/0x120 [ 168.567672][T11527] ? do_syscall_64+0xfe/0x140 [ 168.572341][T11527] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 168.578400][T11527] ? kasan_check_write+0x14/0x20 23:25:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 168.583323][T11527] ? do_raw_spin_lock+0x143/0x3a0 [ 168.588366][T11527] ? _raw_spin_unlock_irqrestore+0xbc/0xe0 [ 168.594263][T11527] ? rcu_lock_release+0x9/0x30 [ 168.599024][T11527] ? tomoyo_path_number_perm+0x5f0/0x740 [ 168.604648][T11527] ? trace_lock_acquire+0x190/0x190 [ 168.609842][T11527] ? tomoyo_check_path_acl+0x180/0x180 [ 168.615294][T11527] block_ioctl+0xbd/0x100 [ 168.619613][T11527] ? blkdev_iopoll+0x100/0x100 [ 168.624376][T11527] do_vfs_ioctl+0x7d4/0x1890 [ 168.628961][T11527] ? ioctl_preallocate+0x240/0x240 [ 168.634078][T11527] ? fget_many+0x30/0x30 [ 168.638485][T11527] ? debug_smp_processor_id+0x1c/0x20 [ 168.645062][T11527] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 168.651121][T11527] ? tomoyo_file_ioctl+0x23/0x30 [ 168.656050][T11527] ? security_file_ioctl+0xa1/0xd0 [ 168.661155][T11527] __x64_sys_ioctl+0xe3/0x120 [ 168.665827][T11527] do_syscall_64+0xfe/0x140 [ 168.670329][T11527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 168.676211][T11527] RIP: 0033:0x459387 [ 168.680093][T11527] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 168.699683][T11527] RSP: 002b:00007f6588da59f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 168.708080][T11527] RAX: ffffffffffffffda RBX: 00007f6588da66d4 RCX: 0000000000459387 [ 168.716039][T11527] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 168.723997][T11527] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000c [ 168.731953][T11527] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000004 [ 168.739910][T11527] R13: 0000000000000000 R14: 0000000000000005 R15: 0000000000000003 23:25:56 executing program 5 (fault-call:0 fault-nth:72): syz_read_part_table(0x0, 0x0, 0x0) 23:25:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f6400000000", 0x37}], 0x1}, 0x0) 23:25:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f6400000000", 0x37}], 0x1}, 0x0) 23:25:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f640000", 0x35}], 0x1}, 0x0) 23:25:56 executing program 5: syz_read_part_table(0x0, 0x0, 0x0) 23:25:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f640000", 0x35}], 0x1}, 0x0) 23:25:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:56 executing program 5: syz_read_part_table(0x2, 0x0, 0x0) 23:25:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 23:25:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x2}}], 0x1, 0x0, 0x0) 23:25:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64", 0x33}], 0x1}, 0x0) 23:25:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64", 0x33}], 0x1}, 0x0) 23:25:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 23:25:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) 23:25:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x4}}], 0x1, 0x0, 0x0) 23:25:56 executing program 5: syz_read_part_table(0x3, 0x0, 0x0) 23:25:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 23:25:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f64", 0x33}], 0x1}, 0x0) 23:25:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x5}}], 0x1, 0x0, 0x0) 23:25:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00), 0x0, 0x0, 0x0) 23:25:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f6400", 0x34}], 0x1}, 0x0) 23:25:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00), 0x0, 0x0, 0x0) 23:25:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:57 executing program 5: syz_read_part_table(0x4, 0x0, 0x0) 23:25:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f6400", 0x34}], 0x1}, 0x0) 23:25:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x6}}], 0x1, 0x0, 0x0) 23:25:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xa}}], 0x1, 0x0, 0x0) 23:25:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5005e0bcfec7be070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007041dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475bb65f6400", 0x34}], 0x1}, 0x0) 23:25:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00), 0x0, 0x0, 0x0) 23:25:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:57 executing program 5: syz_read_part_table(0x5, 0x0, 0x0) 23:25:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xc}}], 0x1, 0x0, 0x0) 23:25:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xf}}], 0x1, 0x0, 0x0) 23:25:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x10}}], 0x1, 0x0, 0x0) 23:25:57 executing program 5: syz_read_part_table(0x6, 0x0, 0x0) 23:25:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x60}}], 0x1, 0x0, 0x0) 23:25:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 23:25:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x2d0}}], 0x1, 0x0, 0x0) 23:25:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 23:25:57 executing program 5: syz_read_part_table(0x7, 0x0, 0x0) 23:25:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x300}}], 0x1, 0x0, 0x0) 23:25:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 23:25:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x500}}], 0x1, 0x0, 0x0) 23:25:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 23:25:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x600}}], 0x1, 0x0, 0x0) 23:25:58 executing program 5: syz_read_part_table(0x8, 0x0, 0x0) 23:25:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 23:25:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xa00}}], 0x1, 0x0, 0x0) 23:25:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 23:25:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xc00}}], 0x1, 0x0, 0x0) 23:25:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:58 executing program 5: syz_read_part_table(0x9, 0x0, 0x0) 23:25:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xec0}}], 0x1, 0x0, 0x0) 23:25:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xf00}}], 0x1, 0x0, 0x0) 23:25:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:58 executing program 5: syz_read_part_table(0xa, 0x0, 0x0) 23:25:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x3f00}}], 0x1, 0x0, 0x0) 23:25:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x4000}}], 0x1, 0x0, 0x0) 23:25:59 executing program 5: syz_read_part_table(0xb, 0x0, 0x0) 23:25:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x4788}}], 0x1, 0x0, 0x0) 23:25:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x4888}}], 0x1, 0x0, 0x0) 23:25:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:59 executing program 5: syz_read_part_table(0xc, 0x0, 0x0) 23:25:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x5865}}], 0x1, 0x0, 0x0) 23:25:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x6000}}], 0x1, 0x0, 0x0) 23:25:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:59 executing program 5: syz_read_part_table(0xd, 0x0, 0x0) 23:25:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:59 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:25:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x6558}}], 0x1, 0x0, 0x0) 23:25:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:25:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:25:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x7ec0}}], 0x1, 0x0, 0x0) 23:25:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:00 executing program 5: syz_read_part_table(0xe, 0x0, 0x0) 23:26:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x8100}}], 0x1, 0x0, 0x0) 23:26:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x8847}}], 0x1, 0x0, 0x0) 23:26:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x8848}}], 0x1, 0x0, 0x0) 23:26:00 executing program 5: syz_read_part_table(0x10, 0x0, 0x0) 23:26:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xc00e}}], 0x1, 0x0, 0x0) 23:26:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:00 executing program 5: syz_read_part_table(0x11, 0x0, 0x0) 23:26:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xc07e}}], 0x1, 0x0, 0x0) 23:26:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xd002}}], 0x1, 0x0, 0x0) 23:26:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x1a000}}], 0x1, 0x0, 0x0) 23:26:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:00 executing program 5: syz_read_part_table(0x12, 0x0, 0x0) 23:26:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 23:26:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x34000}}], 0x1, 0x0, 0x0) 23:26:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(0xffffffffffffffff, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r2, &(0x7f0000015f40)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000000c0)="c0", 0x1}], 0x1}}], 0x1, 0x0) 23:26:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0, 0x0) 23:26:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 23:26:01 executing program 5: syz_read_part_table(0x25, 0x0, 0x0) 23:26:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 23:26:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x0) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r2, &(0x7f0000015f40)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000000c0)="c0", 0x1}], 0x1}}], 0x1, 0x0) 23:26:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x400300}}], 0x1, 0x0, 0x0) 23:26:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00), 0x0, 0x0, 0x0) 23:26:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x3000000, 0x0}}], 0x1, 0x0, 0x0) 23:26:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00), 0x0, 0x0, 0x0) 23:26:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xa00100}}], 0x1, 0x0, 0x0) 23:26:01 executing program 5: syz_read_part_table(0x48, 0x0, 0x0) 23:26:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r2, &(0x7f0000015f40)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000000c0)="c0", 0x1}], 0x1}}], 0x1, 0x0) 23:26:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00), 0x0, 0x0, 0x0) 23:26:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:01 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000015f40)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000000c0)="c0", 0x1}], 0x1}}], 0x1, 0x0) 23:26:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x1000000}}], 0x1, 0x0, 0x0) 23:26:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:26:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:01 executing program 5: syz_read_part_table(0x4c, 0x0, 0x0) 23:26:01 executing program 1 (fault-call:6 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x2000000}}], 0x1, 0x0, 0x0) 23:26:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:26:01 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x3000000}}], 0x1, 0x0, 0x0) 23:26:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 174.640382][T12064] FAULT_INJECTION: forcing a failure. [ 174.640382][T12064] name failslab, interval 1, probability 0, space 0, times 0 [ 174.681287][T12064] CPU: 0 PID: 12064 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 174.689221][T12064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.699531][T12064] Call Trace: [ 174.702825][T12064] dump_stack+0x1d8/0x2f8 [ 174.707152][T12064] should_fail+0x608/0x860 [ 174.711564][T12064] ? setup_fault_attr+0x2b0/0x2b0 [ 174.716582][T12064] ? sock_kmalloc+0xac/0x120 [ 174.721169][T12064] __should_failslab+0x11a/0x160 [ 174.726100][T12064] ? sock_kmalloc+0xac/0x120 [ 174.730683][T12064] should_failslab+0x9/0x20 [ 174.735177][T12064] __kmalloc+0x7a/0x310 [ 174.739338][T12064] sock_kmalloc+0xac/0x120 [ 174.743751][T12064] af_alg_alloc_areq+0x28/0x180 [ 174.748596][T12064] aead_recvmsg+0x51e/0x1c50 [ 174.753201][T12064] ? aead_sendmsg+0x110/0x110 [ 174.757876][T12064] ? __lock_acquire+0xcf7/0x1a40 [ 174.762825][T12064] ? __might_fault+0xf9/0x160 [ 174.767500][T12064] ? kasan_check_write+0x14/0x20 [ 174.772428][T12064] ? _copy_from_user+0xe0/0x120 [ 174.777271][T12064] ? rw_copy_check_uvector+0x2e4/0x310 [ 174.782735][T12064] ? import_iovec+0x17e/0x340 [ 174.787402][T12064] ? __might_fault+0xf9/0x160 [ 174.792076][T12064] ? security_socket_recvmsg+0xa9/0xd0 [ 174.797527][T12064] ? aead_sendmsg+0x110/0x110 [ 174.802195][T12064] sock_recvmsg+0xe7/0x100 [ 174.806605][T12064] ___sys_recvmsg+0x28b/0x9c0 [ 174.811281][T12064] ? __sys_recvmsg+0x250/0x250 [ 174.816047][T12064] ? rcu_lock_release+0xd/0x30 [ 174.820811][T12064] ? rcu_lock_release+0x26/0x30 [ 174.825653][T12064] ? __fget+0x4fe/0x540 [ 174.829809][T12064] ? fget_many+0x30/0x30 [ 174.834044][T12064] ? __mutex_lock_common+0x56b/0x2fc0 [ 174.839416][T12064] ? __fdget+0x17c/0x200 [ 174.843747][T12064] do_recvmmsg+0x33d/0x870 [ 174.848165][T12064] ? __sys_recvmmsg+0x220/0x220 [ 174.853009][T12064] ? kasan_check_write+0x14/0x20 [ 174.857936][T12064] ? __mutex_unlock_slowpath+0x18c/0x630 [ 174.863566][T12064] ? kasan_check_write+0x14/0x20 [ 174.868498][T12064] ? fput_many+0x47/0x1a0 [ 174.872826][T12064] ? check_preemption_disabled+0xb7/0x280 [ 174.878541][T12064] __x64_sys_recvmmsg+0x17c/0x220 [ 174.883559][T12064] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 174.889188][T12064] ? do_recvmmsg+0x870/0x870 [ 174.893854][T12064] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 174.899573][T12064] ? do_syscall_64+0x1d/0x140 [ 174.904246][T12064] do_syscall_64+0xfe/0x140 [ 174.908743][T12064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.914624][T12064] RIP: 0033:0x459519 [ 174.918512][T12064] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.938110][T12064] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 174.948027][T12064] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 174.955996][T12064] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 174.966338][T12064] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 174.974303][T12064] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 174.982262][T12064] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:02 executing program 5: syz_read_part_table(0x5c, 0x0, 0x0) 23:26:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x4000000}}], 0x1, 0x0, 0x0) 23:26:02 executing program 1 (fault-call:6 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 175.170981][T12078] FAULT_INJECTION: forcing a failure. [ 175.170981][T12078] name failslab, interval 1, probability 0, space 0, times 0 [ 175.211051][T12078] CPU: 1 PID: 12078 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 175.218982][T12078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.229212][T12078] Call Trace: [ 175.232627][T12078] dump_stack+0x1d8/0x2f8 [ 175.236967][T12078] should_fail+0x608/0x860 [ 175.241908][T12078] ? setup_fault_attr+0x2b0/0x2b0 [ 175.246938][T12078] ? sock_kmalloc+0xac/0x120 [ 175.251532][T12078] __should_failslab+0x11a/0x160 [ 175.256469][T12078] ? sock_kmalloc+0xac/0x120 [ 175.261053][T12078] should_failslab+0x9/0x20 [ 175.265550][T12078] __kmalloc+0x7a/0x310 [ 175.269710][T12078] sock_kmalloc+0xac/0x120 [ 175.274130][T12078] af_alg_alloc_areq+0x28/0x180 [ 175.278984][T12078] aead_recvmsg+0x51e/0x1c50 [ 175.283589][T12078] ? aead_sendmsg+0x110/0x110 [ 175.288281][T12078] ? __might_fault+0xf9/0x160 [ 175.292992][T12078] ? kasan_check_write+0x14/0x20 [ 175.297921][T12078] ? _copy_from_user+0xe0/0x120 [ 175.302769][T12078] ? rw_copy_check_uvector+0x2e4/0x310 [ 175.308315][T12078] ? import_iovec+0x17e/0x340 [ 175.313156][T12078] ? __might_fault+0xf9/0x160 [ 175.317827][T12078] ? security_socket_recvmsg+0xa9/0xd0 [ 175.323279][T12078] ? aead_sendmsg+0x110/0x110 [ 175.327942][T12078] sock_recvmsg+0xe7/0x100 [ 175.332440][T12078] ___sys_recvmsg+0x28b/0x9c0 [ 175.337117][T12078] ? __sys_recvmsg+0x250/0x250 [ 175.341974][T12078] ? rcu_lock_release+0xd/0x30 [ 175.346734][T12078] ? rcu_lock_release+0x26/0x30 [ 175.351574][T12078] ? __fget+0x4fe/0x540 [ 175.355732][T12078] ? fget_many+0x30/0x30 [ 175.359967][T12078] ? __mutex_lock_common+0x56b/0x2fc0 [ 175.365359][T12078] ? __fdget+0x17c/0x200 [ 175.369596][T12078] do_recvmmsg+0x33d/0x870 [ 175.374011][T12078] ? __sys_recvmmsg+0x220/0x220 [ 175.378854][T12078] ? kasan_check_write+0x14/0x20 [ 175.383780][T12078] ? __mutex_unlock_slowpath+0x18c/0x630 [ 175.389412][T12078] ? kasan_check_write+0x14/0x20 [ 175.394346][T12078] ? fput_many+0x47/0x1a0 [ 175.398672][T12078] ? check_preemption_disabled+0xb7/0x280 [ 175.404391][T12078] __x64_sys_recvmmsg+0x17c/0x220 [ 175.409419][T12078] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 175.415378][T12078] ? do_recvmmsg+0x870/0x870 [ 175.419959][T12078] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 175.425671][T12078] ? do_syscall_64+0x1d/0x140 [ 175.430349][T12078] do_syscall_64+0xfe/0x140 [ 175.434858][T12078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.440828][T12078] RIP: 0033:0x459519 [ 175.444717][T12078] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:26:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:26:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x5000000}}], 0x1, 0x0, 0x0) 23:26:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 23:26:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 175.464315][T12078] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 175.472718][T12078] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 175.480682][T12078] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 175.488647][T12078] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 175.496613][T12078] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 175.504573][T12078] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:02 executing program 1 (fault-call:6 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 23:26:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:02 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x6000000}}], 0x1, 0x0, 0x0) 23:26:02 executing program 5: syz_read_part_table(0x68, 0x0, 0x0) 23:26:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) [ 175.697508][T12104] FAULT_INJECTION: forcing a failure. [ 175.697508][T12104] name failslab, interval 1, probability 0, space 0, times 0 23:26:02 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 175.738892][T12104] CPU: 0 PID: 12104 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 175.746826][T12104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.756897][T12104] Call Trace: [ 175.760197][T12104] dump_stack+0x1d8/0x2f8 [ 175.764532][T12104] should_fail+0x608/0x860 [ 175.768961][T12104] ? setup_fault_attr+0x2b0/0x2b0 [ 175.773991][T12104] ? sock_kmalloc+0xac/0x120 [ 175.778590][T12104] __should_failslab+0x11a/0x160 [ 175.783536][T12104] ? sock_kmalloc+0xac/0x120 23:26:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xa000000}}], 0x1, 0x0, 0x0) [ 175.788128][T12104] should_failslab+0x9/0x20 [ 175.792633][T12104] __kmalloc+0x7a/0x310 [ 175.796809][T12104] sock_kmalloc+0xac/0x120 [ 175.801231][T12104] af_alg_alloc_areq+0x28/0x180 [ 175.806085][T12104] aead_recvmsg+0x51e/0x1c50 [ 175.810697][T12104] ? aead_sendmsg+0x110/0x110 [ 175.815389][T12104] ? __might_fault+0xf9/0x160 [ 175.820074][T12104] ? kasan_check_write+0x14/0x20 [ 175.825012][T12104] ? _copy_from_user+0xe0/0x120 [ 175.829864][T12104] ? rw_copy_check_uvector+0x2e4/0x310 23:26:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r0, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 175.835328][T12104] ? import_iovec+0x17e/0x340 [ 175.840056][T12104] ? rcu_irq_exit+0x118/0x2b0 [ 175.844735][T12104] ? security_socket_recvmsg+0xa9/0xd0 [ 175.850192][T12104] ? aead_sendmsg+0x110/0x110 [ 175.854878][T12104] sock_recvmsg+0xe7/0x100 [ 175.859302][T12104] ___sys_recvmsg+0x28b/0x9c0 [ 175.863986][T12104] ? __sys_recvmsg+0x250/0x250 [ 175.868756][T12104] ? rcu_lock_release+0xd/0x30 [ 175.873548][T12104] ? rcu_lock_release+0x26/0x30 [ 175.878398][T12104] ? __fget+0x4fe/0x540 [ 175.882559][T12104] ? fget_many+0x30/0x30 [ 175.886805][T12104] ? __vfs_write+0x92/0x7d0 [ 175.891312][T12104] ? __fdget+0x17c/0x200 [ 175.895561][T12104] do_recvmmsg+0x33d/0x870 [ 175.899983][T12104] ? retint_kernel+0x2b/0x2b [ 175.904585][T12104] ? __sys_recvmmsg+0x220/0x220 [ 175.909435][T12104] ? retint_kernel+0x2b/0x2b [ 175.914029][T12104] ? kasan_check_write+0x14/0x20 [ 175.918963][T12104] ? fput_many+0x47/0x1a0 [ 175.923294][T12104] ? check_preemption_disabled+0xb7/0x280 [ 175.929025][T12104] __x64_sys_recvmmsg+0x17c/0x220 [ 175.934138][T12104] ? do_recvmmsg+0x870/0x870 [ 175.938726][T12104] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 175.944426][T12104] ? do_syscall_64+0x1d/0x140 [ 175.944450][T12104] do_syscall_64+0xfe/0x140 [ 175.944463][T12104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.944472][T12104] RIP: 0033:0x459519 [ 175.944481][T12104] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:26:03 executing program 1 (fault-call:6 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xc000000}}], 0x1, 0x0, 0x0) 23:26:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r0, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 175.944486][T12104] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 175.944495][T12104] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 175.944499][T12104] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 175.944504][T12104] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 175.944508][T12104] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 175.944513][T12104] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 176.109666][T12136] FAULT_INJECTION: forcing a failure. [ 176.109666][T12136] name failslab, interval 1, probability 0, space 0, times 0 [ 176.133691][T12136] CPU: 0 PID: 12136 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 176.141619][T12136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.151666][T12136] Call Trace: [ 176.154953][T12136] dump_stack+0x1d8/0x2f8 [ 176.159283][T12136] should_fail+0x608/0x860 [ 176.163796][T12136] ? setup_fault_attr+0x2b0/0x2b0 [ 176.168907][T12136] ? sock_kmalloc+0xac/0x120 [ 176.173497][T12136] __should_failslab+0x11a/0x160 [ 176.178454][T12136] ? sock_kmalloc+0xac/0x120 [ 176.183033][T12136] should_failslab+0x9/0x20 [ 176.187528][T12136] __kmalloc+0x7a/0x310 [ 176.191683][T12136] sock_kmalloc+0xac/0x120 [ 176.196092][T12136] af_alg_alloc_areq+0x28/0x180 [ 176.200941][T12136] aead_recvmsg+0x51e/0x1c50 [ 176.205546][T12136] ? aead_sendmsg+0x110/0x110 [ 176.210227][T12136] ? __might_fault+0xf9/0x160 [ 176.214906][T12136] ? kasan_check_write+0x14/0x20 [ 176.219829][T12136] ? _copy_from_user+0xe0/0x120 [ 176.224670][T12136] ? rw_copy_check_uvector+0x2e4/0x310 [ 176.230127][T12136] ? import_iovec+0x17e/0x340 [ 176.234804][T12136] ? security_socket_recvmsg+0xa9/0xd0 [ 176.240253][T12136] ? aead_sendmsg+0x110/0x110 [ 176.244924][T12136] sock_recvmsg+0xe7/0x100 [ 176.249333][T12136] ___sys_recvmsg+0x28b/0x9c0 [ 176.254010][T12136] ? __sys_recvmsg+0x250/0x250 [ 176.258860][T12136] ? rcu_lock_release+0xd/0x30 [ 176.263620][T12136] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 176.269075][T12136] ? trace_hardirqs_on_caller+0x74/0x80 [ 176.274611][T12136] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 176.280061][T12136] ? rcu_irq_exit+0x118/0x2b0 [ 176.284731][T12136] ? retint_kernel+0x2b/0x2b [ 176.289326][T12136] do_recvmmsg+0x33d/0x870 [ 176.293746][T12136] ? __sys_recvmmsg+0x220/0x220 [ 176.298589][T12136] ? kasan_check_write+0x14/0x20 [ 176.303538][T12136] ? __mutex_unlock_slowpath+0x18c/0x630 [ 176.309171][T12136] ? kasan_check_write+0x14/0x20 [ 176.314095][T12136] ? fput_many+0x47/0x1a0 [ 176.318419][T12136] ? check_preemption_disabled+0xb7/0x280 [ 176.324140][T12136] __x64_sys_recvmmsg+0x17c/0x220 [ 176.329423][T12136] ? do_recvmmsg+0x870/0x870 [ 176.334001][T12136] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 176.339711][T12136] ? do_syscall_64+0x1d/0x140 [ 176.344389][T12136] do_syscall_64+0xfe/0x140 [ 176.348884][T12136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.354767][T12136] RIP: 0033:0x459519 [ 176.358653][T12136] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 176.378244][T12136] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 176.386746][T12136] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 176.394883][T12136] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 176.402852][T12136] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 176.410900][T12136] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 176.418862][T12136] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:03 executing program 5: syz_read_part_table(0x6c, 0x0, 0x0) 23:26:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 23:26:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xf000000}}], 0x1, 0x0, 0x0) 23:26:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r0, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:03 executing program 1 (fault-call:6 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:03 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x10000000}}], 0x1, 0x0, 0x0) 23:26:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:03 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) [ 176.630421][T12148] FAULT_INJECTION: forcing a failure. [ 176.630421][T12148] name failslab, interval 1, probability 0, space 0, times 0 [ 176.691464][T12148] CPU: 0 PID: 12148 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 176.699397][T12148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.709461][T12148] Call Trace: [ 176.712758][T12148] dump_stack+0x1d8/0x2f8 [ 176.717085][T12148] should_fail+0x608/0x860 [ 176.721497][T12148] ? setup_fault_attr+0x2b0/0x2b0 [ 176.726513][T12148] ? ___might_sleep+0x115/0x530 [ 176.731368][T12148] __should_failslab+0x11a/0x160 [ 176.736303][T12148] ? sock_kmalloc+0xac/0x120 [ 176.740892][T12148] should_failslab+0x9/0x20 [ 176.745387][T12148] __kmalloc+0x7a/0x310 [ 176.749546][T12148] sock_kmalloc+0xac/0x120 [ 176.754043][T12148] af_alg_alloc_areq+0x28/0x180 [ 176.758888][T12148] aead_recvmsg+0x51e/0x1c50 [ 176.763489][T12148] ? aead_sendmsg+0x110/0x110 [ 176.768163][T12148] ? retint_kernel+0x2b/0x2b [ 176.772834][T12148] ? trace_hardirqs_on_caller+0x74/0x80 [ 176.778367][T12148] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 176.783992][T12148] ? rcu_irq_exit+0x118/0x2b0 [ 176.788662][T12148] ? retint_kernel+0x2b/0x2b [ 176.793255][T12148] ? rw_copy_check_uvector+0x1fd/0x310 [ 176.798711][T12148] ? rw_copy_check_uvector+0x20f/0x310 [ 176.804162][T12148] ? rw_copy_check_uvector+0x2e4/0x310 [ 176.809620][T12148] ? import_iovec+0x17e/0x340 [ 176.814294][T12148] ? __might_fault+0xf9/0x160 [ 176.818967][T12148] ? security_socket_recvmsg+0xa9/0xd0 [ 176.824417][T12148] ? aead_sendmsg+0x110/0x110 [ 176.829087][T12148] sock_recvmsg+0xe7/0x100 [ 176.833507][T12148] ___sys_recvmsg+0x28b/0x9c0 [ 176.838192][T12148] ? __sys_recvmsg+0x250/0x250 [ 176.842958][T12148] ? rcu_lock_release+0xd/0x30 [ 176.847724][T12148] ? rcu_lock_release+0x26/0x30 [ 176.852564][T12148] ? __fget+0x4fe/0x540 [ 176.856741][T12148] ? fget_many+0x30/0x30 [ 176.860985][T12148] ? trace_hardirqs_on_caller+0x74/0x80 [ 176.866533][T12148] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 176.872075][T12148] ? __fdget+0x17c/0x200 [ 176.876311][T12148] do_recvmmsg+0x33d/0x870 [ 176.880735][T12148] ? __sys_recvmmsg+0x220/0x220 [ 176.885577][T12148] ? kasan_check_write+0x14/0x20 [ 176.890507][T12148] ? __mutex_unlock_slowpath+0x18c/0x630 [ 176.896137][T12148] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 176.901586][T12148] ? retint_kernel+0x2b/0x2b [ 176.906194][T12148] ? trace_hardirqs_on_caller+0x74/0x80 [ 176.911733][T12148] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 176.917187][T12148] __x64_sys_recvmmsg+0x17c/0x220 [ 176.922201][T12148] ? retint_kernel+0x2b/0x2b [ 176.926786][T12148] ? do_recvmmsg+0x870/0x870 [ 176.931370][T12148] ? do_syscall_64+0xc0/0x140 [ 176.936045][T12148] do_syscall_64+0xfe/0x140 [ 176.940551][T12148] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.947612][T12148] RIP: 0033:0x459519 [ 176.951509][T12148] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 176.972086][T12148] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 176.980487][T12148] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 23:26:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x3f000000}}], 0x1, 0x0, 0x0) [ 176.988450][T12148] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 176.996415][T12148] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 177.004467][T12148] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 177.012428][T12148] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:04 executing program 5: syz_read_part_table(0x74, 0x0, 0x0) 23:26:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 23:26:04 executing program 1 (fault-call:6 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x40000000}}], 0x1, 0x0, 0x0) 23:26:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:26:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:04 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x60000000}}], 0x1, 0x0, 0x0) [ 177.237043][T12174] FAULT_INJECTION: forcing a failure. [ 177.237043][T12174] name failslab, interval 1, probability 0, space 0, times 0 [ 177.300880][T12174] CPU: 1 PID: 12174 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 177.308858][T12174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.318917][T12174] Call Trace: [ 177.322221][T12174] dump_stack+0x1d8/0x2f8 [ 177.326560][T12174] should_fail+0x608/0x860 [ 177.330973][T12174] ? setup_fault_attr+0x2b0/0x2b0 [ 177.336000][T12174] ? sock_kmalloc+0xac/0x120 [ 177.340594][T12174] __should_failslab+0x11a/0x160 [ 177.345531][T12174] ? sock_kmalloc+0xac/0x120 [ 177.350120][T12174] should_failslab+0x9/0x20 [ 177.354618][T12174] __kmalloc+0x7a/0x310 [ 177.358772][T12174] sock_kmalloc+0xac/0x120 [ 177.363185][T12174] af_alg_alloc_areq+0x28/0x180 [ 177.368030][T12174] aead_recvmsg+0x51e/0x1c50 [ 177.372636][T12174] ? aead_sendmsg+0x110/0x110 [ 177.377322][T12174] ? __might_fault+0xf9/0x160 [ 177.381999][T12174] ? kasan_check_write+0x14/0x20 [ 177.386932][T12174] ? _copy_from_user+0xe0/0x120 [ 177.392121][T12174] ? rw_copy_check_uvector+0x2e4/0x310 [ 177.397586][T12174] ? import_iovec+0x17e/0x340 [ 177.402251][T12174] ? __might_fault+0xf9/0x160 [ 177.406928][T12174] ? security_socket_recvmsg+0xa9/0xd0 [ 177.412375][T12174] ? aead_sendmsg+0x110/0x110 [ 177.417044][T12174] sock_recvmsg+0xe7/0x100 [ 177.421457][T12174] ___sys_recvmsg+0x28b/0x9c0 [ 177.426131][T12174] ? __sys_recvmsg+0x250/0x250 [ 177.430902][T12174] ? rcu_lock_release+0xd/0x30 [ 177.435675][T12174] ? rcu_lock_release+0x26/0x30 [ 177.440610][T12174] ? __fget+0x4fe/0x540 [ 177.444766][T12174] ? fget_many+0x30/0x30 [ 177.449177][T12174] ? __mutex_lock_common+0x56b/0x2fc0 [ 177.459956][T12174] ? __fdget+0x17c/0x200 [ 177.464192][T12174] do_recvmmsg+0x33d/0x870 [ 177.468617][T12174] ? __sys_recvmmsg+0x220/0x220 [ 177.473460][T12174] ? kasan_check_write+0x14/0x20 [ 177.478386][T12174] ? __mutex_unlock_slowpath+0x18c/0x630 [ 177.484022][T12174] ? kasan_check_write+0x14/0x20 [ 177.488950][T12174] ? fput_many+0x47/0x1a0 [ 177.493272][T12174] ? check_preemption_disabled+0xb7/0x280 [ 177.498988][T12174] __x64_sys_recvmmsg+0x17c/0x220 [ 177.504005][T12174] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 177.509636][T12174] ? do_recvmmsg+0x870/0x870 [ 177.514214][T12174] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 177.519925][T12174] ? do_syscall_64+0x1d/0x140 [ 177.524600][T12174] do_syscall_64+0xfe/0x140 [ 177.529101][T12174] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.534980][T12174] RIP: 0033:0x459519 23:26:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 177.538866][T12174] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 177.558462][T12174] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 177.566870][T12174] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 177.574925][T12174] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 177.582901][T12174] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 177.590862][T12174] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 23:26:04 executing program 1 (fault-call:6 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 177.598823][T12174] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 177.724411][T12191] FAULT_INJECTION: forcing a failure. [ 177.724411][T12191] name failslab, interval 1, probability 0, space 0, times 0 [ 177.742966][T12191] CPU: 1 PID: 12191 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 177.751052][T12191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.751061][T12191] Call Trace: [ 177.764426][T12191] dump_stack+0x1d8/0x2f8 [ 177.768762][T12191] should_fail+0x608/0x860 [ 177.773175][T12191] ? setup_fault_attr+0x2b0/0x2b0 [ 177.778192][T12191] ? sock_kmalloc+0xac/0x120 [ 177.782781][T12191] __should_failslab+0x11a/0x160 [ 177.787717][T12191] ? sock_kmalloc+0xac/0x120 [ 177.792301][T12191] should_failslab+0x9/0x20 [ 177.797005][T12191] __kmalloc+0x7a/0x310 [ 177.801154][T12191] sock_kmalloc+0xac/0x120 [ 177.805593][T12191] af_alg_alloc_areq+0x28/0x180 [ 177.810453][T12191] aead_recvmsg+0x51e/0x1c50 [ 177.815057][T12191] ? aead_sendmsg+0x110/0x110 [ 177.819727][T12191] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 177.825177][T12191] ? retint_kernel+0x2b/0x2b [ 177.829757][T12191] ? trace_hardirqs_on_caller+0x74/0x80 [ 177.835294][T12191] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 177.840744][T12191] ? rcu_irq_exit+0x118/0x2b0 [ 177.845426][T12191] ? retint_kernel+0x2b/0x2b [ 177.850014][T12191] ? rw_copy_check_uvector+0x1a9/0x310 [ 177.855466][T12191] ? rw_copy_check_uvector+0x1ba/0x310 [ 177.860916][T12191] ? __sanitizer_cov_trace_pc+0x22/0x50 [ 177.866458][T12191] ? rw_copy_check_uvector+0x2e4/0x310 [ 177.871914][T12191] ? import_iovec+0x17e/0x340 [ 177.876579][T12191] ? __might_fault+0xf9/0x160 [ 177.881251][T12191] ? security_socket_recvmsg+0xa9/0xd0 [ 177.886707][T12191] ? aead_sendmsg+0x110/0x110 [ 177.891378][T12191] sock_recvmsg+0xe7/0x100 [ 177.895791][T12191] ___sys_recvmsg+0x28b/0x9c0 [ 177.900470][T12191] ? __sys_recvmsg+0x250/0x250 [ 177.905232][T12191] ? rcu_lock_release+0xd/0x30 [ 177.909992][T12191] ? rcu_lock_release+0x26/0x30 [ 177.914834][T12191] ? __fget+0x4fe/0x540 [ 177.918986][T12191] ? fget_many+0x30/0x30 [ 177.923219][T12191] ? __mutex_lock_common+0x56b/0x2fc0 [ 177.928587][T12191] ? __fdget+0x17c/0x200 [ 177.932822][T12191] do_recvmmsg+0x33d/0x870 [ 177.937236][T12191] ? __sys_recvmmsg+0x220/0x220 [ 177.942089][T12191] ? trace_hardirqs_on_caller+0x74/0x80 [ 177.947638][T12191] ? retint_kernel+0x2b/0x2b [ 177.952222][T12191] ? do_syscall_64+0xc0/0x140 [ 177.956897][T12191] __x64_sys_recvmmsg+0x17c/0x220 [ 177.961913][T12191] ? do_recvmmsg+0x870/0x870 [ 177.966493][T12191] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 177.972206][T12191] ? do_syscall_64+0x1d/0x140 [ 177.976879][T12191] do_syscall_64+0xfe/0x140 [ 177.981377][T12191] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.987261][T12191] RIP: 0033:0x459519 [ 177.991150][T12191] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 178.010843][T12191] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b 23:26:05 executing program 5: syz_read_part_table(0x7a, 0x0, 0x0) 23:26:05 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:05 executing program 3 (fault-call:6 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x65580000}}], 0x1, 0x0, 0x0) 23:26:05 executing program 1 (fault-call:6 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 178.019250][T12191] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 178.027481][T12191] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 178.035446][T12191] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 178.043418][T12191] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 178.051387][T12191] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 178.141649][T12204] FAULT_INJECTION: forcing a failure. [ 178.141649][T12204] name failslab, interval 1, probability 0, space 0, times 0 [ 178.158683][T12204] CPU: 1 PID: 12204 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 178.160274][T12202] FAULT_INJECTION: forcing a failure. [ 178.160274][T12202] name failslab, interval 1, probability 0, space 0, times 0 [ 178.166933][T12204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.166938][T12204] Call Trace: [ 178.166956][T12204] dump_stack+0x1d8/0x2f8 [ 178.166971][T12204] should_fail+0x608/0x860 [ 178.166982][T12204] ? setup_fault_attr+0x2b0/0x2b0 [ 178.166994][T12204] ? sock_kmalloc+0xac/0x120 [ 178.167011][T12204] __should_failslab+0x11a/0x160 [ 178.167022][T12204] ? sock_kmalloc+0xac/0x120 [ 178.167032][T12204] should_failslab+0x9/0x20 [ 178.167040][T12204] __kmalloc+0x7a/0x310 [ 178.167054][T12204] sock_kmalloc+0xac/0x120 [ 178.167066][T12204] af_alg_alloc_areq+0x28/0x180 [ 178.167078][T12204] aead_recvmsg+0x51e/0x1c50 [ 178.167115][T12204] ? aead_sendmsg+0x110/0x110 [ 178.167139][T12204] ? __might_fault+0xf9/0x160 [ 178.167158][T12204] ? kasan_check_write+0x14/0x20 [ 178.167168][T12204] ? _copy_from_user+0xe0/0x120 [ 178.167181][T12204] ? rw_copy_check_uvector+0x2e4/0x310 [ 178.167197][T12204] ? import_iovec+0x17e/0x340 [ 178.167208][T12204] ? __might_fault+0xf9/0x160 [ 178.189840][T12204] ? security_socket_recvmsg+0xa9/0xd0 [ 178.189849][T12204] ? aead_sendmsg+0x110/0x110 [ 178.189869][T12204] sock_recvmsg+0xe7/0x100 [ 178.211428][T12204] ___sys_recvmsg+0x28b/0x9c0 [ 178.211448][T12204] ? __sys_recvmsg+0x250/0x250 [ 178.225422][T12204] ? rcu_lock_release+0xd/0x30 [ 178.225437][T12204] ? rcu_lock_release+0x26/0x30 [ 178.311017][T12204] ? __fget+0x4fe/0x540 [ 178.315176][T12204] ? fget_many+0x30/0x30 [ 178.319409][T12204] ? __mutex_lock_common+0x56b/0x2fc0 [ 178.324777][T12204] ? __fdget+0x17c/0x200 [ 178.329014][T12204] do_recvmmsg+0x33d/0x870 [ 178.333440][T12204] ? __sys_recvmmsg+0x220/0x220 [ 178.338462][T12204] ? kasan_check_write+0x14/0x20 [ 178.343392][T12204] ? __mutex_unlock_slowpath+0x18c/0x630 [ 178.349038][T12204] ? kasan_check_write+0x14/0x20 [ 178.353970][T12204] ? fput_many+0x47/0x1a0 [ 178.358291][T12204] ? check_preemption_disabled+0xb7/0x280 [ 178.364009][T12204] __x64_sys_recvmmsg+0x17c/0x220 [ 178.369027][T12204] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 178.374654][T12204] ? do_recvmmsg+0x870/0x870 [ 178.379231][T12204] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 178.384941][T12204] ? do_syscall_64+0x1d/0x140 [ 178.389613][T12204] do_syscall_64+0xfe/0x140 [ 178.394110][T12204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.399992][T12204] RIP: 0033:0x459519 [ 178.403882][T12204] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 178.423480][T12204] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 178.431881][T12204] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 178.439845][T12204] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 178.447808][T12204] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 178.455768][T12204] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 178.463731][T12204] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 178.471726][T12202] CPU: 0 PID: 12202 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 178.479612][T12202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.489663][T12202] Call Trace: [ 178.492955][T12202] dump_stack+0x1d8/0x2f8 [ 178.497292][T12202] should_fail+0x608/0x860 [ 178.501804][T12202] ? setup_fault_attr+0x2b0/0x2b0 [ 178.506837][T12202] ? sock_kmalloc+0xac/0x120 [ 178.511436][T12202] __should_failslab+0x11a/0x160 [ 178.516375][T12202] ? sock_kmalloc+0xac/0x120 [ 178.520961][T12202] should_failslab+0x9/0x20 [ 178.525466][T12202] __kmalloc+0x7a/0x310 [ 178.529622][T12202] sock_kmalloc+0xac/0x120 [ 178.534040][T12202] af_alg_alloc_areq+0x28/0x180 [ 178.538891][T12202] aead_recvmsg+0x51e/0x1c50 [ 178.543490][T12202] ? aead_sendmsg+0x110/0x110 [ 178.548162][T12202] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 178.553622][T12202] ? retint_kernel+0x2b/0x2b [ 178.558214][T12202] ? trace_hardirqs_on_caller+0x74/0x80 [ 178.563779][T12202] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 178.569241][T12202] ? rcu_irq_exit+0x118/0x2b0 [ 178.573913][T12202] ? retint_kernel+0x2b/0x2b [ 178.578500][T12202] ? copy_user_generic_unrolled+0x89/0xc0 [ 178.584209][T12202] ? _copy_from_user+0xe0/0x120 [ 178.589060][T12202] ? rw_copy_check_uvector+0x2e4/0x310 [ 178.594529][T12202] ? import_iovec+0x17e/0x340 [ 178.599292][T12202] ? __might_fault+0xf9/0x160 [ 178.603975][T12202] ? security_socket_recvmsg+0xa9/0xd0 [ 178.609448][T12202] ? aead_sendmsg+0x110/0x110 [ 178.614126][T12202] sock_recvmsg+0xe7/0x100 [ 178.618542][T12202] ___sys_recvmsg+0x28b/0x9c0 [ 178.623230][T12202] ? __sys_recvmsg+0x250/0x250 [ 178.628001][T12202] ? rcu_lock_release+0xd/0x30 [ 178.633470][T12202] ? rcu_lock_release+0x26/0x30 [ 178.638353][T12202] ? __fget+0x4fe/0x540 [ 178.642581][T12202] ? fget_many+0x30/0x30 [ 178.646860][T12202] ? retint_kernel+0x2b/0x2b [ 178.651474][T12202] ? trace_hardirqs_on_caller+0x74/0x80 [ 178.657018][T12202] ? __fdget+0x17c/0x200 [ 178.661271][T12202] do_recvmmsg+0x33d/0x870 [ 178.665692][T12202] ? __sys_recvmmsg+0x220/0x220 [ 178.670553][T12202] ? kasan_check_write+0x14/0x20 [ 178.670565][T12202] ? __mutex_unlock_slowpath+0x18c/0x630 [ 178.670584][T12202] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 178.670600][T12202] ? retint_kernel+0x2b/0x2b 23:26:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:05 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:05 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:05 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 178.686564][T12202] ? trace_hardirqs_on_caller+0x74/0x80 [ 178.686578][T12202] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 178.686594][T12202] __x64_sys_recvmmsg+0x17c/0x220 [ 178.686607][T12202] ? do_recvmmsg+0x870/0x870 [ 178.696712][T12202] do_syscall_64+0xfe/0x140 [ 178.696728][T12202] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.696737][T12202] RIP: 0033:0x459519 [ 178.696746][T12202] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 178.696755][T12202] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 178.707359][T12202] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 178.707365][T12202] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 178.707371][T12202] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 178.707377][T12202] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 178.707383][T12202] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:06 executing program 5: syz_read_part_table(0x300, 0x0, 0x0) 23:26:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x81000000}}], 0x1, 0x0, 0x0) 23:26:06 executing program 1 (fault-call:6 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:06 executing program 3 (fault-call:6 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 178.998832][T12226] FAULT_INJECTION: forcing a failure. [ 178.998832][T12226] name failslab, interval 1, probability 0, space 0, times 0 [ 179.042765][T12227] FAULT_INJECTION: forcing a failure. [ 179.042765][T12227] name failslab, interval 1, probability 0, space 0, times 0 [ 179.052891][T12226] CPU: 1 PID: 12226 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 179.063272][T12226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.073322][T12226] Call Trace: [ 179.073343][T12226] dump_stack+0x1d8/0x2f8 [ 179.073357][T12226] should_fail+0x608/0x860 [ 179.073368][T12226] ? setup_fault_attr+0x2b0/0x2b0 [ 179.073379][T12226] ? sock_kmalloc+0xac/0x120 [ 179.073396][T12226] __should_failslab+0x11a/0x160 [ 179.073406][T12226] ? sock_kmalloc+0xac/0x120 [ 179.073416][T12226] should_failslab+0x9/0x20 [ 179.073424][T12226] __kmalloc+0x7a/0x310 [ 179.073440][T12226] sock_kmalloc+0xac/0x120 [ 179.073451][T12226] af_alg_alloc_areq+0x28/0x180 [ 179.073461][T12226] aead_recvmsg+0x51e/0x1c50 [ 179.073486][T12226] ? aead_sendmsg+0x110/0x110 [ 179.081099][T12226] ? __might_fault+0xf9/0x160 [ 179.137772][T12226] ? kasan_check_write+0x14/0x20 [ 179.142708][T12226] ? _copy_from_user+0xe0/0x120 [ 179.147554][T12226] ? rw_copy_check_uvector+0x2e4/0x310 [ 179.153015][T12226] ? import_iovec+0x17e/0x340 [ 179.157682][T12226] ? __might_fault+0xf9/0x160 [ 179.162353][T12226] ? security_socket_recvmsg+0xa9/0xd0 [ 179.167797][T12226] ? aead_sendmsg+0x110/0x110 [ 179.172461][T12226] sock_recvmsg+0xe7/0x100 [ 179.176880][T12226] ___sys_recvmsg+0x28b/0x9c0 [ 179.181554][T12226] ? __sys_recvmsg+0x250/0x250 [ 179.186317][T12226] ? rcu_lock_release+0xd/0x30 [ 179.191078][T12226] ? rcu_lock_release+0x26/0x30 [ 179.195915][T12226] ? __fget+0x4fe/0x540 [ 179.200063][T12226] ? fget_many+0x30/0x30 [ 179.204296][T12226] ? __mutex_lock_common+0x56b/0x2fc0 [ 179.209662][T12226] ? __fdget+0x17c/0x200 [ 179.213893][T12226] do_recvmmsg+0x33d/0x870 [ 179.218311][T12226] ? __sys_recvmmsg+0x220/0x220 [ 179.223153][T12226] ? kasan_check_write+0x14/0x20 [ 179.228085][T12226] ? __mutex_unlock_slowpath+0x18c/0x630 [ 179.234236][T12226] ? kasan_check_write+0x14/0x20 [ 179.239163][T12226] ? fput_many+0x47/0x1a0 [ 179.243483][T12226] ? check_preemption_disabled+0xb7/0x280 [ 179.249197][T12226] __x64_sys_recvmmsg+0x17c/0x220 [ 179.254213][T12226] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 179.259832][T12226] ? do_recvmmsg+0x870/0x870 [ 179.264408][T12226] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 179.270117][T12226] ? do_syscall_64+0x1d/0x140 [ 179.274786][T12226] do_syscall_64+0xfe/0x140 [ 179.279287][T12226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.285168][T12226] RIP: 0033:0x459519 [ 179.289050][T12226] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 179.308646][T12226] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 179.317048][T12226] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 179.325014][T12226] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 179.332974][T12226] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:26:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 179.340942][T12226] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 179.348994][T12226] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 179.359431][T12227] CPU: 0 PID: 12227 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 179.367347][T12227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.377402][T12227] Call Trace: [ 179.380690][T12227] dump_stack+0x1d8/0x2f8 [ 179.385012][T12227] should_fail+0x608/0x860 [ 179.389426][T12227] ? setup_fault_attr+0x2b0/0x2b0 [ 179.394444][T12227] ? sock_kmalloc+0xac/0x120 [ 179.399036][T12227] __should_failslab+0x11a/0x160 [ 179.403968][T12227] ? sock_kmalloc+0xac/0x120 [ 179.408548][T12227] should_failslab+0x9/0x20 [ 179.413039][T12227] __kmalloc+0x7a/0x310 [ 179.417198][T12227] sock_kmalloc+0xac/0x120 [ 179.421666][T12227] af_alg_alloc_areq+0x28/0x180 [ 179.426510][T12227] aead_recvmsg+0x51e/0x1c50 [ 179.431112][T12227] ? aead_sendmsg+0x110/0x110 [ 179.435792][T12227] ? __might_fault+0xf9/0x160 [ 179.440463][T12227] ? kasan_check_write+0x14/0x20 [ 179.445393][T12227] ? _copy_from_user+0xe0/0x120 [ 179.450412][T12227] ? rw_copy_check_uvector+0x2e4/0x310 [ 179.455866][T12227] ? import_iovec+0x17e/0x340 [ 179.460534][T12227] ? security_socket_recvmsg+0xa9/0xd0 [ 179.465975][T12227] ? aead_sendmsg+0x110/0x110 [ 179.470666][T12227] sock_recvmsg+0xe7/0x100 [ 179.475075][T12227] ___sys_recvmsg+0x28b/0x9c0 [ 179.479747][T12227] ? __sys_recvmsg+0x250/0x250 [ 179.484509][T12227] ? rcu_lock_release+0xd/0x30 [ 179.489263][T12227] ? rcu_lock_release+0x26/0x30 [ 179.494104][T12227] ? __fget+0x4fe/0x540 [ 179.498257][T12227] ? fget_many+0x30/0x30 [ 179.502495][T12227] ? trace_hardirqs_on_caller+0x74/0x80 [ 179.508036][T12227] ? __fdget+0x17c/0x200 [ 179.512271][T12227] do_recvmmsg+0x33d/0x870 [ 179.516685][T12227] ? __sys_recvmmsg+0x220/0x220 [ 179.521526][T12227] ? kasan_check_write+0x14/0x20 [ 179.526450][T12227] ? __mutex_unlock_slowpath+0x18c/0x630 [ 179.532084][T12227] ? kasan_check_write+0x14/0x20 [ 179.537008][T12227] ? fput_many+0x47/0x1a0 [ 179.541331][T12227] ? check_preemption_disabled+0xb7/0x280 [ 179.547216][T12227] __x64_sys_recvmmsg+0x17c/0x220 [ 179.552231][T12227] ? do_recvmmsg+0x870/0x870 [ 179.556809][T12227] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 179.562534][T12227] ? do_syscall_64+0x1d/0x140 [ 179.567205][T12227] do_syscall_64+0xfe/0x140 [ 179.571698][T12227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.577577][T12227] RIP: 0033:0x459519 [ 179.581459][T12227] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 179.601054][T12227] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 179.609450][T12227] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 179.617412][T12227] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 179.625395][T12227] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 179.633362][T12227] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 23:26:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x88470000}}], 0x1, 0x0, 0x0) 23:26:06 executing program 3 (fault-call:6 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:06 executing program 1 (fault-call:6 fault-nth:9): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 179.641324][T12227] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 179.717814][T12233] Dev loop5: unable to read RDB block 1 [ 179.732366][T12233] loop5: unable to read partition table 23:26:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 179.760562][T12233] loop5: partition table beyond EOD, truncated [ 179.780000][T12233] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 179.804867][T12243] FAULT_INJECTION: forcing a failure. [ 179.804867][T12243] name failslab, interval 1, probability 0, space 0, times 0 [ 179.836581][T12243] CPU: 0 PID: 12243 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 179.844936][T12243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.854988][T12243] Call Trace: [ 179.858279][T12243] dump_stack+0x1d8/0x2f8 [ 179.862610][T12243] should_fail+0x608/0x860 [ 179.867030][T12243] ? setup_fault_attr+0x2b0/0x2b0 [ 179.872052][T12243] ? sock_kmalloc+0xac/0x120 [ 179.876647][T12243] __should_failslab+0x11a/0x160 [ 179.881583][T12243] ? sock_kmalloc+0xac/0x120 [ 179.886164][T12243] should_failslab+0x9/0x20 [ 179.890764][T12243] __kmalloc+0x7a/0x310 [ 179.894931][T12243] sock_kmalloc+0xac/0x120 [ 179.899342][T12243] af_alg_alloc_areq+0x28/0x180 [ 179.904187][T12243] aead_recvmsg+0x51e/0x1c50 [ 179.908791][T12243] ? aead_sendmsg+0x110/0x110 [ 179.913477][T12243] ? __might_fault+0xf9/0x160 [ 179.918152][T12243] ? kasan_check_write+0x14/0x20 [ 179.923110][T12243] ? _copy_from_user+0xe0/0x120 [ 179.928040][T12243] ? rw_copy_check_uvector+0x2e4/0x310 [ 179.933499][T12243] ? import_iovec+0x17e/0x340 [ 179.938161][T12243] ? __might_fault+0xf9/0x160 [ 179.942832][T12243] ? security_socket_recvmsg+0xa9/0xd0 [ 179.948380][T12243] ? aead_sendmsg+0x110/0x110 [ 179.953049][T12243] sock_recvmsg+0xe7/0x100 [ 179.957461][T12243] ___sys_recvmsg+0x28b/0x9c0 [ 179.962135][T12243] ? __sys_recvmsg+0x250/0x250 [ 179.966897][T12243] ? rcu_lock_release+0xd/0x30 [ 179.972009][T12243] ? rcu_lock_release+0x26/0x30 [ 179.976851][T12243] ? __fget+0x4fe/0x540 [ 179.981006][T12243] ? fget_many+0x30/0x30 [ 179.985245][T12243] ? __mutex_lock_common+0x56b/0x2fc0 [ 179.990641][T12243] ? __fdget+0x17c/0x200 [ 179.994907][T12243] do_recvmmsg+0x33d/0x870 [ 179.999332][T12243] ? __sys_recvmmsg+0x220/0x220 [ 180.004171][T12243] ? kasan_check_write+0x14/0x20 [ 180.009109][T12243] ? __mutex_unlock_slowpath+0x18c/0x630 [ 180.014744][T12243] ? kasan_check_write+0x14/0x20 [ 180.019673][T12243] ? fput_many+0x47/0x1a0 [ 180.023999][T12243] ? check_preemption_disabled+0xb7/0x280 [ 180.029724][T12243] __x64_sys_recvmmsg+0x17c/0x220 [ 180.034751][T12243] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 180.040382][T12243] ? do_recvmmsg+0x870/0x870 [ 180.044965][T12243] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 180.050681][T12243] ? do_syscall_64+0x1d/0x140 [ 180.055545][T12243] do_syscall_64+0xfe/0x140 [ 180.060045][T12243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.065946][T12243] RIP: 0033:0x459519 [ 180.069831][T12243] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 180.089515][T12243] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 180.097922][T12243] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 180.105888][T12243] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 180.113861][T12243] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 180.121825][T12243] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 180.129786][T12243] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:07 executing program 5: syz_read_part_table(0x500, 0x0, 0x0) 23:26:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x88480000}}], 0x1, 0x0, 0x0) 23:26:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:07 executing program 3 (fault-call:6 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 180.169125][T12248] FAULT_INJECTION: forcing a failure. [ 180.169125][T12248] name failslab, interval 1, probability 0, space 0, times 0 23:26:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 180.249116][T12260] FAULT_INJECTION: forcing a failure. [ 180.249116][T12260] name failslab, interval 1, probability 0, space 0, times 0 [ 180.253752][T12255] Dev loop5: unable to read RDB block 2 [ 180.263960][T12248] CPU: 1 PID: 12248 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 180.275303][T12248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.275308][T12248] Call Trace: [ 180.275325][T12248] dump_stack+0x1d8/0x2f8 [ 180.275340][T12248] should_fail+0x608/0x860 23:26:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 180.275353][T12248] ? setup_fault_attr+0x2b0/0x2b0 [ 180.275364][T12248] ? sock_kmalloc+0xac/0x120 [ 180.275378][T12248] __should_failslab+0x11a/0x160 [ 180.275388][T12248] ? sock_kmalloc+0xac/0x120 [ 180.275395][T12248] should_failslab+0x9/0x20 [ 180.275404][T12248] __kmalloc+0x7a/0x310 [ 180.275417][T12248] sock_kmalloc+0xac/0x120 [ 180.275429][T12248] af_alg_alloc_areq+0x28/0x180 [ 180.275441][T12248] aead_recvmsg+0x51e/0x1c50 [ 180.275471][T12248] ? aead_sendmsg+0x110/0x110 [ 180.275494][T12248] ? __might_fault+0xf9/0x160 [ 180.275511][T12248] ? kasan_check_write+0x14/0x20 [ 180.302595][T12248] ? _copy_from_user+0xe0/0x120 [ 180.302610][T12248] ? rw_copy_check_uvector+0x2e4/0x310 [ 180.302627][T12248] ? import_iovec+0x17e/0x340 [ 180.315974][T12255] loop5: unable to read partition table [ 180.316683][T12248] ? __might_fault+0xf9/0x160 [ 180.316699][T12248] ? security_socket_recvmsg+0xa9/0xd0 [ 180.316712][T12248] ? aead_sendmsg+0x110/0x110 [ 180.334561][T12248] sock_recvmsg+0xe7/0x100 [ 180.334574][T12248] ___sys_recvmsg+0x28b/0x9c0 23:26:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 180.334590][T12248] ? __sys_recvmsg+0x250/0x250 [ 180.334611][T12248] ? rcu_lock_release+0xd/0x30 [ 180.334625][T12248] ? rcu_lock_release+0x26/0x30 [ 180.334633][T12248] ? __fget+0x4fe/0x540 [ 180.334650][T12248] ? fget_many+0x30/0x30 [ 180.340027][T12255] loop5: partition table beyond EOD, truncated [ 180.343975][T12248] ? __mutex_lock_common+0x56b/0x2fc0 [ 180.343991][T12248] ? __fdget+0x17c/0x200 [ 180.344003][T12248] do_recvmmsg+0x33d/0x870 [ 180.344021][T12248] ? __sys_recvmmsg+0x220/0x220 23:26:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x88a8ffff}}], 0x1, 0x0, 0x0) [ 180.344030][T12248] ? kasan_check_write+0x14/0x20 [ 180.344038][T12248] ? __mutex_unlock_slowpath+0x18c/0x630 [ 180.344054][T12248] ? kasan_check_write+0x14/0x20 [ 180.344063][T12248] ? fput_many+0x47/0x1a0 [ 180.344074][T12248] ? check_preemption_disabled+0xb7/0x280 [ 180.344095][T12248] __x64_sys_recvmmsg+0x17c/0x220 [ 180.358500][T12248] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 180.377109][T12255] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 180.378873][T12248] ? do_recvmmsg+0x870/0x870 [ 180.378885][T12248] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 180.378901][T12248] ? do_syscall_64+0x1d/0x140 [ 180.505886][T12248] do_syscall_64+0xfe/0x140 [ 180.510388][T12248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.516276][T12248] RIP: 0033:0x459519 [ 180.520166][T12248] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 180.539764][T12248] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 180.548170][T12248] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 180.556146][T12248] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 180.564110][T12248] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 180.572076][T12248] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 180.580042][T12248] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 180.588037][T12260] CPU: 0 PID: 12260 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 180.595926][T12260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.605982][T12260] Call Trace: [ 180.609275][T12260] dump_stack+0x1d8/0x2f8 [ 180.613955][T12260] should_fail+0x608/0x860 [ 180.618374][T12260] ? setup_fault_attr+0x2b0/0x2b0 [ 180.623402][T12260] ? sock_kmalloc+0xac/0x120 [ 180.628002][T12260] __should_failslab+0x11a/0x160 [ 180.632997][T12260] ? sock_kmalloc+0xac/0x120 [ 180.637667][T12260] should_failslab+0x9/0x20 [ 180.642158][T12260] __kmalloc+0x7a/0x310 [ 180.646309][T12260] sock_kmalloc+0xac/0x120 [ 180.650742][T12260] af_alg_alloc_areq+0x28/0x180 [ 180.655604][T12260] aead_recvmsg+0x51e/0x1c50 [ 180.660208][T12260] ? aead_sendmsg+0x110/0x110 [ 180.664889][T12260] ? __might_fault+0xf9/0x160 [ 180.669569][T12260] ? kasan_check_write+0x14/0x20 [ 180.674497][T12260] ? _copy_from_user+0xe0/0x120 [ 180.679345][T12260] ? rw_copy_check_uvector+0x2e4/0x310 [ 180.684802][T12260] ? import_iovec+0x17e/0x340 [ 180.689472][T12260] ? __might_fault+0xf9/0x160 [ 180.694232][T12260] ? security_socket_recvmsg+0xa9/0xd0 [ 180.699683][T12260] ? aead_sendmsg+0x110/0x110 [ 180.704351][T12260] sock_recvmsg+0xe7/0x100 [ 180.708766][T12260] ___sys_recvmsg+0x28b/0x9c0 [ 180.713440][T12260] ? __sys_recvmsg+0x250/0x250 [ 180.718209][T12260] ? rcu_lock_release+0xd/0x30 [ 180.722972][T12260] ? rcu_lock_release+0x26/0x30 [ 180.727817][T12260] ? __fget+0x4fe/0x540 [ 180.731973][T12260] ? fget_many+0x30/0x30 [ 180.736209][T12260] ? __mutex_lock_common+0x56b/0x2fc0 [ 180.741583][T12260] ? __fdget+0x17c/0x200 [ 180.745821][T12260] do_recvmmsg+0x33d/0x870 [ 180.750456][T12260] ? __sys_recvmmsg+0x220/0x220 [ 180.755392][T12260] ? kasan_check_write+0x14/0x20 [ 180.760323][T12260] ? __mutex_unlock_slowpath+0x18c/0x630 [ 180.765960][T12260] ? kasan_check_write+0x14/0x20 [ 180.770894][T12260] ? fput_many+0x47/0x1a0 [ 180.775221][T12260] ? check_preemption_disabled+0xb7/0x280 [ 180.780942][T12260] __x64_sys_recvmmsg+0x17c/0x220 [ 180.785959][T12260] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 180.791581][T12260] ? do_recvmmsg+0x870/0x870 [ 180.796163][T12260] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 180.801875][T12260] ? do_syscall_64+0x1d/0x140 [ 180.806552][T12260] do_syscall_64+0xfe/0x140 [ 180.811053][T12260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.816931][T12260] RIP: 0033:0x459519 [ 180.820818][T12260] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 180.840419][T12260] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b 23:26:08 executing program 1 (fault-call:6 fault-nth:10): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 180.848826][T12260] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 180.856786][T12260] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 180.864751][T12260] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 180.872721][T12260] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 180.880712][T12260] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:08 executing program 3 (fault-call:6 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 180.952757][T12268] FAULT_INJECTION: forcing a failure. [ 180.952757][T12268] name failslab, interval 1, probability 0, space 0, times 0 [ 180.977489][T12268] CPU: 1 PID: 12268 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 180.985412][T12268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.995465][T12268] Call Trace: [ 180.998848][T12268] dump_stack+0x1d8/0x2f8 [ 181.003175][T12268] should_fail+0x608/0x860 [ 181.007591][T12268] ? setup_fault_attr+0x2b0/0x2b0 [ 181.012619][T12268] ? sock_kmalloc+0xac/0x120 [ 181.017214][T12268] __should_failslab+0x11a/0x160 [ 181.022143][T12268] ? sock_kmalloc+0xac/0x120 [ 181.026726][T12268] should_failslab+0x9/0x20 [ 181.031225][T12268] __kmalloc+0x7a/0x310 [ 181.035387][T12268] sock_kmalloc+0xac/0x120 [ 181.039798][T12268] af_alg_alloc_areq+0x28/0x180 [ 181.044642][T12268] aead_recvmsg+0x51e/0x1c50 [ 181.049246][T12268] ? aead_sendmsg+0x110/0x110 [ 181.053932][T12268] ? __might_fault+0xf9/0x160 [ 181.058608][T12268] ? kasan_check_write+0x14/0x20 [ 181.063538][T12268] ? _copy_from_user+0xe0/0x120 [ 181.068381][T12268] ? rw_copy_check_uvector+0x2e4/0x310 [ 181.073843][T12268] ? import_iovec+0x17e/0x340 [ 181.078517][T12268] ? security_socket_recvmsg+0xa9/0xd0 [ 181.083968][T12268] ? aead_sendmsg+0x110/0x110 [ 181.088640][T12268] sock_recvmsg+0xe7/0x100 [ 181.093053][T12268] ___sys_recvmsg+0x28b/0x9c0 [ 181.097733][T12268] ? __sys_recvmsg+0x250/0x250 [ 181.102586][T12268] ? rcu_lock_release+0xd/0x30 [ 181.107356][T12268] ? rcu_lock_release+0x26/0x30 [ 181.114082][T12268] ? __fget+0x4fe/0x540 [ 181.118246][T12268] ? fget_many+0x30/0x30 [ 181.122490][T12268] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 181.127949][T12268] ? __fdget+0x17c/0x200 [ 181.132189][T12268] do_recvmmsg+0x33d/0x870 [ 181.136606][T12268] ? __sys_recvmmsg+0x220/0x220 [ 181.141449][T12268] ? kasan_check_write+0x14/0x20 [ 181.146377][T12268] ? __mutex_unlock_slowpath+0x18c/0x630 [ 181.152011][T12268] ? kasan_check_write+0x14/0x20 [ 181.156938][T12268] ? fput_many+0x47/0x1a0 [ 181.161260][T12268] ? check_preemption_disabled+0xb7/0x280 [ 181.166980][T12268] __x64_sys_recvmmsg+0x17c/0x220 [ 181.172269][T12268] ? do_recvmmsg+0x870/0x870 [ 181.176860][T12268] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 181.182583][T12268] ? do_syscall_64+0x1d/0x140 [ 181.187583][T12268] do_syscall_64+0xfe/0x140 [ 181.187600][T12268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.187611][T12268] RIP: 0033:0x459519 [ 181.197969][T12268] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 181.197975][T12268] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 181.197985][T12268] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 181.197995][T12268] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 181.221627][T12268] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 181.221633][T12268] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 181.221638][T12268] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 181.230148][T12276] FAULT_INJECTION: forcing a failure. [ 181.230148][T12276] name failslab, interval 1, probability 0, space 0, times 0 [ 181.230163][T12276] CPU: 1 PID: 12276 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 181.230169][T12276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.230173][T12276] Call Trace: [ 181.230188][T12276] dump_stack+0x1d8/0x2f8 [ 181.230206][T12276] should_fail+0x608/0x860 [ 181.238379][T12255] Dev loop5: unable to read RDB block 2 [ 181.246129][T12276] ? setup_fault_attr+0x2b0/0x2b0 [ 181.246142][T12276] ? sock_kmalloc+0xac/0x120 [ 181.246158][T12276] __should_failslab+0x11a/0x160 [ 181.246168][T12276] ? sock_kmalloc+0xac/0x120 [ 181.246176][T12276] should_failslab+0x9/0x20 [ 181.246183][T12276] __kmalloc+0x7a/0x310 [ 181.246196][T12276] sock_kmalloc+0xac/0x120 [ 181.246207][T12276] af_alg_alloc_areq+0x28/0x180 [ 181.246221][T12276] aead_recvmsg+0x51e/0x1c50 [ 181.359559][T12276] ? aead_sendmsg+0x110/0x110 [ 181.364222][T12276] ? __might_fault+0xf9/0x160 [ 181.368880][T12276] ? kasan_check_write+0x14/0x20 [ 181.373788][T12276] ? _copy_from_user+0xe0/0x120 [ 181.378619][T12276] ? rw_copy_check_uvector+0x2e4/0x310 [ 181.384069][T12276] ? import_iovec+0x17e/0x340 [ 181.388719][T12276] ? __might_fault+0xf9/0x160 [ 181.393372][T12276] ? security_socket_recvmsg+0xa9/0xd0 [ 181.398889][T12276] ? aead_sendmsg+0x110/0x110 [ 181.403543][T12276] sock_recvmsg+0xe7/0x100 [ 181.407937][T12276] ___sys_recvmsg+0x28b/0x9c0 [ 181.412592][T12276] ? __sys_recvmsg+0x250/0x250 [ 181.417760][T12276] ? rcu_lock_release+0xd/0x30 [ 181.422502][T12276] ? rcu_lock_release+0x26/0x30 [ 181.427322][T12276] ? __fget+0x4fe/0x540 [ 181.431453][T12276] ? fget_many+0x30/0x30 [ 181.435673][T12276] ? __mutex_lock_common+0x56b/0x2fc0 [ 181.441019][T12276] ? __fdget+0x17c/0x200 [ 181.445239][T12276] do_recvmmsg+0x33d/0x870 [ 181.449642][T12276] ? __sys_recvmmsg+0x220/0x220 [ 181.454464][T12276] ? kasan_check_write+0x14/0x20 [ 181.459372][T12276] ? __mutex_unlock_slowpath+0x18c/0x630 [ 181.464980][T12276] ? kasan_check_write+0x14/0x20 [ 181.469887][T12276] ? fput_many+0x47/0x1a0 [ 181.474194][T12276] ? check_preemption_disabled+0xb7/0x280 [ 181.479890][T12276] __x64_sys_recvmmsg+0x17c/0x220 [ 181.485409][T12276] ? do_recvmmsg+0x870/0x870 [ 181.489972][T12276] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 181.495669][T12276] ? do_syscall_64+0x1d/0x140 [ 181.500321][T12276] do_syscall_64+0xfe/0x140 [ 181.504808][T12276] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.510671][T12276] RIP: 0033:0x459519 [ 181.514546][T12276] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 181.534470][T12276] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 181.542858][T12276] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 181.550809][T12276] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 181.558755][T12276] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 181.566699][T12276] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 181.574651][T12276] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 181.585452][T12255] loop5: unable to read partition table [ 181.591190][T12255] loop5: partition table beyond EOD, truncated [ 181.597468][T12255] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:26:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:08 executing program 3 (fault-call:6 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:08 executing program 1 (fault-call:6 fault-nth:11): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:08 executing program 5: syz_read_part_table(0x600, 0x0, 0x0) 23:26:08 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xc00e0000}}], 0x1, 0x0, 0x0) 23:26:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 181.720263][T12290] FAULT_INJECTION: forcing a failure. [ 181.720263][T12290] name failslab, interval 1, probability 0, space 0, times 0 [ 181.734394][T12284] FAULT_INJECTION: forcing a failure. [ 181.734394][T12284] name failslab, interval 1, probability 0, space 0, times 0 [ 181.738921][T12290] CPU: 1 PID: 12290 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 181.754881][T12290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.764933][T12290] Call Trace: [ 181.768220][T12290] dump_stack+0x1d8/0x2f8 [ 181.772546][T12290] should_fail+0x608/0x860 [ 181.776962][T12290] ? setup_fault_attr+0x2b0/0x2b0 [ 181.781992][T12290] ? sock_kmalloc+0xac/0x120 [ 181.786586][T12290] __should_failslab+0x11a/0x160 [ 181.791548][T12290] ? sock_kmalloc+0xac/0x120 [ 181.796130][T12290] should_failslab+0x9/0x20 [ 181.800621][T12290] __kmalloc+0x7a/0x310 [ 181.804779][T12290] sock_kmalloc+0xac/0x120 [ 181.809276][T12290] af_alg_alloc_areq+0x28/0x180 [ 181.814127][T12290] aead_recvmsg+0x51e/0x1c50 [ 181.819083][T12290] ? aead_sendmsg+0x110/0x110 [ 181.823771][T12290] ? __might_fault+0xf9/0x160 [ 181.828452][T12290] ? kasan_check_write+0x14/0x20 [ 181.833379][T12290] ? _copy_from_user+0xe0/0x120 [ 181.838232][T12290] ? rw_copy_check_uvector+0x2e4/0x310 [ 181.843688][T12290] ? import_iovec+0x17e/0x340 [ 181.848349][T12290] ? __might_fault+0xf9/0x160 [ 181.853015][T12290] ? security_socket_recvmsg+0xa9/0xd0 [ 181.858490][T12290] ? aead_sendmsg+0x110/0x110 [ 181.863160][T12290] sock_recvmsg+0xe7/0x100 [ 181.867569][T12290] ___sys_recvmsg+0x28b/0x9c0 [ 181.872245][T12290] ? __sys_recvmsg+0x250/0x250 [ 181.877011][T12290] ? rcu_lock_release+0xd/0x30 [ 181.881775][T12290] ? rcu_lock_release+0x26/0x30 [ 181.886619][T12290] ? __fget+0x4fe/0x540 [ 181.890783][T12290] ? fget_many+0x30/0x30 [ 181.895024][T12290] ? __mutex_lock_common+0x56b/0x2fc0 [ 181.900388][T12290] ? __fdget+0x17c/0x200 [ 181.904618][T12290] do_recvmmsg+0x33d/0x870 [ 181.909030][T12290] ? __sys_recvmmsg+0x220/0x220 [ 181.913871][T12290] ? kasan_check_write+0x14/0x20 [ 181.918799][T12290] ? __mutex_unlock_slowpath+0x18c/0x630 [ 181.924429][T12290] ? kasan_check_write+0x14/0x20 [ 181.929356][T12290] ? fput_many+0x47/0x1a0 [ 181.933682][T12290] ? check_preemption_disabled+0xb7/0x280 [ 181.939402][T12290] __x64_sys_recvmmsg+0x17c/0x220 [ 181.944421][T12290] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 181.950048][T12290] ? do_recvmmsg+0x870/0x870 [ 181.954629][T12290] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 181.960338][T12290] ? do_syscall_64+0x1d/0x140 [ 181.965008][T12290] do_syscall_64+0xfe/0x140 [ 181.969507][T12290] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.975388][T12290] RIP: 0033:0x459519 [ 181.979282][T12290] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 181.998980][T12290] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 182.007383][T12290] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 182.015347][T12290] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 182.023306][T12290] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 182.031260][T12290] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 182.039217][T12290] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 182.047195][T12284] CPU: 0 PID: 12284 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 182.055268][T12284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.063475][T12287] Dev loop5: unable to read RDB block 3 [ 182.065313][T12284] Call Trace: [ 182.065332][T12284] dump_stack+0x1d8/0x2f8 [ 182.065348][T12284] should_fail+0x608/0x860 [ 182.065359][T12284] ? setup_fault_attr+0x2b0/0x2b0 [ 182.065374][T12284] ? sock_kmalloc+0xac/0x120 [ 182.074622][T12287] loop5: unable to read partition table [ 182.078501][T12284] __should_failslab+0x11a/0x160 [ 182.078516][T12284] ? sock_kmalloc+0xac/0x120 [ 182.078526][T12284] should_failslab+0x9/0x20 [ 182.078539][T12284] __kmalloc+0x7a/0x310 [ 182.103713][T12287] loop5: partition table beyond EOD, truncated [ 182.107620][T12284] sock_kmalloc+0xac/0x120 [ 182.107633][T12284] af_alg_alloc_areq+0x28/0x180 [ 182.107646][T12284] aead_recvmsg+0x51e/0x1c50 [ 182.107671][T12284] ? aead_sendmsg+0x110/0x110 [ 182.122423][T12284] ? __might_fault+0xf9/0x160 [ 182.128166][T12287] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 182.131733][T12284] ? kasan_check_write+0x14/0x20 [ 182.131745][T12284] ? _copy_from_user+0xe0/0x120 [ 182.131758][T12284] ? rw_copy_check_uvector+0x2e4/0x310 [ 182.131773][T12284] ? import_iovec+0x17e/0x340 [ 182.140991][T12284] ? __might_fault+0xf9/0x160 [ 182.141007][T12284] ? security_socket_recvmsg+0xa9/0xd0 [ 182.141018][T12284] ? aead_sendmsg+0x110/0x110 [ 182.141029][T12284] sock_recvmsg+0xe7/0x100 [ 182.141042][T12284] ___sys_recvmsg+0x28b/0x9c0 [ 182.197537][T12284] ? __sys_recvmsg+0x250/0x250 [ 182.202304][T12284] ? rcu_lock_release+0xd/0x30 [ 182.207066][T12284] ? rcu_lock_release+0x26/0x30 [ 182.211907][T12284] ? __fget+0x4fe/0x540 [ 182.216059][T12284] ? fget_many+0x30/0x30 [ 182.220294][T12284] ? __mutex_lock_common+0x56b/0x2fc0 [ 182.225660][T12284] ? __fdget+0x17c/0x200 [ 182.229898][T12284] do_recvmmsg+0x33d/0x870 [ 182.234327][T12284] ? __sys_recvmmsg+0x220/0x220 [ 182.239179][T12284] ? kasan_check_write+0x14/0x20 [ 182.244110][T12284] ? __mutex_unlock_slowpath+0x18c/0x630 [ 182.249740][T12284] ? kasan_check_write+0x14/0x20 [ 182.254666][T12284] ? fput_many+0x47/0x1a0 [ 182.258987][T12284] ? check_preemption_disabled+0xb7/0x280 [ 182.264704][T12284] __x64_sys_recvmmsg+0x17c/0x220 [ 182.269720][T12284] ? do_recvmmsg+0x870/0x870 [ 182.274300][T12284] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 182.280013][T12284] ? do_syscall_64+0x1d/0x140 [ 182.284685][T12284] do_syscall_64+0xfe/0x140 [ 182.289184][T12284] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.295068][T12284] RIP: 0033:0x459519 [ 182.298953][T12284] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:26:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xc07e0000}}], 0x1, 0x0, 0x0) 23:26:09 executing program 3 (fault-call:6 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 182.318546][T12284] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 182.326953][T12284] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 182.335003][T12284] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 182.342966][T12284] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 182.350931][T12284] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 182.359499][T12284] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:09 executing program 1 (fault-call:6 fault-nth:12): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 182.388081][T12292] FAULT_INJECTION: forcing a failure. [ 182.388081][T12292] name failslab, interval 1, probability 0, space 0, times 0 [ 182.420876][T12292] CPU: 1 PID: 12292 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 182.428889][T12292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.428894][T12292] Call Trace: [ 182.428911][T12292] dump_stack+0x1d8/0x2f8 [ 182.428926][T12292] should_fail+0x608/0x860 [ 182.428937][T12292] ? setup_fault_attr+0x2b0/0x2b0 [ 182.428951][T12292] ? sock_kmalloc+0xac/0x120 [ 182.428965][T12292] __should_failslab+0x11a/0x160 [ 182.428977][T12292] ? sock_kmalloc+0xac/0x120 [ 182.456008][T12292] should_failslab+0x9/0x20 [ 182.456019][T12292] __kmalloc+0x7a/0x310 [ 182.456035][T12292] sock_kmalloc+0xac/0x120 [ 182.456045][T12292] af_alg_alloc_areq+0x28/0x180 [ 182.456056][T12292] aead_recvmsg+0x51e/0x1c50 [ 182.456083][T12292] ? aead_sendmsg+0x110/0x110 [ 182.465839][T12292] ? __might_fault+0xf9/0x160 [ 182.465858][T12292] ? kasan_check_write+0x14/0x20 [ 182.474906][T12292] ? _copy_from_user+0xe0/0x120 [ 182.474920][T12292] ? rw_copy_check_uvector+0x2e4/0x310 [ 182.474936][T12292] ? import_iovec+0x17e/0x340 [ 182.474945][T12292] ? __might_fault+0xf9/0x160 [ 182.474960][T12292] ? security_socket_recvmsg+0xa9/0xd0 [ 182.474968][T12292] ? aead_sendmsg+0x110/0x110 [ 182.474982][T12292] sock_recvmsg+0xe7/0x100 [ 182.541193][T12292] ___sys_recvmsg+0x28b/0x9c0 [ 182.545867][T12292] ? __sys_recvmsg+0x250/0x250 [ 182.550634][T12292] ? rcu_lock_release+0xd/0x30 [ 182.555393][T12292] ? rcu_lock_release+0x26/0x30 [ 182.560243][T12292] ? __fget+0x4fe/0x540 [ 182.564402][T12292] ? fget_many+0x30/0x30 [ 182.568652][T12292] ? __mutex_lock_common+0x56b/0x2fc0 [ 182.574028][T12292] ? __fdget+0x17c/0x200 [ 182.578276][T12292] do_recvmmsg+0x33d/0x870 [ 182.582712][T12292] ? __sys_recvmmsg+0x220/0x220 23:26:09 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xd0020000}}], 0x1, 0x0, 0x0) 23:26:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 182.587743][T12292] ? kasan_check_write+0x14/0x20 [ 182.592944][T12292] ? __mutex_unlock_slowpath+0x18c/0x630 [ 182.598575][T12292] ? kasan_check_write+0x14/0x20 [ 182.603589][T12292] ? fput_many+0x47/0x1a0 [ 182.607909][T12292] ? check_preemption_disabled+0xb7/0x280 [ 182.613654][T12292] __x64_sys_recvmmsg+0x17c/0x220 [ 182.618681][T12292] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 182.624305][T12292] ? do_recvmmsg+0x870/0x870 [ 182.628885][T12292] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 182.634598][T12292] ? do_syscall_64+0x1d/0x140 [ 182.639365][T12292] do_syscall_64+0xfe/0x140 [ 182.643963][T12292] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.649847][T12292] RIP: 0033:0x459519 [ 182.653735][T12292] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 182.673337][T12292] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 182.681740][T12292] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 182.689877][T12292] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 182.697841][T12292] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 182.705808][T12292] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 182.713769][T12292] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 182.743732][T12287] Dev loop5: unable to read RDB block 3 [ 182.754348][T12287] loop5: unable to read partition table [ 182.773191][T12287] loop5: partition table beyond EOD, truncated [ 182.779793][T12287] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 182.811169][T12307] FAULT_INJECTION: forcing a failure. [ 182.811169][T12307] name failslab, interval 1, probability 0, space 0, times 0 [ 182.835858][T12307] CPU: 1 PID: 12307 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 182.843795][T12307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.853843][T12307] Call Trace: [ 182.853862][T12307] dump_stack+0x1d8/0x2f8 23:26:10 executing program 5: syz_read_part_table(0x700, 0x0, 0x0) 23:26:10 executing program 3 (fault-call:6 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xffffa888}}], 0x1, 0x0, 0x0) 23:26:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 182.853876][T12307] should_fail+0x608/0x860 [ 182.853888][T12307] ? setup_fault_attr+0x2b0/0x2b0 [ 182.853899][T12307] ? sock_kmalloc+0xac/0x120 [ 182.853920][T12307] __should_failslab+0x11a/0x160 [ 182.880584][T12307] ? sock_kmalloc+0xac/0x120 [ 182.880596][T12307] should_failslab+0x9/0x20 [ 182.880605][T12307] __kmalloc+0x7a/0x310 [ 182.880617][T12307] sock_kmalloc+0xac/0x120 [ 182.880630][T12307] af_alg_alloc_areq+0x28/0x180 [ 182.893831][T12307] aead_recvmsg+0x51e/0x1c50 [ 182.893863][T12307] ? aead_sendmsg+0x110/0x110 [ 182.893885][T12307] ? __might_fault+0xf9/0x160 [ 182.893903][T12307] ? kasan_check_write+0x14/0x20 [ 182.893912][T12307] ? _copy_from_user+0xe0/0x120 [ 182.893925][T12307] ? rw_copy_check_uvector+0x2e4/0x310 [ 182.893942][T12307] ? import_iovec+0x17e/0x340 [ 182.893949][T12307] ? __might_fault+0xf9/0x160 [ 182.893963][T12307] ? security_socket_recvmsg+0xa9/0xd0 [ 182.893970][T12307] ? aead_sendmsg+0x110/0x110 [ 182.893982][T12307] sock_recvmsg+0xe7/0x100 23:26:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 182.908030][T12307] ___sys_recvmsg+0x28b/0x9c0 [ 182.908049][T12307] ? __sys_recvmsg+0x250/0x250 [ 182.908068][T12307] ? rcu_lock_release+0xd/0x30 [ 182.932878][T12307] ? rcu_lock_release+0x26/0x30 [ 182.932889][T12307] ? __fget+0x4fe/0x540 [ 182.932906][T12307] ? fget_many+0x30/0x30 [ 182.932917][T12307] ? __mutex_lock_common+0x56b/0x2fc0 [ 182.932930][T12307] ? __fdget+0x17c/0x200 [ 182.932942][T12307] do_recvmmsg+0x33d/0x870 [ 182.932960][T12307] ? __sys_recvmmsg+0x220/0x220 [ 182.932969][T12307] ? kasan_check_write+0x14/0x20 [ 182.932977][T12307] ? __mutex_unlock_slowpath+0x18c/0x630 [ 182.932993][T12307] ? kasan_check_write+0x14/0x20 [ 182.933002][T12307] ? fput_many+0x47/0x1a0 [ 182.933014][T12307] ? check_preemption_disabled+0xb7/0x280 [ 182.933028][T12307] __x64_sys_recvmmsg+0x17c/0x220 [ 182.953196][T12307] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 182.953208][T12307] ? do_recvmmsg+0x870/0x870 [ 182.953218][T12307] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 182.953229][T12307] ? do_syscall_64+0x1d/0x140 [ 182.953242][T12307] do_syscall_64+0xfe/0x140 [ 182.953257][T12307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.953266][T12307] RIP: 0033:0x459519 [ 182.953274][T12307] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 182.953280][T12307] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 182.953289][T12307] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 23:26:10 executing program 1 (fault-call:6 fault-nth:13): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:10 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x4000000000000}}], 0x1, 0x0, 0x0) [ 182.953295][T12307] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 182.953300][T12307] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 182.953305][T12307] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 182.953311][T12307] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 183.004777][T12317] FAULT_INJECTION: forcing a failure. [ 183.004777][T12317] name failslab, interval 1, probability 0, space 0, times 0 23:26:10 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 183.194344][T12321] FAULT_INJECTION: forcing a failure. [ 183.194344][T12321] name failslab, interval 1, probability 0, space 0, times 0 [ 183.236268][T12321] CPU: 1 PID: 12321 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 183.244200][T12321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.254258][T12321] Call Trace: [ 183.257552][T12321] dump_stack+0x1d8/0x2f8 [ 183.261884][T12321] should_fail+0x608/0x860 [ 183.266303][T12321] ? setup_fault_attr+0x2b0/0x2b0 [ 183.271330][T12321] ? sock_kmalloc+0xac/0x120 [ 183.275929][T12321] __should_failslab+0x11a/0x160 [ 183.280865][T12321] ? sock_kmalloc+0xac/0x120 [ 183.285451][T12321] should_failslab+0x9/0x20 [ 183.289950][T12321] __kmalloc+0x7a/0x310 [ 183.294102][T12321] sock_kmalloc+0xac/0x120 [ 183.298513][T12321] af_alg_alloc_areq+0x28/0x180 [ 183.303362][T12321] aead_recvmsg+0x51e/0x1c50 [ 183.307975][T12321] ? aead_sendmsg+0x110/0x110 [ 183.312659][T12321] ? __might_fault+0xf9/0x160 [ 183.317340][T12321] ? kasan_check_write+0x14/0x20 [ 183.322273][T12321] ? _copy_from_user+0xe0/0x120 [ 183.327122][T12321] ? rw_copy_check_uvector+0x2e4/0x310 [ 183.332579][T12321] ? import_iovec+0x17e/0x340 [ 183.337257][T12321] ? __might_fault+0xf9/0x160 [ 183.341937][T12321] ? security_socket_recvmsg+0xa9/0xd0 [ 183.347394][T12321] ? aead_sendmsg+0x110/0x110 [ 183.352056][T12321] sock_recvmsg+0xe7/0x100 [ 183.356461][T12321] ___sys_recvmsg+0x28b/0x9c0 [ 183.361130][T12321] ? __sys_recvmsg+0x250/0x250 [ 183.365973][T12321] ? rcu_lock_release+0xd/0x30 [ 183.370728][T12321] ? rcu_lock_release+0x26/0x30 [ 183.375570][T12321] ? __fget+0x4fe/0x540 [ 183.379720][T12321] ? fget_many+0x30/0x30 [ 183.384039][T12321] ? __mutex_lock_common+0x56b/0x2fc0 [ 183.389404][T12321] ? __fdget+0x17c/0x200 [ 183.393646][T12321] do_recvmmsg+0x33d/0x870 [ 183.398061][T12321] ? __sys_recvmmsg+0x220/0x220 [ 183.402902][T12321] ? kasan_check_write+0x14/0x20 [ 183.407826][T12321] ? __mutex_unlock_slowpath+0x18c/0x630 [ 183.413454][T12321] ? kasan_check_write+0x14/0x20 [ 183.418377][T12321] ? fput_many+0x47/0x1a0 [ 183.422868][T12321] ? check_preemption_disabled+0xb7/0x280 [ 183.428586][T12321] __x64_sys_recvmmsg+0x17c/0x220 [ 183.433602][T12321] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 183.439222][T12321] ? do_recvmmsg+0x870/0x870 [ 183.443976][T12321] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 183.449770][T12321] ? do_syscall_64+0x1d/0x140 [ 183.454441][T12321] do_syscall_64+0xfe/0x140 [ 183.458939][T12321] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.464821][T12321] RIP: 0033:0x459519 23:26:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 183.468788][T12321] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 183.488379][T12321] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 183.496783][T12321] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 183.504750][T12321] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 183.512795][T12321] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 183.520754][T12321] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 183.528715][T12321] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 183.536692][T12317] CPU: 0 PID: 12317 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 183.544588][T12317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.554633][T12317] Call Trace: [ 183.557925][T12317] dump_stack+0x1d8/0x2f8 [ 183.562246][T12317] should_fail+0x608/0x860 [ 183.566666][T12317] ? setup_fault_attr+0x2b0/0x2b0 [ 183.571707][T12317] ? sock_kmalloc+0xac/0x120 [ 183.576294][T12317] __should_failslab+0x11a/0x160 [ 183.581225][T12317] ? sock_kmalloc+0xac/0x120 [ 183.586155][T12317] should_failslab+0x9/0x20 [ 183.590664][T12317] __kmalloc+0x7a/0x310 [ 183.594819][T12317] sock_kmalloc+0xac/0x120 [ 183.599230][T12317] af_alg_alloc_areq+0x28/0x180 [ 183.604192][T12317] aead_recvmsg+0x51e/0x1c50 [ 183.608825][T12317] ? aead_sendmsg+0x110/0x110 [ 183.613512][T12317] ? __might_fault+0xf9/0x160 [ 183.618274][T12317] ? kasan_check_write+0x14/0x20 [ 183.623202][T12317] ? _copy_from_user+0xe0/0x120 [ 183.628056][T12317] ? rw_copy_check_uvector+0x2e4/0x310 [ 183.633514][T12317] ? import_iovec+0x17e/0x340 [ 183.638427][T12317] ? __might_fault+0xf9/0x160 [ 183.643100][T12317] ? security_socket_recvmsg+0xa9/0xd0 [ 183.648550][T12317] ? aead_sendmsg+0x110/0x110 [ 183.653220][T12317] sock_recvmsg+0xe7/0x100 [ 183.657638][T12317] ___sys_recvmsg+0x28b/0x9c0 [ 183.662310][T12317] ? __sys_recvmsg+0x250/0x250 [ 183.667070][T12317] ? rcu_lock_release+0xd/0x30 [ 183.671839][T12317] ? rcu_lock_release+0x26/0x30 [ 183.676710][T12317] ? __fget+0x4fe/0x540 [ 183.680864][T12317] ? fget_many+0x30/0x30 [ 183.685095][T12317] ? __mutex_lock_common+0x56b/0x2fc0 [ 183.690467][T12317] ? __fdget+0x17c/0x200 [ 183.694700][T12317] do_recvmmsg+0x33d/0x870 [ 183.699122][T12317] ? __sys_recvmmsg+0x220/0x220 [ 183.703962][T12317] ? kasan_check_write+0x14/0x20 [ 183.708887][T12317] ? __mutex_unlock_slowpath+0x18c/0x630 [ 183.714537][T12317] ? kasan_check_write+0x14/0x20 [ 183.719464][T12317] ? fput_many+0x47/0x1a0 [ 183.723786][T12317] ? check_preemption_disabled+0xb7/0x280 [ 183.729500][T12317] __x64_sys_recvmmsg+0x17c/0x220 [ 183.734519][T12317] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 183.740139][T12317] ? do_recvmmsg+0x870/0x870 [ 183.744717][T12317] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 183.750425][T12317] ? do_syscall_64+0x1d/0x140 [ 183.755104][T12317] do_syscall_64+0xfe/0x140 [ 183.759600][T12317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.765485][T12317] RIP: 0033:0x459519 23:26:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x40030000000000}}], 0x1, 0x0, 0x0) [ 183.769371][T12317] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 183.788963][T12317] RSP: 002b:00007f3b465c4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 183.797365][T12317] RAX: ffffffffffffffda RBX: 00007f3b465c4c90 RCX: 0000000000459519 [ 183.805325][T12317] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000004 [ 183.813287][T12317] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 183.821257][T12317] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465c56d4 [ 183.829231][T12317] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000005 [ 183.863201][T12326] Dev loop5: unable to read RDB block 3 [ 183.868903][T12326] loop5: unable to read partition table [ 183.889380][T12326] loop5: partition table beyond EOD, truncated 23:26:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 183.913843][T12326] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 184.077594][T12326] Dev loop5: unable to read RDB block 3 [ 184.088762][T12326] loop5: unable to read partition table [ 184.095488][T12326] loop5: partition table beyond EOD, truncated [ 184.101883][T12326] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:26:11 executing program 5: syz_read_part_table(0x900, 0x0, 0x0) 23:26:11 executing program 1 (fault-call:6 fault-nth:14): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xa0010000000000}}], 0x1, 0x0, 0x0) 23:26:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:11 executing program 3 (fault-call:6 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:11 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x100000000000000}}], 0x1, 0x0, 0x0) [ 184.224778][T12344] FAULT_INJECTION: forcing a failure. [ 184.224778][T12344] name failslab, interval 1, probability 0, space 0, times 0 [ 184.250428][T12348] FAULT_INJECTION: forcing a failure. [ 184.250428][T12348] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 184.263746][T12348] CPU: 1 PID: 12348 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 184.263754][T12348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.263758][T12348] Call Trace: [ 184.263774][T12348] dump_stack+0x1d8/0x2f8 [ 184.263788][T12348] should_fail+0x608/0x860 [ 184.263800][T12348] ? setup_fault_attr+0x2b0/0x2b0 [ 184.263818][T12348] should_fail_alloc_page+0x55/0x60 [ 184.263828][T12348] prepare_alloc_pages+0x283/0x460 [ 184.263842][T12348] __alloc_pages_nodemask+0x11c/0x790 [ 184.263857][T12348] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 184.263868][T12348] ? do_raw_spin_lock+0x143/0x3a0 [ 184.263884][T12348] ? _raw_spin_unlock_irqrestore+0x77/0xe0 [ 184.330825][T12348] kmem_getpages+0x46/0x480 [ 184.335327][T12348] cache_grow_begin+0x7e/0x2c0 [ 184.340088][T12348] cache_alloc_refill+0x311/0x3f0 [ 184.345103][T12348] ? check_preemption_disabled+0xb7/0x280 [ 184.350821][T12348] __kmalloc+0x2e5/0x310 [ 184.355052][T12348] ? sock_kmalloc+0xac/0x120 [ 184.359637][T12348] sock_kmalloc+0xac/0x120 [ 184.364055][T12348] af_alg_alloc_areq+0x28/0x180 [ 184.368908][T12348] aead_recvmsg+0x51e/0x1c50 23:26:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 184.373509][T12348] ? aead_sendmsg+0x110/0x110 [ 184.378222][T12348] ? __might_fault+0xf9/0x160 [ 184.382991][T12348] ? kasan_check_write+0x14/0x20 [ 184.387921][T12348] ? _copy_from_user+0xe0/0x120 [ 184.392859][T12348] ? rw_copy_check_uvector+0x2e4/0x310 [ 184.398319][T12348] ? import_iovec+0x17e/0x340 [ 184.402983][T12348] ? __might_fault+0xf9/0x160 [ 184.407653][T12348] ? security_socket_recvmsg+0xa9/0xd0 [ 184.413110][T12348] ? aead_sendmsg+0x110/0x110 [ 184.417787][T12348] sock_recvmsg+0xe7/0x100 [ 184.417802][T12348] ___sys_recvmsg+0x28b/0x9c0 [ 184.417821][T12348] ? __sys_recvmsg+0x250/0x250 [ 184.431631][T12348] ? rcu_lock_release+0xd/0x30 [ 184.436394][T12348] ? rcu_lock_release+0x26/0x30 [ 184.441267][T12348] ? __fget+0x4fe/0x540 [ 184.441289][T12348] ? fget_many+0x30/0x30 [ 184.449651][T12348] ? __mutex_lock_common+0x56b/0x2fc0 [ 184.455027][T12348] ? __fdget+0x17c/0x200 [ 184.459265][T12348] do_recvmmsg+0x33d/0x870 [ 184.463684][T12348] ? __sys_recvmmsg+0x220/0x220 [ 184.468523][T12348] ? kasan_check_write+0x14/0x20 [ 184.473458][T12348] ? __mutex_unlock_slowpath+0x18c/0x630 [ 184.479086][T12348] ? kasan_check_write+0x14/0x20 [ 184.484010][T12348] ? fput_many+0x47/0x1a0 [ 184.484024][T12348] ? check_preemption_disabled+0xb7/0x280 [ 184.484042][T12348] __x64_sys_recvmmsg+0x17c/0x220 [ 184.484053][T12348] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 184.484062][T12348] ? do_recvmmsg+0x870/0x870 [ 184.484072][T12348] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 184.484083][T12348] ? do_syscall_64+0x1d/0x140 [ 184.484096][T12348] do_syscall_64+0xfe/0x140 23:26:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:11 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 184.484112][T12348] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.484120][T12348] RIP: 0033:0x459519 [ 184.484129][T12348] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.484134][T12348] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 184.484144][T12348] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 184.484149][T12348] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 184.484154][T12348] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 184.484159][T12348] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 184.484164][T12348] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 184.522662][T12344] CPU: 1 PID: 12344 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 184.555404][T12344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.555409][T12344] Call Trace: [ 184.555427][T12344] dump_stack+0x1d8/0x2f8 [ 184.555442][T12344] should_fail+0x608/0x860 [ 184.555453][T12344] ? setup_fault_attr+0x2b0/0x2b0 [ 184.555464][T12344] ? sock_kmalloc+0xac/0x120 [ 184.555479][T12344] __should_failslab+0x11a/0x160 [ 184.555489][T12344] ? sock_kmalloc+0xac/0x120 [ 184.555498][T12344] should_failslab+0x9/0x20 [ 184.555505][T12344] __kmalloc+0x7a/0x310 [ 184.555517][T12344] sock_kmalloc+0xac/0x120 [ 184.555535][T12344] af_alg_alloc_areq+0x28/0x180 [ 184.555546][T12344] aead_recvmsg+0x51e/0x1c50 [ 184.555576][T12344] ? aead_sendmsg+0x110/0x110 [ 184.555604][T12344] ? __might_fault+0xf9/0x160 [ 184.571985][T12344] ? kasan_check_write+0x14/0x20 [ 184.571996][T12344] ? _copy_from_user+0xe0/0x120 [ 184.572009][T12344] ? rw_copy_check_uvector+0x2e4/0x310 [ 184.572025][T12344] ? import_iovec+0x17e/0x340 [ 184.572037][T12344] ? __might_fault+0xf9/0x160 [ 184.587958][T12344] ? security_socket_recvmsg+0xa9/0xd0 [ 184.587969][T12344] ? aead_sendmsg+0x110/0x110 [ 184.587982][T12344] sock_recvmsg+0xe7/0x100 [ 184.587996][T12344] ___sys_recvmsg+0x28b/0x9c0 [ 184.588010][T12344] ? __sys_recvmsg+0x250/0x250 [ 184.588030][T12344] ? rcu_lock_release+0xd/0x30 [ 184.588043][T12344] ? rcu_lock_release+0x26/0x30 [ 184.588051][T12344] ? __fget+0x4fe/0x540 [ 184.588064][T12344] ? fget_many+0x30/0x30 [ 184.588076][T12344] ? __mutex_lock_common+0x56b/0x2fc0 [ 184.588090][T12344] ? __fdget+0x17c/0x200 [ 184.588101][T12344] do_recvmmsg+0x33d/0x870 [ 184.588117][T12344] ? __sys_recvmmsg+0x220/0x220 [ 184.588128][T12344] ? kasan_check_write+0x14/0x20 [ 184.604556][T12344] ? __mutex_unlock_slowpath+0x18c/0x630 [ 184.604575][T12344] ? kasan_check_write+0x14/0x20 [ 184.604585][T12344] ? fput_many+0x47/0x1a0 [ 184.604597][T12344] ? check_preemption_disabled+0xb7/0x280 [ 184.604614][T12344] __x64_sys_recvmmsg+0x17c/0x220 [ 184.604624][T12344] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 184.604633][T12344] ? do_recvmmsg+0x870/0x870 [ 184.604643][T12344] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 184.604653][T12344] ? do_syscall_64+0x1d/0x140 [ 184.604667][T12344] do_syscall_64+0xfe/0x140 [ 184.604681][T12344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.622583][T12344] RIP: 0033:0x459519 [ 184.622594][T12344] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.622600][T12344] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 184.622609][T12344] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 23:26:12 executing program 1 (fault-call:6 fault-nth:15): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 184.622615][T12344] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 184.622623][T12344] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 184.887882][T12344] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 184.895852][T12344] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 184.942981][T12353] Dev loop5: unable to read RDB block 4 [ 184.948594][T12353] loop5: unable to read partition table [ 184.948646][T12353] loop5: partition table beyond EOD, truncated [ 184.973005][T12353] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 184.989398][T12364] FAULT_INJECTION: forcing a failure. [ 184.989398][T12364] name failslab, interval 1, probability 0, space 0, times 0 [ 185.012117][T12364] CPU: 1 PID: 12364 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 185.020041][T12364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.030101][T12364] Call Trace: [ 185.033572][T12364] dump_stack+0x1d8/0x2f8 [ 185.037995][T12364] should_fail+0x608/0x860 [ 185.042587][T12364] ? setup_fault_attr+0x2b0/0x2b0 [ 185.047701][T12364] ? sock_kmalloc+0xac/0x120 [ 185.052295][T12364] __should_failslab+0x11a/0x160 [ 185.057235][T12364] ? sock_kmalloc+0xac/0x120 [ 185.061820][T12364] should_failslab+0x9/0x20 [ 185.066324][T12364] __kmalloc+0x7a/0x310 [ 185.070485][T12364] sock_kmalloc+0xac/0x120 [ 185.074898][T12364] af_alg_alloc_areq+0x28/0x180 [ 185.079746][T12364] aead_recvmsg+0x51e/0x1c50 [ 185.084353][T12364] ? aead_sendmsg+0x110/0x110 [ 185.089037][T12364] ? __might_fault+0xf9/0x160 [ 185.093713][T12364] ? kasan_check_write+0x14/0x20 [ 185.098638][T12364] ? _copy_from_user+0xe0/0x120 [ 185.103485][T12364] ? rw_copy_check_uvector+0x2e4/0x310 [ 185.110438][T12364] ? import_iovec+0x17e/0x340 [ 185.115112][T12364] ? __might_fault+0xf9/0x160 [ 185.119788][T12364] ? security_socket_recvmsg+0xa9/0xd0 [ 185.125239][T12364] ? aead_sendmsg+0x110/0x110 [ 185.129913][T12364] sock_recvmsg+0xe7/0x100 [ 185.134323][T12364] ___sys_recvmsg+0x28b/0x9c0 [ 185.139086][T12364] ? __sys_recvmsg+0x250/0x250 [ 185.143854][T12364] ? rcu_lock_release+0xd/0x30 [ 185.148616][T12364] ? rcu_lock_release+0x26/0x30 [ 185.153455][T12364] ? __fget+0x4fe/0x540 [ 185.157616][T12364] ? fget_many+0x30/0x30 [ 185.161852][T12364] ? __mutex_lock_common+0x56b/0x2fc0 [ 185.167223][T12364] ? __fdget+0x17c/0x200 [ 185.171466][T12364] do_recvmmsg+0x33d/0x870 [ 185.175897][T12364] ? __sys_recvmmsg+0x220/0x220 [ 185.180741][T12364] ? kasan_check_write+0x14/0x20 [ 185.185671][T12364] ? __mutex_unlock_slowpath+0x18c/0x630 [ 185.191299][T12364] ? kasan_check_write+0x14/0x20 [ 185.196224][T12364] ? fput_many+0x47/0x1a0 [ 185.200632][T12364] ? check_preemption_disabled+0xb7/0x280 [ 185.206348][T12364] __x64_sys_recvmmsg+0x17c/0x220 [ 185.211366][T12364] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 185.216985][T12364] ? do_recvmmsg+0x870/0x870 [ 185.221567][T12364] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 185.227284][T12364] ? do_syscall_64+0x1d/0x140 [ 185.231957][T12364] do_syscall_64+0xfe/0x140 [ 185.236456][T12364] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.242349][T12364] RIP: 0033:0x459519 [ 185.246235][T12364] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.266388][T12364] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 185.274793][T12364] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 185.282756][T12364] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 185.290722][T12364] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 185.298686][T12364] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 185.306650][T12364] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:12 executing program 5: syz_read_part_table(0xa00, 0x0, 0x0) 23:26:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x200000000000000}}], 0x1, 0x0, 0x0) 23:26:12 executing program 3 (fault-call:6 fault-nth:9): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:12 executing program 1 (fault-call:6 fault-nth:16): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:12 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 185.443190][T12376] FAULT_INJECTION: forcing a failure. [ 185.443190][T12376] name failslab, interval 1, probability 0, space 0, times 0 [ 185.463657][T12374] FAULT_INJECTION: forcing a failure. [ 185.463657][T12374] name failslab, interval 1, probability 0, space 0, times 0 [ 185.466283][T12376] CPU: 0 PID: 12376 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 185.484168][T12376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.494221][T12376] Call Trace: [ 185.497516][T12376] dump_stack+0x1d8/0x2f8 [ 185.501852][T12376] should_fail+0x608/0x860 [ 185.506282][T12376] ? setup_fault_attr+0x2b0/0x2b0 [ 185.511311][T12376] ? sock_kmalloc+0xac/0x120 [ 185.515896][T12376] __should_failslab+0x11a/0x160 [ 185.520828][T12376] ? sock_kmalloc+0xac/0x120 [ 185.525414][T12376] should_failslab+0x9/0x20 [ 185.529924][T12376] __kmalloc+0x7a/0x310 [ 185.534067][T12376] sock_kmalloc+0xac/0x120 [ 185.538476][T12376] af_alg_alloc_areq+0x28/0x180 [ 185.543323][T12376] aead_recvmsg+0x51e/0x1c50 [ 185.547927][T12376] ? aead_sendmsg+0x110/0x110 [ 185.552619][T12376] ? __might_fault+0xf9/0x160 [ 185.557298][T12376] ? kasan_check_write+0x14/0x20 [ 185.562225][T12376] ? _copy_from_user+0xe0/0x120 [ 185.567069][T12376] ? rw_copy_check_uvector+0x2e4/0x310 [ 185.572524][T12376] ? import_iovec+0x17e/0x340 [ 185.577200][T12376] ? security_socket_recvmsg+0xa9/0xd0 [ 185.582649][T12376] ? aead_sendmsg+0x110/0x110 [ 185.587323][T12376] sock_recvmsg+0xe7/0x100 [ 185.591738][T12376] ___sys_recvmsg+0x28b/0x9c0 [ 185.596413][T12376] ? __sys_recvmsg+0x250/0x250 [ 185.601170][T12376] ? rcu_lock_release+0xd/0x30 [ 185.605925][T12376] ? rcu_lock_release+0x26/0x30 [ 185.610783][T12376] ? __fget+0x4fe/0x540 [ 185.614944][T12376] ? fget_many+0x30/0x30 [ 185.619192][T12376] ? __mutex_lock_common+0x56b/0x2fc0 [ 185.624560][T12376] ? __fdget+0x17c/0x200 [ 185.628797][T12376] do_recvmmsg+0x33d/0x870 [ 185.633215][T12376] ? __sys_recvmmsg+0x220/0x220 [ 185.638148][T12376] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 185.643609][T12376] ? kasan_check_write+0x14/0x20 [ 185.648533][T12376] ? fput_many+0x47/0x1a0 [ 185.652852][T12376] ? check_preemption_disabled+0xb7/0x280 [ 185.658577][T12376] __x64_sys_recvmmsg+0x17c/0x220 [ 185.663596][T12376] ? do_recvmmsg+0x870/0x870 [ 185.668174][T12376] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 185.674063][T12376] ? do_syscall_64+0x1d/0x140 [ 185.678735][T12376] do_syscall_64+0xfe/0x140 [ 185.683231][T12376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.689203][T12376] RIP: 0033:0x459519 [ 185.693087][T12376] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.712692][T12376] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 185.721093][T12376] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 185.729058][T12376] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 23:26:12 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x300000000000000}}], 0x1, 0x0, 0x0) 23:26:13 executing program 1 (fault-call:6 fault-nth:17): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 185.737028][T12376] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 185.744991][T12376] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 185.752956][T12376] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 185.760933][T12374] CPU: 1 PID: 12374 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 185.768823][T12374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.778880][T12374] Call Trace: [ 185.782170][T12374] dump_stack+0x1d8/0x2f8 [ 185.786503][T12374] should_fail+0x608/0x860 [ 185.790921][T12374] ? setup_fault_attr+0x2b0/0x2b0 [ 185.795944][T12374] ? sock_kmalloc+0xac/0x120 [ 185.800537][T12374] __should_failslab+0x11a/0x160 [ 185.805568][T12374] ? sock_kmalloc+0xac/0x120 [ 185.810160][T12374] should_failslab+0x9/0x20 [ 185.814666][T12374] __kmalloc+0x7a/0x310 [ 185.818829][T12374] sock_kmalloc+0xac/0x120 [ 185.823244][T12374] af_alg_alloc_areq+0x28/0x180 [ 185.828098][T12374] aead_recvmsg+0x51e/0x1c50 [ 185.832698][T12374] ? aead_sendmsg+0x110/0x110 [ 185.837381][T12374] ? __might_fault+0xf9/0x160 [ 185.842065][T12374] ? kasan_check_write+0x14/0x20 [ 185.846995][T12374] ? _copy_from_user+0xe0/0x120 [ 185.851843][T12374] ? rw_copy_check_uvector+0x2e4/0x310 [ 185.857472][T12374] ? import_iovec+0x17e/0x340 [ 185.862135][T12374] ? __might_fault+0xf9/0x160 [ 185.866809][T12374] ? security_socket_recvmsg+0xa9/0xd0 [ 185.872255][T12374] ? aead_sendmsg+0x110/0x110 [ 185.876921][T12374] sock_recvmsg+0xe7/0x100 [ 185.881330][T12374] ___sys_recvmsg+0x28b/0x9c0 [ 185.886008][T12374] ? __sys_recvmsg+0x250/0x250 [ 185.890769][T12374] ? rcu_lock_release+0xd/0x30 [ 185.895531][T12374] ? rcu_lock_release+0x26/0x30 [ 185.900370][T12374] ? __fget+0x4fe/0x540 [ 185.904522][T12374] ? fget_many+0x30/0x30 [ 185.908757][T12374] ? __mutex_lock_common+0x56b/0x2fc0 [ 185.914124][T12374] ? __fdget+0x17c/0x200 [ 185.918363][T12374] do_recvmmsg+0x33d/0x870 [ 185.922782][T12374] ? __sys_recvmmsg+0x220/0x220 [ 185.927623][T12374] ? kasan_check_write+0x14/0x20 [ 185.932556][T12374] ? __mutex_unlock_slowpath+0x18c/0x630 [ 185.938185][T12374] ? kasan_check_write+0x14/0x20 [ 185.943109][T12374] ? fput_many+0x47/0x1a0 [ 185.947433][T12374] ? check_preemption_disabled+0xb7/0x280 [ 185.953152][T12374] __x64_sys_recvmmsg+0x17c/0x220 [ 185.958171][T12374] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 185.963796][T12374] ? do_recvmmsg+0x870/0x870 [ 185.968375][T12374] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 185.974092][T12374] ? do_syscall_64+0x1d/0x140 [ 185.978768][T12374] do_syscall_64+0xfe/0x140 [ 185.983267][T12374] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.989235][T12374] RIP: 0033:0x459519 [ 185.993120][T12374] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.012712][T12374] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 186.021122][T12374] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 186.029088][T12374] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 186.037052][T12374] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 186.045012][T12374] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 186.052972][T12374] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 186.073065][T12379] Dev loop5: unable to read RDB block 5 [ 186.091807][T12379] loop5: unable to read partition table 23:26:13 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:13 executing program 3 (fault-call:6 fault-nth:10): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 186.117785][T12379] loop5: partition table beyond EOD, truncated [ 186.125079][T12389] FAULT_INJECTION: forcing a failure. [ 186.125079][T12389] name failslab, interval 1, probability 0, space 0, times 0 [ 186.159866][T12379] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 186.190010][T12389] CPU: 1 PID: 12389 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 186.197936][T12389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.207991][T12389] Call Trace: [ 186.211286][T12389] dump_stack+0x1d8/0x2f8 [ 186.215714][T12389] should_fail+0x608/0x860 [ 186.220137][T12389] ? setup_fault_attr+0x2b0/0x2b0 [ 186.225165][T12389] ? sock_kmalloc+0xac/0x120 [ 186.229758][T12389] __should_failslab+0x11a/0x160 [ 186.234697][T12389] ? sock_kmalloc+0xac/0x120 [ 186.239277][T12389] should_failslab+0x9/0x20 [ 186.243968][T12389] __kmalloc+0x7a/0x310 [ 186.244682][T12395] FAULT_INJECTION: forcing a failure. [ 186.244682][T12395] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 186.248132][T12389] sock_kmalloc+0xac/0x120 [ 186.265879][T12389] af_alg_alloc_areq+0x28/0x180 [ 186.270714][T12389] aead_recvmsg+0x51e/0x1c50 [ 186.275305][T12389] ? aead_sendmsg+0x110/0x110 [ 186.279982][T12389] ? __might_fault+0xf9/0x160 [ 186.284647][T12389] ? kasan_check_write+0x14/0x20 [ 186.289560][T12389] ? _copy_from_user+0xe0/0x120 [ 186.294393][T12389] ? rw_copy_check_uvector+0x2e4/0x310 [ 186.299834][T12389] ? import_iovec+0x17e/0x340 [ 186.304486][T12389] ? __might_fault+0xf9/0x160 [ 186.309145][T12389] ? security_socket_recvmsg+0xa9/0xd0 [ 186.314579][T12389] ? aead_sendmsg+0x110/0x110 [ 186.319234][T12389] sock_recvmsg+0xe7/0x100 [ 186.323722][T12389] ___sys_recvmsg+0x28b/0x9c0 [ 186.328385][T12389] ? __sys_recvmsg+0x250/0x250 [ 186.333137][T12389] ? rcu_lock_release+0xd/0x30 [ 186.337897][T12389] ? rcu_lock_release+0x26/0x30 [ 186.342725][T12389] ? __fget+0x4fe/0x540 [ 186.346867][T12389] ? fget_many+0x30/0x30 [ 186.351092][T12389] ? __mutex_lock_common+0x56b/0x2fc0 [ 186.356444][T12389] ? __fdget+0x17c/0x200 [ 186.360668][T12389] do_recvmmsg+0x33d/0x870 [ 186.365070][T12389] ? __sys_recvmmsg+0x220/0x220 [ 186.369897][T12389] ? kasan_check_write+0x14/0x20 [ 186.374813][T12389] ? __mutex_unlock_slowpath+0x18c/0x630 [ 186.380428][T12389] ? kasan_check_write+0x14/0x20 [ 186.385341][T12389] ? fput_many+0x47/0x1a0 [ 186.389651][T12389] ? check_preemption_disabled+0xb7/0x280 [ 186.395356][T12389] __x64_sys_recvmmsg+0x17c/0x220 [ 186.400367][T12389] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 186.405979][T12389] ? do_recvmmsg+0x870/0x870 [ 186.410552][T12389] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 186.416252][T12389] ? do_syscall_64+0x1d/0x140 [ 186.420913][T12389] do_syscall_64+0xfe/0x140 [ 186.425400][T12389] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.431269][T12389] RIP: 0033:0x459519 [ 186.435152][T12389] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.454825][T12389] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 186.463213][T12389] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 186.471162][T12389] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 186.479290][T12389] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 186.487238][T12389] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 186.495189][T12389] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 186.503333][T12395] CPU: 0 PID: 12395 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 186.511215][T12395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.521263][T12395] Call Trace: [ 186.524545][T12395] dump_stack+0x1d8/0x2f8 [ 186.528876][T12395] should_fail+0x608/0x860 [ 186.533284][T12395] ? setup_fault_attr+0x2b0/0x2b0 [ 186.538306][T12395] should_fail_alloc_page+0x55/0x60 [ 186.543492][T12395] prepare_alloc_pages+0x283/0x460 [ 186.549465][T12395] __alloc_pages_nodemask+0x11c/0x790 [ 186.554831][T12395] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 186.560371][T12395] ? do_raw_spin_lock+0x143/0x3a0 [ 186.565399][T12395] ? _raw_spin_unlock_irqrestore+0x77/0xe0 [ 186.571201][T12395] kmem_getpages+0x46/0x480 [ 186.575699][T12395] cache_grow_begin+0x7e/0x2c0 [ 186.580456][T12395] cache_alloc_refill+0x311/0x3f0 [ 186.585470][T12395] ? check_preemption_disabled+0xb7/0x280 [ 186.591183][T12395] __kmalloc+0x2e5/0x310 [ 186.595503][T12395] ? sock_kmalloc+0xac/0x120 [ 186.600087][T12395] sock_kmalloc+0xac/0x120 [ 186.604497][T12395] af_alg_alloc_areq+0x28/0x180 [ 186.609340][T12395] aead_recvmsg+0x51e/0x1c50 [ 186.613939][T12395] ? aead_sendmsg+0x110/0x110 [ 186.618630][T12395] ? __might_fault+0xf9/0x160 [ 186.623392][T12395] ? kasan_check_write+0x14/0x20 [ 186.628315][T12395] ? _copy_from_user+0xe0/0x120 [ 186.633174][T12395] ? rw_copy_check_uvector+0x2e4/0x310 [ 186.638767][T12395] ? import_iovec+0x17e/0x340 [ 186.643434][T12395] ? __might_fault+0xf9/0x160 [ 186.648115][T12395] ? security_socket_recvmsg+0xa9/0xd0 [ 186.653656][T12395] ? aead_sendmsg+0x110/0x110 [ 186.658324][T12395] sock_recvmsg+0xe7/0x100 [ 186.662737][T12395] ___sys_recvmsg+0x28b/0x9c0 [ 186.667415][T12395] ? __sys_recvmsg+0x250/0x250 [ 186.672175][T12395] ? rcu_lock_release+0xd/0x30 [ 186.676933][T12395] ? rcu_lock_release+0x26/0x30 [ 186.681771][T12395] ? __fget+0x4fe/0x540 [ 186.685928][T12395] ? fget_many+0x30/0x30 [ 186.690161][T12395] ? __mutex_lock_common+0x56b/0x2fc0 [ 186.695619][T12395] ? __fdget+0x17c/0x200 [ 186.699859][T12395] do_recvmmsg+0x33d/0x870 [ 186.704274][T12395] ? __sys_recvmmsg+0x220/0x220 [ 186.709114][T12395] ? kasan_check_write+0x14/0x20 [ 186.714045][T12395] ? __mutex_unlock_slowpath+0x18c/0x630 [ 186.719723][T12395] ? kasan_check_write+0x14/0x20 [ 186.724681][T12395] ? fput_many+0x47/0x1a0 [ 186.729015][T12395] ? check_preemption_disabled+0xb7/0x280 [ 186.734735][T12395] __x64_sys_recvmmsg+0x17c/0x220 [ 186.739764][T12395] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 186.745389][T12395] ? do_recvmmsg+0x870/0x870 [ 186.749966][T12395] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 186.755674][T12395] ? do_syscall_64+0x1d/0x140 [ 186.760345][T12395] do_syscall_64+0xfe/0x140 [ 186.764850][T12395] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.770902][T12395] RIP: 0033:0x459519 [ 186.774790][T12395] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.794587][T12395] RSP: 002b:00007f3b465c4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 186.803044][T12395] RAX: ffffffffffffffda RBX: 00007f3b465c4c90 RCX: 0000000000459519 23:26:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:14 executing program 5: syz_read_part_table(0xb00, 0x0, 0x0) 23:26:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x400000000000000}}], 0x1, 0x0, 0x0) 23:26:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:14 executing program 1 (fault-call:6 fault-nth:18): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 186.811029][T12395] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000004 [ 186.818989][T12395] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 186.827057][T12395] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465c56d4 [ 186.835029][T12395] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000005 23:26:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x500000000000000}}], 0x1, 0x0, 0x0) 23:26:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 186.961793][T12408] FAULT_INJECTION: forcing a failure. [ 186.961793][T12408] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 186.975976][T12408] CPU: 1 PID: 12408 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 186.983866][T12408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.994096][T12408] Call Trace: [ 186.997393][T12408] dump_stack+0x1d8/0x2f8 [ 187.001732][T12408] should_fail+0x608/0x860 [ 187.006157][T12408] ? setup_fault_attr+0x2b0/0x2b0 [ 187.011183][T12408] should_fail_alloc_page+0x55/0x60 [ 187.016382][T12408] prepare_alloc_pages+0x283/0x460 [ 187.021501][T12408] __alloc_pages_nodemask+0x11c/0x790 [ 187.026968][T12408] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 187.032510][T12408] ? do_raw_spin_lock+0x143/0x3a0 [ 187.037540][T12408] ? _raw_spin_unlock_irqrestore+0x77/0xe0 [ 187.043341][T12408] kmem_getpages+0x46/0x480 [ 187.047834][T12408] cache_grow_begin+0x7e/0x2c0 [ 187.052595][T12408] cache_alloc_refill+0x311/0x3f0 [ 187.057617][T12408] ? check_preemption_disabled+0xb7/0x280 [ 187.063341][T12408] __kmalloc+0x2e5/0x310 [ 187.067662][T12408] ? sock_kmalloc+0xac/0x120 [ 187.072247][T12408] sock_kmalloc+0xac/0x120 [ 187.076669][T12408] af_alg_alloc_areq+0x28/0x180 [ 187.081519][T12408] aead_recvmsg+0x51e/0x1c50 [ 187.086135][T12408] ? aead_sendmsg+0x110/0x110 [ 187.090826][T12408] ? __might_fault+0xf9/0x160 [ 187.095512][T12408] ? kasan_check_write+0x14/0x20 [ 187.100456][T12408] ? _copy_from_user+0xe0/0x120 [ 187.105314][T12408] ? rw_copy_check_uvector+0x2e4/0x310 [ 187.112261][T12408] ? import_iovec+0x17e/0x340 [ 187.116932][T12408] ? __might_fault+0xf9/0x160 [ 187.121608][T12408] ? security_socket_recvmsg+0xa9/0xd0 [ 187.127069][T12408] ? aead_sendmsg+0x110/0x110 [ 187.131741][T12408] sock_recvmsg+0xe7/0x100 [ 187.136159][T12408] ___sys_recvmsg+0x28b/0x9c0 [ 187.140851][T12408] ? __sys_recvmsg+0x250/0x250 [ 187.145623][T12408] ? rcu_lock_release+0xd/0x30 [ 187.150389][T12408] ? rcu_lock_release+0x26/0x30 [ 187.155230][T12408] ? __fget+0x4fe/0x540 [ 187.160080][T12408] ? fget_many+0x30/0x30 [ 187.164321][T12408] ? __mutex_lock_common+0x56b/0x2fc0 [ 187.169689][T12408] ? __fdget+0x17c/0x200 [ 187.173926][T12408] do_recvmmsg+0x33d/0x870 [ 187.178348][T12408] ? __sys_recvmmsg+0x220/0x220 [ 187.183188][T12408] ? kasan_check_write+0x14/0x20 [ 187.188114][T12408] ? __mutex_unlock_slowpath+0x18c/0x630 [ 187.193747][T12408] ? kasan_check_write+0x14/0x20 [ 187.198676][T12408] ? fput_many+0x47/0x1a0 [ 187.203000][T12408] ? check_preemption_disabled+0xb7/0x280 [ 187.208722][T12408] __x64_sys_recvmmsg+0x17c/0x220 [ 187.213745][T12408] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 187.219378][T12408] ? do_recvmmsg+0x870/0x870 [ 187.223962][T12408] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 187.229673][T12408] ? do_syscall_64+0x1d/0x140 [ 187.234350][T12408] do_syscall_64+0xfe/0x140 [ 187.238850][T12408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.244742][T12408] RIP: 0033:0x459519 [ 187.248630][T12408] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.268234][T12408] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 187.276657][T12408] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 187.284622][T12408] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 187.292586][T12408] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 187.300639][T12408] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 23:26:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:14 executing program 3 (fault-call:6 fault-nth:11): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:14 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 187.308604][T12408] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x600000000000000}}], 0x1, 0x0, 0x0) [ 187.351869][T12406] Dev loop5: unable to read RDB block 5 [ 187.373164][T12416] FAULT_INJECTION: forcing a failure. [ 187.373164][T12416] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 187.386388][T12416] CPU: 1 PID: 12416 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 187.386396][T12416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.386401][T12416] Call Trace: [ 187.386417][T12416] dump_stack+0x1d8/0x2f8 [ 187.386432][T12416] should_fail+0x608/0x860 [ 187.386443][T12416] ? setup_fault_attr+0x2b0/0x2b0 [ 187.386460][T12416] should_fail_alloc_page+0x55/0x60 [ 187.386470][T12416] prepare_alloc_pages+0x283/0x460 [ 187.386484][T12416] __alloc_pages_nodemask+0x11c/0x790 [ 187.386498][T12416] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 187.386508][T12416] ? do_raw_spin_lock+0x143/0x3a0 [ 187.386526][T12416] ? _raw_spin_unlock_irqrestore+0x77/0xe0 [ 187.386540][T12416] kmem_getpages+0x46/0x480 [ 187.386552][T12416] cache_grow_begin+0x7e/0x2c0 [ 187.386565][T12416] cache_alloc_refill+0x311/0x3f0 [ 187.386575][T12416] ? check_preemption_disabled+0xb7/0x280 [ 187.386588][T12416] __kmalloc+0x2e5/0x310 [ 187.386597][T12416] ? sock_kmalloc+0xac/0x120 [ 187.386609][T12416] sock_kmalloc+0xac/0x120 [ 187.386623][T12416] af_alg_alloc_areq+0x28/0x180 [ 187.399390][T12406] loop5: unable to read partition table [ 187.404565][T12416] aead_recvmsg+0x51e/0x1c50 23:26:14 executing program 1 (fault-call:6 fault-nth:19): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:14 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xa00000000000000}}], 0x1, 0x0, 0x0) [ 187.404595][T12416] ? aead_sendmsg+0x110/0x110 [ 187.404617][T12416] ? __might_fault+0xf9/0x160 [ 187.404635][T12416] ? kasan_check_write+0x14/0x20 [ 187.404643][T12416] ? _copy_from_user+0xe0/0x120 [ 187.404654][T12416] ? rw_copy_check_uvector+0x2e4/0x310 [ 187.404675][T12416] ? import_iovec+0x17e/0x340 [ 187.417983][T12406] loop5: partition table beyond EOD, truncated [ 187.421737][T12416] ? __might_fault+0xf9/0x160 [ 187.421754][T12416] ? security_socket_recvmsg+0xa9/0xd0 [ 187.421763][T12416] ? aead_sendmsg+0x110/0x110 [ 187.421783][T12416] sock_recvmsg+0xe7/0x100 [ 187.432056][T12416] ___sys_recvmsg+0x28b/0x9c0 [ 187.432074][T12416] ? __sys_recvmsg+0x250/0x250 [ 187.432093][T12416] ? rcu_lock_release+0xd/0x30 [ 187.441879][T12406] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 187.442964][T12416] ? rcu_lock_release+0x26/0x30 [ 187.442973][T12416] ? __fget+0x4fe/0x540 [ 187.442989][T12416] ? fget_many+0x30/0x30 [ 187.443001][T12416] ? __mutex_lock_common+0x56b/0x2fc0 [ 187.443016][T12416] ? __fdget+0x17c/0x200 [ 187.443028][T12416] do_recvmmsg+0x33d/0x870 [ 187.443044][T12416] ? __sys_recvmmsg+0x220/0x220 [ 187.443053][T12416] ? kasan_check_write+0x14/0x20 [ 187.443061][T12416] ? __mutex_unlock_slowpath+0x18c/0x630 [ 187.443075][T12416] ? kasan_check_write+0x14/0x20 [ 187.453969][T12416] ? fput_many+0x47/0x1a0 [ 187.453982][T12416] ? check_preemption_disabled+0xb7/0x280 [ 187.454001][T12416] __x64_sys_recvmmsg+0x17c/0x220 [ 187.454013][T12416] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 187.454023][T12416] ? do_recvmmsg+0x870/0x870 [ 187.454033][T12416] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 187.454045][T12416] ? do_syscall_64+0x1d/0x140 [ 187.454059][T12416] do_syscall_64+0xfe/0x140 [ 187.454073][T12416] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.454082][T12416] RIP: 0033:0x459519 [ 187.454092][T12416] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.454097][T12416] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 187.454106][T12416] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 187.454113][T12416] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 187.454117][T12416] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 187.454127][T12416] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 187.468367][T12416] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:15 executing program 3 (fault-call:6 fault-nth:12): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:15 executing program 5: syz_read_part_table(0xc00, 0x0, 0x0) 23:26:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 187.806530][T12428] FAULT_INJECTION: forcing a failure. [ 187.806530][T12428] name failslab, interval 1, probability 0, space 0, times 0 23:26:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xc00000000000000}}], 0x1, 0x0, 0x0) [ 187.876676][T12432] FAULT_INJECTION: forcing a failure. [ 187.876676][T12432] name failslab, interval 1, probability 0, space 0, times 0 [ 187.896748][T12428] CPU: 0 PID: 12428 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 187.904689][T12428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.904694][T12428] Call Trace: [ 187.904712][T12428] dump_stack+0x1d8/0x2f8 [ 187.904728][T12428] should_fail+0x608/0x860 [ 187.904747][T12428] ? setup_fault_attr+0x2b0/0x2b0 [ 187.904759][T12428] ? sock_kmalloc+0xac/0x120 [ 187.904775][T12428] __should_failslab+0x11a/0x160 [ 187.904788][T12428] ? sock_kmalloc+0xac/0x120 [ 187.946437][T12428] should_failslab+0x9/0x20 [ 187.950950][T12428] __kmalloc+0x7a/0x310 [ 187.955123][T12428] sock_kmalloc+0xac/0x120 [ 187.959544][T12428] af_alg_alloc_areq+0x28/0x180 [ 187.959558][T12428] aead_recvmsg+0x51e/0x1c50 [ 187.959583][T12428] ? aead_sendmsg+0x110/0x110 [ 187.973665][T12428] ? __might_fault+0xf9/0x160 [ 187.973686][T12428] ? kasan_check_write+0x14/0x20 [ 187.973696][T12428] ? _copy_from_user+0xe0/0x120 [ 187.973711][T12428] ? rw_copy_check_uvector+0x2e4/0x310 [ 187.993574][T12428] ? import_iovec+0x17e/0x340 [ 187.998253][T12428] ? __might_fault+0xf9/0x160 [ 188.002930][T12428] ? security_socket_recvmsg+0xa9/0xd0 [ 188.008381][T12428] ? aead_sendmsg+0x110/0x110 [ 188.013055][T12428] sock_recvmsg+0xe7/0x100 [ 188.017704][T12428] ___sys_recvmsg+0x28b/0x9c0 [ 188.022383][T12428] ? __sys_recvmsg+0x250/0x250 [ 188.027155][T12428] ? check_preemption_disabled+0x47/0x280 [ 188.032897][T12428] ? rcu_lock_release+0xd/0x30 [ 188.037661][T12428] ? rcu_lock_release+0x26/0x30 [ 188.042504][T12428] ? __fget+0x4fe/0x540 [ 188.046663][T12428] ? fget_many+0x30/0x30 [ 188.050900][T12428] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 188.056448][T12428] ? __fdget+0x17c/0x200 [ 188.060689][T12428] do_recvmmsg+0x33d/0x870 [ 188.065109][T12428] ? __sys_recvmmsg+0x220/0x220 [ 188.069960][T12428] ? kasan_check_write+0x14/0x20 [ 188.074896][T12428] ? __mutex_unlock_slowpath+0x18c/0x630 [ 188.080526][T12428] ? kasan_check_write+0x14/0x20 [ 188.085454][T12428] ? fput_many+0x47/0x1a0 [ 188.089779][T12428] ? check_preemption_disabled+0xb7/0x280 [ 188.095514][T12428] __x64_sys_recvmmsg+0x17c/0x220 [ 188.100707][T12428] ? do_recvmmsg+0x870/0x870 [ 188.105295][T12428] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 188.111011][T12428] ? do_syscall_64+0x1d/0x140 [ 188.115686][T12428] do_syscall_64+0xfe/0x140 [ 188.120190][T12428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.126077][T12428] RIP: 0033:0x459519 [ 188.129967][T12428] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.149566][T12428] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 188.157990][T12428] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 188.165953][T12428] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 23:26:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xf00000000000000}}], 0x1, 0x0, 0x0) 23:26:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 188.173918][T12428] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 188.181882][T12428] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 188.189849][T12428] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 188.205996][T12432] CPU: 1 PID: 12432 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 188.213933][T12432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.213938][T12432] Call Trace: [ 188.213956][T12432] dump_stack+0x1d8/0x2f8 [ 188.213969][T12432] should_fail+0x608/0x860 [ 188.213980][T12432] ? setup_fault_attr+0x2b0/0x2b0 [ 188.213991][T12432] ? sock_kmalloc+0xac/0x120 [ 188.214009][T12432] __should_failslab+0x11a/0x160 [ 188.214020][T12432] ? sock_kmalloc+0xac/0x120 [ 188.214030][T12432] should_failslab+0x9/0x20 [ 188.214038][T12432] __kmalloc+0x7a/0x310 [ 188.214052][T12432] sock_kmalloc+0xac/0x120 [ 188.231691][T12432] af_alg_alloc_areq+0x28/0x180 [ 188.231703][T12432] aead_recvmsg+0x51e/0x1c50 [ 188.231732][T12432] ? aead_sendmsg+0x110/0x110 [ 188.282483][T12432] ? __might_fault+0xf9/0x160 [ 188.287168][T12432] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 188.292640][T12432] ? retint_kernel+0x2b/0x2b [ 188.297237][T12432] ? trace_hardirqs_on_caller+0x74/0x80 [ 188.302783][T12432] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 188.308243][T12432] ? rcu_irq_exit+0x118/0x2b0 [ 188.313178][T12432] ? retint_kernel+0x2b/0x2b [ 188.317773][T12432] ? ___sys_recvmsg+0x26a/0x9c0 [ 188.322618][T12432] ? sock_recvmsg+0x1f/0x100 23:26:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:15 executing program 1 (fault-call:6 fault-nth:20): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 188.327208][T12432] ? security_socket_recvmsg+0xa9/0xd0 [ 188.332663][T12432] ? aead_sendmsg+0x110/0x110 [ 188.337341][T12432] sock_recvmsg+0xe7/0x100 [ 188.341769][T12432] ___sys_recvmsg+0x28b/0x9c0 [ 188.346449][T12432] ? __sys_recvmsg+0x250/0x250 [ 188.351233][T12432] ? rcu_lock_release+0xd/0x30 [ 188.356378][T12432] ? rcu_lock_release+0x26/0x30 [ 188.361221][T12432] ? __fget+0x4fe/0x540 [ 188.365380][T12432] ? fget_many+0x30/0x30 [ 188.369615][T12432] ? rcu_irq_exit+0x118/0x2b0 [ 188.374293][T12432] ? __fdget+0x17c/0x200 [ 188.378533][T12432] do_recvmmsg+0x33d/0x870 [ 188.382950][T12432] ? __sys_recvmmsg+0x220/0x220 [ 188.387796][T12432] ? kasan_check_write+0x14/0x20 [ 188.392733][T12432] ? __mutex_unlock_slowpath+0x18c/0x630 [ 188.398547][T12432] ? kasan_check_write+0x14/0x20 [ 188.403481][T12432] ? fput_many+0x47/0x1a0 [ 188.407810][T12432] ? check_preemption_disabled+0xb7/0x280 [ 188.414408][T12432] __x64_sys_recvmmsg+0x17c/0x220 [ 188.419443][T12432] ? do_recvmmsg+0x870/0x870 23:26:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x1000000000000000}}], 0x1, 0x0, 0x0) [ 188.424043][T12432] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 188.429767][T12432] ? do_syscall_64+0x1d/0x140 [ 188.434452][T12432] do_syscall_64+0xfe/0x140 [ 188.438957][T12432] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.444843][T12432] RIP: 0033:0x459519 [ 188.448757][T12432] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.469224][T12432] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b 23:26:15 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:15 executing program 3 (fault-call:6 fault-nth:13): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 188.477661][T12432] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 188.485629][T12432] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 188.493597][T12432] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 188.501564][T12432] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 188.509533][T12432] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 188.560590][T12444] Dev loop5: unable to read RDB block 6 [ 188.577630][T12444] loop5: unable to read partition table [ 188.593033][T12444] loop5: partition table beyond EOD, truncated [ 188.599408][T12444] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 188.615544][T12460] FAULT_INJECTION: forcing a failure. [ 188.615544][T12460] name failslab, interval 1, probability 0, space 0, times 0 [ 188.629471][T12461] FAULT_INJECTION: forcing a failure. [ 188.629471][T12461] name failslab, interval 1, probability 0, space 0, times 0 [ 188.647507][T12460] CPU: 0 PID: 12460 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 188.655419][T12460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.666098][T12460] Call Trace: [ 188.669386][T12460] dump_stack+0x1d8/0x2f8 [ 188.673716][T12460] should_fail+0x608/0x860 [ 188.678125][T12460] ? setup_fault_attr+0x2b0/0x2b0 [ 188.683144][T12460] ? sock_kmalloc+0xac/0x120 [ 188.687729][T12460] __should_failslab+0x11a/0x160 [ 188.692666][T12460] ? sock_kmalloc+0xac/0x120 [ 188.697340][T12460] should_failslab+0x9/0x20 [ 188.701836][T12460] __kmalloc+0x7a/0x310 [ 188.705991][T12460] sock_kmalloc+0xac/0x120 [ 188.710398][T12460] af_alg_alloc_areq+0x28/0x180 [ 188.715240][T12460] aead_recvmsg+0x51e/0x1c50 [ 188.719845][T12460] ? aead_sendmsg+0x110/0x110 [ 188.724526][T12460] ? __might_fault+0xf9/0x160 [ 188.729203][T12460] ? kasan_check_write+0x14/0x20 [ 188.734133][T12460] ? _copy_from_user+0xe0/0x120 [ 188.738978][T12460] ? rw_copy_check_uvector+0x2e4/0x310 [ 188.744440][T12460] ? import_iovec+0x17e/0x340 [ 188.749104][T12460] ? __might_fault+0xf9/0x160 [ 188.753773][T12460] ? security_socket_recvmsg+0xa9/0xd0 [ 188.759220][T12460] ? aead_sendmsg+0x110/0x110 [ 188.763885][T12460] sock_recvmsg+0xe7/0x100 [ 188.768289][T12460] ___sys_recvmsg+0x28b/0x9c0 [ 188.772963][T12460] ? __sys_recvmsg+0x250/0x250 [ 188.777725][T12460] ? rcu_lock_release+0xd/0x30 [ 188.782485][T12460] ? rcu_lock_release+0x26/0x30 [ 188.787328][T12460] ? __fget+0x4fe/0x540 [ 188.791478][T12460] ? fget_many+0x30/0x30 [ 188.795706][T12460] ? __mutex_lock_common+0x56b/0x2fc0 [ 188.801073][T12460] ? __fdget+0x17c/0x200 [ 188.805312][T12460] do_recvmmsg+0x33d/0x870 [ 188.809726][T12460] ? __sys_recvmmsg+0x220/0x220 [ 188.814561][T12460] ? kasan_check_write+0x14/0x20 [ 188.819516][T12460] ? __mutex_unlock_slowpath+0x18c/0x630 [ 188.825139][T12460] ? kasan_check_write+0x14/0x20 [ 188.830060][T12460] ? fput_many+0x47/0x1a0 [ 188.834382][T12460] ? check_preemption_disabled+0xb7/0x280 [ 188.840100][T12460] __x64_sys_recvmmsg+0x17c/0x220 [ 188.845123][T12460] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 188.850741][T12460] ? do_recvmmsg+0x870/0x870 [ 188.855341][T12460] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 188.861053][T12460] ? do_syscall_64+0x1d/0x140 [ 188.865743][T12460] do_syscall_64+0xfe/0x140 [ 188.870239][T12460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.876139][T12460] RIP: 0033:0x459519 [ 188.880023][T12460] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.899614][T12460] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 188.908021][T12460] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 188.915985][T12460] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 188.923946][T12460] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 188.931992][T12460] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 188.939954][T12460] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 188.950709][T12461] CPU: 1 PID: 12461 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 188.964767][T12461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.974803][T12461] Call Trace: [ 188.978071][T12461] dump_stack+0x1d8/0x2f8 [ 188.982375][T12461] should_fail+0x608/0x860 [ 188.986942][T12461] ? setup_fault_attr+0x2b0/0x2b0 [ 188.991938][T12461] ? sock_kmalloc+0xac/0x120 [ 188.996507][T12461] __should_failslab+0x11a/0x160 [ 189.001416][T12461] ? sock_kmalloc+0xac/0x120 [ 189.006071][T12461] should_failslab+0x9/0x20 [ 189.010551][T12461] __kmalloc+0x7a/0x310 [ 189.014691][T12461] sock_kmalloc+0xac/0x120 [ 189.019085][T12461] af_alg_alloc_areq+0x28/0x180 [ 189.023907][T12461] aead_recvmsg+0x51e/0x1c50 [ 189.028483][T12461] ? aead_sendmsg+0x110/0x110 [ 189.033147][T12461] ? __might_fault+0xf9/0x160 [ 189.037800][T12461] ? kasan_check_write+0x14/0x20 [ 189.042709][T12461] ? _copy_from_user+0xe0/0x120 [ 189.047537][T12461] ? rw_copy_check_uvector+0x2e4/0x310 [ 189.053062][T12461] ? import_iovec+0x17e/0x340 [ 189.057707][T12461] ? __might_fault+0xf9/0x160 [ 189.062359][T12461] ? security_socket_recvmsg+0xa9/0xd0 [ 189.067791][T12461] ? aead_sendmsg+0x110/0x110 [ 189.072440][T12461] sock_recvmsg+0xe7/0x100 [ 189.076831][T12461] ___sys_recvmsg+0x28b/0x9c0 [ 189.081488][T12461] ? __sys_recvmsg+0x250/0x250 [ 189.086233][T12461] ? rcu_lock_release+0xd/0x30 [ 189.090971][T12461] ? rcu_lock_release+0x26/0x30 [ 189.095796][T12461] ? __fget+0x4fe/0x540 [ 189.099930][T12461] ? fget_many+0x30/0x30 [ 189.104152][T12461] ? __mutex_lock_common+0x56b/0x2fc0 [ 189.111020][T12461] ? __fdget+0x17c/0x200 [ 189.115240][T12461] do_recvmmsg+0x33d/0x870 [ 189.119636][T12461] ? __sys_recvmmsg+0x220/0x220 [ 189.124547][T12461] ? kasan_check_write+0x14/0x20 [ 189.129455][T12461] ? __mutex_unlock_slowpath+0x18c/0x630 [ 189.135063][T12461] ? kasan_check_write+0x14/0x20 [ 189.139980][T12461] ? fput_many+0x47/0x1a0 [ 189.144382][T12461] ? check_preemption_disabled+0xb7/0x280 [ 189.150079][T12461] __x64_sys_recvmmsg+0x17c/0x220 [ 189.155081][T12461] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 189.160685][T12461] ? do_recvmmsg+0x870/0x870 [ 189.165253][T12461] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 189.170945][T12461] ? do_syscall_64+0x1d/0x140 [ 189.175600][T12461] do_syscall_64+0xfe/0x140 [ 189.180082][T12461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.185946][T12461] RIP: 0033:0x459519 [ 189.189817][T12461] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.209395][T12461] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b 23:26:16 executing program 5: syz_read_part_table(0xd00, 0x0, 0x0) 23:26:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x3f00000000000000}}], 0x1, 0x0, 0x0) 23:26:16 executing program 1 (fault-call:6 fault-nth:21): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:16 executing program 3 (fault-call:6 fault-nth:14): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 189.217784][T12461] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 189.225728][T12461] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 189.233769][T12461] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 189.241716][T12461] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 189.249662][T12461] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 189.373682][T12462] Dev loop5: unable to read RDB block 6 [ 189.379376][T12462] loop5: unable to read partition table [ 189.390062][T12462] loop5: partition table beyond EOD, truncated [ 189.396717][T12462] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 189.507272][T12472] FAULT_INJECTION: forcing a failure. [ 189.507272][T12472] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 189.520508][T12472] CPU: 1 PID: 12472 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 189.528402][T12472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.538458][T12472] Call Trace: [ 189.541753][T12472] dump_stack+0x1d8/0x2f8 [ 189.546081][T12472] should_fail+0x608/0x860 [ 189.550498][T12472] ? setup_fault_attr+0x2b0/0x2b0 [ 189.555523][T12472] should_fail_alloc_page+0x55/0x60 [ 189.560712][T12472] prepare_alloc_pages+0x283/0x460 [ 189.565822][T12472] __alloc_pages_nodemask+0x11c/0x790 [ 189.571187][T12472] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 189.576808][T12472] ? do_raw_spin_lock+0x143/0x3a0 [ 189.581865][T12472] ? _raw_spin_unlock_irqrestore+0x77/0xe0 [ 189.587672][T12472] kmem_getpages+0x46/0x480 [ 189.592165][T12472] cache_grow_begin+0x7e/0x2c0 [ 189.596923][T12472] cache_alloc_refill+0x311/0x3f0 [ 189.601938][T12472] ? check_preemption_disabled+0xb7/0x280 [ 189.607647][T12472] __kmalloc+0x2e5/0x310 [ 189.611881][T12472] ? sock_kmalloc+0xac/0x120 [ 189.616465][T12472] sock_kmalloc+0xac/0x120 [ 189.620874][T12472] af_alg_alloc_areq+0x28/0x180 [ 189.625714][T12472] aead_recvmsg+0x51e/0x1c50 [ 189.630313][T12472] ? aead_sendmsg+0x110/0x110 [ 189.634991][T12472] ? __might_fault+0xf9/0x160 [ 189.639664][T12472] ? kasan_check_write+0x14/0x20 [ 189.644591][T12472] ? _copy_from_user+0xe0/0x120 [ 189.649436][T12472] ? rw_copy_check_uvector+0x2e4/0x310 [ 189.654900][T12472] ? import_iovec+0x17e/0x340 [ 189.659561][T12472] ? __might_fault+0xf9/0x160 [ 189.664229][T12472] ? security_socket_recvmsg+0xa9/0xd0 [ 189.669673][T12472] ? aead_sendmsg+0x110/0x110 [ 189.674343][T12472] sock_recvmsg+0xe7/0x100 [ 189.678752][T12472] ___sys_recvmsg+0x28b/0x9c0 [ 189.683431][T12472] ? __sys_recvmsg+0x250/0x250 [ 189.688196][T12472] ? rcu_lock_release+0xd/0x30 [ 189.692950][T12472] ? rcu_lock_release+0x26/0x30 [ 189.697800][T12472] ? __fget+0x4fe/0x540 [ 189.701960][T12472] ? fget_many+0x30/0x30 [ 189.706200][T12472] ? __mutex_lock_common+0x56b/0x2fc0 [ 189.711565][T12472] ? __fdget+0x17c/0x200 [ 189.715905][T12472] do_recvmmsg+0x33d/0x870 [ 189.720603][T12472] ? __sys_recvmmsg+0x220/0x220 [ 189.725545][T12472] ? kasan_check_write+0x14/0x20 [ 189.730474][T12472] ? __mutex_unlock_slowpath+0x18c/0x630 [ 189.736111][T12472] ? kasan_check_write+0x14/0x20 [ 189.741060][T12472] ? fput_many+0x47/0x1a0 [ 189.745398][T12472] ? check_preemption_disabled+0xb7/0x280 [ 189.746960][T12475] FAULT_INJECTION: forcing a failure. [ 189.746960][T12475] name failslab, interval 1, probability 0, space 0, times 0 [ 189.751115][T12472] __x64_sys_recvmmsg+0x17c/0x220 [ 189.768771][T12472] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 189.774401][T12472] ? do_recvmmsg+0x870/0x870 [ 189.778982][T12472] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 189.784692][T12472] ? do_syscall_64+0x1d/0x140 [ 189.789369][T12472] do_syscall_64+0xfe/0x140 [ 189.793869][T12472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.799755][T12472] RIP: 0033:0x459519 [ 189.803641][T12472] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 189.823239][T12472] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 189.831640][T12472] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 189.839610][T12472] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 189.847573][T12472] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 189.855530][T12472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 189.863572][T12472] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 189.876340][T12475] CPU: 0 PID: 12475 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 189.884244][T12475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.884250][T12475] Call Trace: [ 189.884266][T12475] dump_stack+0x1d8/0x2f8 [ 189.884280][T12475] should_fail+0x608/0x860 [ 189.884293][T12475] ? setup_fault_attr+0x2b0/0x2b0 [ 189.906311][T12475] ? sock_kmalloc+0xac/0x120 [ 189.906328][T12475] __should_failslab+0x11a/0x160 [ 189.920836][T12475] ? sock_kmalloc+0xac/0x120 [ 189.925428][T12475] should_failslab+0x9/0x20 [ 189.929926][T12475] __kmalloc+0x7a/0x310 [ 189.934092][T12475] sock_kmalloc+0xac/0x120 [ 189.938514][T12475] af_alg_alloc_areq+0x28/0x180 [ 189.943363][T12475] aead_recvmsg+0x51e/0x1c50 [ 189.943395][T12475] ? aead_sendmsg+0x110/0x110 [ 189.943417][T12475] ? __might_fault+0xf9/0x160 [ 189.943434][T12475] ? kasan_check_write+0x14/0x20 [ 189.943446][T12475] ? _copy_from_user+0xe0/0x120 [ 189.952681][T12475] ? rw_copy_check_uvector+0x2e4/0x310 [ 189.972523][T12475] ? import_iovec+0x17e/0x340 [ 189.972533][T12475] ? __might_fault+0xf9/0x160 [ 189.972553][T12475] ? security_socket_recvmsg+0xa9/0xd0 [ 189.972567][T12475] ? aead_sendmsg+0x110/0x110 [ 189.982041][T12475] sock_recvmsg+0xe7/0x100 [ 189.982056][T12475] ___sys_recvmsg+0x28b/0x9c0 [ 189.982073][T12475] ? __sys_recvmsg+0x250/0x250 [ 189.982094][T12475] ? rcu_lock_release+0xd/0x30 [ 189.982108][T12475] ? rcu_lock_release+0x26/0x30 [ 189.992202][T12475] ? __fget+0x4fe/0x540 [ 189.992220][T12475] ? fget_many+0x30/0x30 [ 189.992233][T12475] ? __mutex_lock_common+0x56b/0x2fc0 [ 189.992249][T12475] ? __fdget+0x17c/0x200 [ 189.992262][T12475] do_recvmmsg+0x33d/0x870 [ 190.001313][T12475] ? __sys_recvmmsg+0x220/0x220 [ 190.001324][T12475] ? kasan_check_write+0x14/0x20 [ 190.001335][T12475] ? __mutex_unlock_slowpath+0x18c/0x630 [ 190.001352][T12475] ? kasan_check_write+0x14/0x20 [ 190.001365][T12475] ? fput_many+0x47/0x1a0 [ 190.062597][T12475] ? check_preemption_disabled+0xb7/0x280 [ 190.068321][T12475] __x64_sys_recvmmsg+0x17c/0x220 [ 190.073340][T12475] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 190.079744][T12475] ? do_recvmmsg+0x870/0x870 [ 190.084327][T12475] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 190.090053][T12475] ? do_syscall_64+0x1d/0x140 [ 190.095019][T12475] do_syscall_64+0xfe/0x140 [ 190.099692][T12475] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.105578][T12475] RIP: 0033:0x459519 [ 190.109469][T12475] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.129062][T12475] RSP: 002b:00007f6eeea65c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 190.137466][T12475] RAX: ffffffffffffffda RBX: 00007f6eeea65c90 RCX: 0000000000459519 [ 190.145430][T12475] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000004 23:26:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x4000000000000000}}], 0x1, 0x0, 0x0) 23:26:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:17 executing program 3 (fault-call:6 fault-nth:15): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:17 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x6000000000000000}}], 0x1, 0x0, 0x0) [ 190.153422][T12475] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 190.161388][T12475] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea666d4 [ 190.169359][T12475] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000005 23:26:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 190.283615][T12479] Dev loop5: unable to read RDB block 6 [ 190.291520][T12479] loop5: unable to read partition table [ 190.312813][T12491] FAULT_INJECTION: forcing a failure. [ 190.312813][T12491] name failslab, interval 1, probability 0, space 0, times 0 [ 190.326691][T12479] loop5: partition table beyond EOD, truncated [ 190.338981][T12479] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 190.369936][T12491] CPU: 1 PID: 12491 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 190.377867][T12491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.387919][T12491] Call Trace: [ 190.391233][T12491] dump_stack+0x1d8/0x2f8 [ 190.395564][T12491] should_fail+0x608/0x860 [ 190.399975][T12491] ? setup_fault_attr+0x2b0/0x2b0 [ 190.404993][T12491] ? sock_kmalloc+0xac/0x120 [ 190.409674][T12491] __should_failslab+0x11a/0x160 [ 190.414609][T12491] ? sock_kmalloc+0xac/0x120 [ 190.419200][T12491] should_failslab+0x9/0x20 [ 190.423700][T12491] __kmalloc+0x7a/0x310 [ 190.427854][T12491] sock_kmalloc+0xac/0x120 [ 190.432261][T12491] af_alg_alloc_areq+0x28/0x180 [ 190.437105][T12491] aead_recvmsg+0x51e/0x1c50 [ 190.441707][T12491] ? aead_sendmsg+0x110/0x110 [ 190.446393][T12491] ? __might_fault+0xf9/0x160 [ 190.451075][T12491] ? kasan_check_write+0x14/0x20 [ 190.456090][T12491] ? _copy_from_user+0xe0/0x120 [ 190.460935][T12491] ? rw_copy_check_uvector+0x2e4/0x310 [ 190.466401][T12491] ? import_iovec+0x17e/0x340 [ 190.471064][T12491] ? __might_fault+0xf9/0x160 [ 190.475735][T12491] ? security_socket_recvmsg+0xa9/0xd0 [ 190.481180][T12491] ? aead_sendmsg+0x110/0x110 [ 190.485849][T12491] sock_recvmsg+0xe7/0x100 [ 190.490263][T12491] ___sys_recvmsg+0x28b/0x9c0 [ 190.494939][T12491] ? __sys_recvmsg+0x250/0x250 [ 190.499709][T12491] ? rcu_lock_release+0xd/0x30 [ 190.504471][T12491] ? rcu_lock_release+0x26/0x30 [ 190.509312][T12491] ? __fget+0x4fe/0x540 [ 190.513467][T12491] ? fget_many+0x30/0x30 [ 190.517710][T12491] ? __mutex_lock_common+0x56b/0x2fc0 [ 190.523078][T12491] ? __fdget+0x17c/0x200 [ 190.527317][T12491] do_recvmmsg+0x33d/0x870 [ 190.531740][T12491] ? __sys_recvmmsg+0x220/0x220 [ 190.536864][T12491] ? kasan_check_write+0x14/0x20 [ 190.541798][T12491] ? __mutex_unlock_slowpath+0x18c/0x630 [ 190.547431][T12491] ? kasan_check_write+0x14/0x20 [ 190.552359][T12491] ? fput_many+0x47/0x1a0 [ 190.556680][T12491] ? check_preemption_disabled+0xb7/0x280 [ 190.562398][T12491] __x64_sys_recvmmsg+0x17c/0x220 [ 190.567414][T12491] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 190.573036][T12491] ? do_recvmmsg+0x870/0x870 [ 190.577613][T12491] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 190.583326][T12491] ? do_syscall_64+0x1d/0x140 [ 190.588009][T12491] do_syscall_64+0xfe/0x140 [ 190.592509][T12491] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.598389][T12491] RIP: 0033:0x459519 [ 190.602276][T12491] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 190.621869][T12491] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 190.630272][T12491] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 190.638235][T12491] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 190.646198][T12491] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 190.654162][T12491] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 190.662122][T12491] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 190.743974][T12479] Dev loop5: unable to read RDB block 6 [ 190.749681][T12479] loop5: unable to read partition table [ 190.760559][T12479] loop5: partition table beyond EOD, truncated [ 190.767138][T12479] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:26:18 executing program 5: syz_read_part_table(0xe00, 0x0, 0x0) 23:26:18 executing program 1 (fault-call:6 fault-nth:22): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x6558000000000000}}], 0x1, 0x0, 0x0) 23:26:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:18 executing program 3 (fault-call:6 fault-nth:16): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x8000000000000000}}], 0x1, 0x0, 0x0) [ 190.934882][T12501] FAULT_INJECTION: forcing a failure. [ 190.934882][T12501] name failslab, interval 1, probability 0, space 0, times 0 [ 190.968499][T12501] CPU: 1 PID: 12501 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 190.976630][T12501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.986684][T12501] Call Trace: [ 190.989987][T12501] dump_stack+0x1d8/0x2f8 [ 190.994326][T12501] should_fail+0x608/0x860 [ 190.998835][T12501] ? setup_fault_attr+0x2b0/0x2b0 [ 191.003868][T12501] ? sock_kmalloc+0xac/0x120 [ 191.008477][T12501] __should_failslab+0x11a/0x160 [ 191.013507][T12501] ? sock_kmalloc+0xac/0x120 [ 191.018100][T12501] should_failslab+0x9/0x20 [ 191.022602][T12501] __kmalloc+0x7a/0x310 [ 191.026760][T12501] sock_kmalloc+0xac/0x120 23:26:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 191.027403][T12510] FAULT_INJECTION: forcing a failure. [ 191.027403][T12510] name failslab, interval 1, probability 0, space 0, times 0 [ 191.031165][T12501] af_alg_alloc_areq+0x28/0x180 [ 191.031178][T12501] aead_recvmsg+0x51e/0x1c50 [ 191.031203][T12501] ? aead_sendmsg+0x110/0x110 [ 191.057844][T12501] ? __might_fault+0xf9/0x160 [ 191.062533][T12501] ? kasan_check_write+0x14/0x20 [ 191.067468][T12501] ? _copy_from_user+0xe0/0x120 [ 191.072324][T12501] ? rw_copy_check_uvector+0x2e4/0x310 [ 191.077794][T12501] ? import_iovec+0x17e/0x340 23:26:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:18 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x8100000000000000}}], 0x1, 0x0, 0x0) [ 191.082467][T12501] ? __might_fault+0xf9/0x160 [ 191.087495][T12501] ? security_socket_recvmsg+0xa9/0xd0 [ 191.092963][T12501] ? aead_sendmsg+0x110/0x110 [ 191.097639][T12501] sock_recvmsg+0xe7/0x100 [ 191.102054][T12501] ___sys_recvmsg+0x28b/0x9c0 [ 191.106820][T12501] ? __sys_recvmsg+0x250/0x250 [ 191.113114][T12501] ? rcu_lock_release+0xd/0x30 [ 191.117876][T12501] ? rcu_lock_release+0x26/0x30 [ 191.122727][T12501] ? __fget+0x4fe/0x540 [ 191.126977][T12501] ? fget_many+0x30/0x30 [ 191.131215][T12501] ? __mutex_lock_common+0x56b/0x2fc0 [ 191.136583][T12501] ? __fdget+0x17c/0x200 [ 191.136598][T12501] do_recvmmsg+0x33d/0x870 [ 191.136618][T12501] ? __sys_recvmmsg+0x220/0x220 [ 191.136630][T12501] ? kasan_check_write+0x14/0x20 [ 191.154990][T12501] ? __mutex_unlock_slowpath+0x18c/0x630 [ 191.155010][T12501] ? kasan_check_write+0x14/0x20 [ 191.155019][T12501] ? fput_many+0x47/0x1a0 [ 191.155030][T12501] ? check_preemption_disabled+0xb7/0x280 [ 191.155048][T12501] __x64_sys_recvmmsg+0x17c/0x220 [ 191.155059][T12501] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 191.155070][T12501] ? do_recvmmsg+0x870/0x870 [ 191.180607][T12501] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 191.180621][T12501] ? do_syscall_64+0x1d/0x140 [ 191.180637][T12501] do_syscall_64+0xfe/0x140 [ 191.180653][T12501] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.180665][T12501] RIP: 0033:0x459519 [ 191.211534][T12501] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.211541][T12501] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 191.211551][T12501] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 191.211558][T12501] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 191.211563][T12501] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 191.211569][T12501] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 191.211575][T12501] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 191.211763][T12510] CPU: 1 PID: 12510 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 191.235152][T12510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.235157][T12510] Call Trace: [ 191.235175][T12510] dump_stack+0x1d8/0x2f8 [ 191.235199][T12510] should_fail+0x608/0x860 [ 191.235212][T12510] ? setup_fault_attr+0x2b0/0x2b0 [ 191.235222][T12510] ? sock_kmalloc+0xac/0x120 [ 191.235238][T12510] __should_failslab+0x11a/0x160 [ 191.235248][T12510] ? sock_kmalloc+0xac/0x120 [ 191.235257][T12510] should_failslab+0x9/0x20 [ 191.235264][T12510] __kmalloc+0x7a/0x310 [ 191.235278][T12510] sock_kmalloc+0xac/0x120 [ 191.267564][T12510] af_alg_alloc_areq+0x28/0x180 [ 191.267578][T12510] aead_recvmsg+0x51e/0x1c50 [ 191.267609][T12510] ? aead_sendmsg+0x110/0x110 [ 191.267633][T12510] ? __might_fault+0xf9/0x160 [ 191.267650][T12510] ? kasan_check_write+0x14/0x20 [ 191.267659][T12510] ? _copy_from_user+0xe0/0x120 [ 191.267670][T12510] ? rw_copy_check_uvector+0x2e4/0x310 [ 191.267685][T12510] ? import_iovec+0x17e/0x340 [ 191.267692][T12510] ? __might_fault+0xf9/0x160 [ 191.267707][T12510] ? security_socket_recvmsg+0xa9/0xd0 [ 191.267714][T12510] ? aead_sendmsg+0x110/0x110 [ 191.267726][T12510] sock_recvmsg+0xe7/0x100 [ 191.267738][T12510] ___sys_recvmsg+0x28b/0x9c0 [ 191.267754][T12510] ? __sys_recvmsg+0x250/0x250 [ 191.291553][T12510] ? rcu_lock_release+0xd/0x30 [ 191.291569][T12510] ? rcu_lock_release+0x26/0x30 [ 191.291579][T12510] ? __fget+0x4fe/0x540 [ 191.291596][T12510] ? fget_many+0x30/0x30 [ 191.291608][T12510] ? __mutex_lock_common+0x56b/0x2fc0 [ 191.291622][T12510] ? __fdget+0x17c/0x200 [ 191.309237][T12510] do_recvmmsg+0x33d/0x870 [ 191.309257][T12510] ? __sys_recvmmsg+0x220/0x220 [ 191.309270][T12510] ? kasan_check_write+0x14/0x20 [ 191.309281][T12510] ? __mutex_unlock_slowpath+0x18c/0x630 [ 191.309296][T12510] ? kasan_check_write+0x14/0x20 [ 191.309307][T12510] ? fput_many+0x47/0x1a0 [ 191.318704][T12510] ? check_preemption_disabled+0xb7/0x280 [ 191.318721][T12510] __x64_sys_recvmmsg+0x17c/0x220 [ 191.318734][T12510] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 191.318743][T12510] ? do_recvmmsg+0x870/0x870 [ 191.318753][T12510] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 191.318765][T12510] ? do_syscall_64+0x1d/0x140 [ 191.318780][T12510] do_syscall_64+0xfe/0x140 [ 191.318794][T12510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.328376][T12510] RIP: 0033:0x459519 [ 191.445089][T12510] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 191.445095][T12510] RSP: 002b:00007f6eeea65c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 191.445106][T12510] RAX: ffffffffffffffda RBX: 00007f6eeea65c90 RCX: 0000000000459519 [ 191.445113][T12510] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000004 [ 191.445118][T12510] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 191.445124][T12510] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea666d4 [ 191.445130][T12510] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000005 [ 191.623529][T12521] Dev loop5: unable to read RDB block 7 [ 191.629208][T12521] loop5: unable to read partition table [ 191.635011][T12521] loop5: partition table beyond EOD, truncated [ 191.641264][T12521] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 191.733528][T12521] Dev loop5: unable to read RDB block 7 [ 191.739463][T12521] loop5: unable to read partition table [ 191.750537][T12521] loop5: partition table beyond EOD, truncated [ 191.757092][T12521] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:26:19 executing program 5: syz_read_part_table(0xf26, 0x0, 0x0) 23:26:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x8847000000000000}}], 0x1, 0x0, 0x0) 23:26:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:19 executing program 3 (fault-call:6 fault-nth:17): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:19 executing program 1 (fault-call:6 fault-nth:23): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 191.877396][T12534] FAULT_INJECTION: forcing a failure. [ 191.877396][T12534] name failslab, interval 1, probability 0, space 0, times 0 [ 191.885875][T12533] FAULT_INJECTION: forcing a failure. [ 191.885875][T12533] name failslab, interval 1, probability 0, space 0, times 0 [ 191.916417][T12534] CPU: 1 PID: 12534 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 191.924342][T12534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.934391][T12534] Call Trace: [ 191.937683][T12534] dump_stack+0x1d8/0x2f8 [ 191.942006][T12534] should_fail+0x608/0x860 [ 191.946439][T12534] ? setup_fault_attr+0x2b0/0x2b0 [ 191.951459][T12534] ? sock_kmalloc+0xac/0x120 [ 191.956047][T12534] __should_failslab+0x11a/0x160 [ 191.961165][T12534] ? sock_kmalloc+0xac/0x120 [ 191.965750][T12534] should_failslab+0x9/0x20 [ 191.970243][T12534] __kmalloc+0x7a/0x310 [ 191.974393][T12534] sock_kmalloc+0xac/0x120 [ 191.978804][T12534] af_alg_alloc_areq+0x28/0x180 [ 191.983647][T12534] aead_recvmsg+0x51e/0x1c50 [ 191.988244][T12534] ? aead_sendmsg+0x110/0x110 [ 191.992925][T12534] ? __might_fault+0xf9/0x160 [ 191.997596][T12534] ? kasan_check_write+0x14/0x20 [ 192.002520][T12534] ? _copy_from_user+0xe0/0x120 [ 192.007366][T12534] ? rw_copy_check_uvector+0x2e4/0x310 [ 192.012820][T12534] ? import_iovec+0x17e/0x340 [ 192.017495][T12534] ? __might_fault+0xf9/0x160 [ 192.022163][T12534] ? security_socket_recvmsg+0xa9/0xd0 [ 192.027610][T12534] ? aead_sendmsg+0x110/0x110 [ 192.032278][T12534] sock_recvmsg+0xe7/0x100 [ 192.036685][T12534] ___sys_recvmsg+0x28b/0x9c0 [ 192.041359][T12534] ? __sys_recvmsg+0x250/0x250 [ 192.046125][T12534] ? rcu_lock_release+0xd/0x30 [ 192.050891][T12534] ? rcu_lock_release+0x26/0x30 [ 192.055734][T12534] ? __fget+0x4fe/0x540 [ 192.059968][T12534] ? fget_many+0x30/0x30 [ 192.064203][T12534] ? __mutex_lock_common+0x56b/0x2fc0 [ 192.069573][T12534] ? __fdget+0x17c/0x200 [ 192.073802][T12534] do_recvmmsg+0x33d/0x870 [ 192.078217][T12534] ? __sys_recvmmsg+0x220/0x220 [ 192.083064][T12534] ? kasan_check_write+0x14/0x20 [ 192.087993][T12534] ? __mutex_unlock_slowpath+0x18c/0x630 [ 192.093621][T12534] ? kasan_check_write+0x14/0x20 [ 192.098545][T12534] ? fput_many+0x47/0x1a0 [ 192.102870][T12534] ? check_preemption_disabled+0xb7/0x280 [ 192.108676][T12534] __x64_sys_recvmmsg+0x17c/0x220 [ 192.113691][T12534] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 192.119311][T12534] ? do_recvmmsg+0x870/0x870 [ 192.123908][T12534] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 192.129615][T12534] ? do_syscall_64+0x1d/0x140 [ 192.134544][T12534] do_syscall_64+0xfe/0x140 [ 192.139051][T12534] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.144929][T12534] RIP: 0033:0x459519 [ 192.148811][T12534] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.168403][T12534] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 192.176803][T12534] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 192.184759][T12534] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 192.192719][T12534] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 192.200679][T12534] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 192.208729][T12534] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 192.216723][T12533] CPU: 0 PID: 12533 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 192.224870][T12533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.224876][T12533] Call Trace: [ 192.224890][T12533] dump_stack+0x1d8/0x2f8 [ 192.224904][T12533] should_fail+0x608/0x860 [ 192.238307][T12533] ? setup_fault_attr+0x2b0/0x2b0 [ 192.238322][T12533] ? sock_kmalloc+0xac/0x120 [ 192.256713][T12533] __should_failslab+0x11a/0x160 [ 192.256726][T12533] ? sock_kmalloc+0xac/0x120 [ 192.256739][T12533] should_failslab+0x9/0x20 [ 192.266220][T12533] __kmalloc+0x7a/0x310 [ 192.266237][T12533] sock_kmalloc+0xac/0x120 [ 192.266248][T12533] af_alg_alloc_areq+0x28/0x180 [ 192.266259][T12533] aead_recvmsg+0x51e/0x1c50 [ 192.266289][T12533] ? aead_sendmsg+0x110/0x110 [ 192.274922][T12533] ? __might_fault+0xf9/0x160 [ 192.274943][T12533] ? kasan_check_write+0x14/0x20 [ 192.274952][T12533] ? _copy_from_user+0xe0/0x120 [ 192.274965][T12533] ? rw_copy_check_uvector+0x2e4/0x310 [ 192.288770][T12533] ? import_iovec+0x17e/0x340 [ 192.288781][T12533] ? __might_fault+0xf9/0x160 [ 192.322698][T12533] ? security_socket_recvmsg+0xa9/0xd0 [ 192.328151][T12533] ? aead_sendmsg+0x110/0x110 [ 192.332821][T12533] sock_recvmsg+0xe7/0x100 [ 192.337235][T12533] ___sys_recvmsg+0x28b/0x9c0 [ 192.341907][T12533] ? __sys_recvmsg+0x250/0x250 [ 192.346672][T12533] ? rcu_lock_release+0xd/0x30 [ 192.351440][T12533] ? rcu_lock_release+0x26/0x30 [ 192.356281][T12533] ? __fget+0x4fe/0x540 [ 192.360439][T12533] ? fget_many+0x30/0x30 [ 192.364673][T12533] ? __mutex_lock_common+0x56b/0x2fc0 [ 192.370042][T12533] ? __fdget+0x17c/0x200 [ 192.374277][T12533] do_recvmmsg+0x33d/0x870 [ 192.378695][T12533] ? __sys_recvmmsg+0x220/0x220 [ 192.383535][T12533] ? kasan_check_write+0x14/0x20 [ 192.388466][T12533] ? __mutex_unlock_slowpath+0x18c/0x630 [ 192.394101][T12533] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 192.399551][T12533] ? retint_kernel+0x2b/0x2b [ 192.404133][T12533] ? trace_hardirqs_on_caller+0x74/0x80 [ 192.409670][T12533] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 192.415384][T12533] __x64_sys_recvmmsg+0x17c/0x220 [ 192.420437][T12533] ? retint_kernel+0x2b/0x2b [ 192.425020][T12533] ? do_recvmmsg+0x870/0x870 [ 192.429602][T12533] ? do_syscall_64+0xc0/0x140 [ 192.434290][T12533] do_syscall_64+0xfe/0x140 [ 192.438795][T12533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.444676][T12533] RIP: 0033:0x459519 [ 192.448566][T12533] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.468161][T12533] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b 23:26:19 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x8848000000000000}}], 0x1, 0x0, 0x0) 23:26:19 executing program 3 (fault-call:6 fault-nth:18): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 192.476562][T12533] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 192.484700][T12533] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 192.492665][T12533] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 192.500627][T12533] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 192.508595][T12533] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:19 executing program 1 (fault-call:6 fault-nth:24): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 192.534957][T12537] Dev loop5: unable to read RDB block 7 [ 192.555645][T12537] loop5: unable to read partition table 23:26:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 192.588187][T12537] loop5: partition table beyond EOD, truncated [ 192.598333][T12542] FAULT_INJECTION: forcing a failure. [ 192.598333][T12542] name failslab, interval 1, probability 0, space 0, times 0 [ 192.606354][T12537] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 192.647572][T12549] FAULT_INJECTION: forcing a failure. [ 192.647572][T12549] name failslab, interval 1, probability 0, space 0, times 0 [ 192.659686][T12542] CPU: 0 PID: 12542 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 192.668241][T12542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.678467][T12542] Call Trace: [ 192.681844][T12542] dump_stack+0x1d8/0x2f8 [ 192.686447][T12542] should_fail+0x608/0x860 [ 192.690868][T12542] ? setup_fault_attr+0x2b0/0x2b0 [ 192.695891][T12542] ? sock_kmalloc+0xac/0x120 [ 192.700482][T12542] __should_failslab+0x11a/0x160 [ 192.705415][T12542] ? sock_kmalloc+0xac/0x120 [ 192.709994][T12542] should_failslab+0x9/0x20 [ 192.714497][T12542] __kmalloc+0x7a/0x310 [ 192.718658][T12542] sock_kmalloc+0xac/0x120 [ 192.723066][T12542] af_alg_alloc_areq+0x28/0x180 [ 192.727905][T12542] aead_recvmsg+0x51e/0x1c50 [ 192.732516][T12542] ? aead_sendmsg+0x110/0x110 [ 192.737195][T12542] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 192.742908][T12542] ? rcu_irq_exit+0x118/0x2b0 [ 192.747582][T12542] ? __might_fault+0xf9/0x160 [ 192.752260][T12542] ? kasan_check_write+0x14/0x20 [ 192.757207][T12542] ? _copy_from_user+0xe0/0x120 [ 192.762072][T12542] ? rw_copy_check_uvector+0x2e4/0x310 [ 192.767708][T12542] ? import_iovec+0x17e/0x340 [ 192.772378][T12542] ? __might_fault+0xf9/0x160 [ 192.777051][T12542] ? security_socket_recvmsg+0xa9/0xd0 [ 192.782509][T12542] ? aead_sendmsg+0x110/0x110 [ 192.787178][T12542] sock_recvmsg+0xe7/0x100 [ 192.791589][T12542] ___sys_recvmsg+0x28b/0x9c0 [ 192.796266][T12542] ? __sys_recvmsg+0x250/0x250 [ 192.801033][T12542] ? rcu_lock_release+0xd/0x30 [ 192.805792][T12542] ? rcu_lock_release+0x26/0x30 [ 192.810802][T12542] ? __fget+0x4fe/0x540 [ 192.814963][T12542] ? fget_many+0x30/0x30 [ 192.819207][T12542] ? trace_hardirqs_on_caller+0x74/0x80 [ 192.824753][T12542] ? __fdget+0x17c/0x200 [ 192.828984][T12542] do_recvmmsg+0x33d/0x870 [ 192.833398][T12542] ? __sys_recvmmsg+0x220/0x220 [ 192.838236][T12542] ? kasan_check_write+0x14/0x20 [ 192.843331][T12542] ? __mutex_unlock_slowpath+0x18c/0x630 [ 192.848956][T12542] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 192.854992][T12542] ? retint_kernel+0x2b/0x2b [ 192.859749][T12542] ? trace_hardirqs_on_caller+0x74/0x80 [ 192.865278][T12542] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 192.870739][T12542] __x64_sys_recvmmsg+0x17c/0x220 [ 192.875759][T12542] ? retint_kernel+0x2b/0x2b [ 192.880344][T12542] ? do_recvmmsg+0x870/0x870 [ 192.884941][T12542] ? do_syscall_64+0xc0/0x140 [ 192.889612][T12542] do_syscall_64+0xfe/0x140 [ 192.894108][T12542] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.899983][T12542] RIP: 0033:0x459519 [ 192.903866][T12542] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 192.923465][T12542] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 192.931878][T12542] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 192.940542][T12542] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 192.948519][T12542] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 192.956495][T12542] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 192.964552][T12542] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 192.984126][T12549] CPU: 1 PID: 12549 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 192.992047][T12549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.002098][T12549] Call Trace: [ 193.005398][T12549] dump_stack+0x1d8/0x2f8 [ 193.009824][T12549] should_fail+0x608/0x860 [ 193.014235][T12549] ? setup_fault_attr+0x2b0/0x2b0 [ 193.019256][T12549] ? sock_kmalloc+0xac/0x120 [ 193.023847][T12549] __should_failslab+0x11a/0x160 [ 193.028777][T12549] ? sock_kmalloc+0xac/0x120 [ 193.033361][T12549] should_failslab+0x9/0x20 [ 193.037857][T12549] __kmalloc+0x7a/0x310 [ 193.042005][T12549] sock_kmalloc+0xac/0x120 [ 193.046503][T12549] af_alg_alloc_areq+0x28/0x180 [ 193.051348][T12549] aead_recvmsg+0x51e/0x1c50 [ 193.055950][T12549] ? aead_sendmsg+0x110/0x110 [ 193.060630][T12549] ? __might_fault+0xf9/0x160 [ 193.065318][T12549] ? kasan_check_write+0x14/0x20 [ 193.070250][T12549] ? _copy_from_user+0xe0/0x120 [ 193.075093][T12549] ? rw_copy_check_uvector+0x2e4/0x310 [ 193.080893][T12549] ? import_iovec+0x17e/0x340 [ 193.085560][T12549] ? __might_fault+0xf9/0x160 [ 193.090236][T12549] ? security_socket_recvmsg+0xa9/0xd0 [ 193.095786][T12549] ? aead_sendmsg+0x110/0x110 [ 193.100457][T12549] sock_recvmsg+0xe7/0x100 [ 193.104875][T12549] ___sys_recvmsg+0x28b/0x9c0 [ 193.111050][T12549] ? __sys_recvmsg+0x250/0x250 [ 193.115817][T12549] ? rcu_lock_release+0xd/0x30 [ 193.120577][T12549] ? rcu_lock_release+0x26/0x30 [ 193.125677][T12549] ? __fget+0x4fe/0x540 [ 193.129828][T12549] ? fget_many+0x30/0x30 [ 193.134064][T12549] ? __mutex_lock_common+0x56b/0x2fc0 [ 193.139441][T12549] ? __fdget+0x17c/0x200 [ 193.143678][T12549] do_recvmmsg+0x33d/0x870 [ 193.148096][T12549] ? __sys_recvmmsg+0x220/0x220 [ 193.152962][T12549] ? kasan_check_write+0x14/0x20 [ 193.158414][T12549] ? __mutex_unlock_slowpath+0x18c/0x630 [ 193.164051][T12549] ? kasan_check_write+0x14/0x20 [ 193.168976][T12549] ? fput_many+0x47/0x1a0 [ 193.173299][T12549] ? check_preemption_disabled+0xb7/0x280 [ 193.179016][T12549] __x64_sys_recvmmsg+0x17c/0x220 [ 193.184055][T12549] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 193.189677][T12549] ? do_recvmmsg+0x870/0x870 [ 193.194259][T12549] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 193.199969][T12549] ? do_syscall_64+0x1d/0x140 [ 193.204643][T12549] do_syscall_64+0xfe/0x140 [ 193.209153][T12549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.215040][T12549] RIP: 0033:0x459519 [ 193.218927][T12549] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.238783][T12549] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 193.247211][T12549] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 193.255175][T12549] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 193.263137][T12549] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 193.271109][T12549] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 193.279074][T12549] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:20 executing program 5: syz_read_part_table(0x1100, 0x0, 0x0) 23:26:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x88a8ffff00000000}}], 0x1, 0x0, 0x0) 23:26:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:20 executing program 3 (fault-call:6 fault-nth:19): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:20 executing program 1 (fault-call:6 fault-nth:25): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xc00e000000000000}}], 0x1, 0x0, 0x0) [ 193.395438][T12562] FAULT_INJECTION: forcing a failure. [ 193.395438][T12562] name failslab, interval 1, probability 0, space 0, times 0 23:26:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 193.440177][T12567] FAULT_INJECTION: forcing a failure. [ 193.440177][T12567] name failslab, interval 1, probability 0, space 0, times 0 [ 193.454658][T12562] CPU: 0 PID: 12562 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 193.462565][T12562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.472620][T12562] Call Trace: [ 193.475914][T12562] dump_stack+0x1d8/0x2f8 [ 193.480249][T12562] should_fail+0x608/0x860 [ 193.484660][T12562] ? setup_fault_attr+0x2b0/0x2b0 [ 193.489692][T12562] ? sock_kmalloc+0xac/0x120 [ 193.494468][T12562] __should_failslab+0x11a/0x160 [ 193.499407][T12562] ? sock_kmalloc+0xac/0x120 [ 193.504075][T12562] should_failslab+0x9/0x20 [ 193.508569][T12562] __kmalloc+0x7a/0x310 [ 193.512721][T12562] sock_kmalloc+0xac/0x120 [ 193.517131][T12562] af_alg_alloc_areq+0x28/0x180 [ 193.521978][T12562] aead_recvmsg+0x51e/0x1c50 [ 193.526582][T12562] ? __bfs+0x550/0x550 [ 193.530653][T12562] ? aead_sendmsg+0x110/0x110 [ 193.535340][T12562] ? __might_fault+0xf9/0x160 [ 193.540019][T12562] ? kasan_check_write+0x14/0x20 [ 193.544948][T12562] ? _copy_from_user+0xe0/0x120 [ 193.549792][T12562] ? rw_copy_check_uvector+0x2e4/0x310 [ 193.555257][T12562] ? import_iovec+0x17e/0x340 [ 193.559927][T12562] ? security_socket_recvmsg+0xa9/0xd0 [ 193.565378][T12562] ? aead_sendmsg+0x110/0x110 [ 193.570045][T12562] sock_recvmsg+0xe7/0x100 [ 193.574454][T12562] ___sys_recvmsg+0x28b/0x9c0 [ 193.579127][T12562] ? __sys_recvmsg+0x250/0x250 [ 193.583889][T12562] ? rcu_lock_release+0xd/0x30 [ 193.588651][T12562] ? rcu_lock_release+0x26/0x30 [ 193.593492][T12562] ? __fget+0x4fe/0x540 [ 193.597648][T12562] ? fget_many+0x30/0x30 [ 193.601883][T12562] ? __mutex_lock_common+0x56b/0x2fc0 [ 193.607254][T12562] ? __fdget+0x17c/0x200 [ 193.611486][T12562] do_recvmmsg+0x33d/0x870 [ 193.615908][T12562] ? __sys_recvmmsg+0x220/0x220 [ 193.620754][T12562] ? kasan_check_write+0x14/0x20 [ 193.625687][T12562] ? __mutex_unlock_slowpath+0x18c/0x630 [ 193.631316][T12562] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 193.636768][T12562] ? retint_kernel+0x2b/0x2b [ 193.641437][T12562] ? trace_hardirqs_on_caller+0x74/0x80 [ 193.646972][T12562] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 193.652427][T12562] __x64_sys_recvmmsg+0x17c/0x220 [ 193.657463][T12562] ? do_recvmmsg+0x870/0x870 [ 193.662051][T12562] do_syscall_64+0xfe/0x140 [ 193.666545][T12562] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.672428][T12562] RIP: 0033:0x459519 [ 193.676312][T12562] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.695907][T12562] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 193.704312][T12562] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 193.712448][T12562] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 193.720411][T12562] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 193.728373][T12562] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 193.736334][T12562] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 193.746053][T12567] CPU: 0 PID: 12567 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 193.753959][T12567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.764007][T12567] Call Trace: [ 193.767297][T12567] dump_stack+0x1d8/0x2f8 [ 193.771625][T12567] should_fail+0x608/0x860 [ 193.776039][T12567] ? setup_fault_attr+0x2b0/0x2b0 [ 193.781060][T12567] ? sock_kmalloc+0xac/0x120 [ 193.785653][T12567] __should_failslab+0x11a/0x160 [ 193.790589][T12567] ? sock_kmalloc+0xac/0x120 [ 193.795171][T12567] should_failslab+0x9/0x20 [ 193.799666][T12567] __kmalloc+0x7a/0x310 [ 193.803821][T12567] sock_kmalloc+0xac/0x120 [ 193.808234][T12567] af_alg_alloc_areq+0x28/0x180 [ 193.813077][T12567] aead_recvmsg+0x51e/0x1c50 [ 193.817681][T12567] ? aead_sendmsg+0x110/0x110 [ 193.822361][T12567] ? __might_fault+0xf9/0x160 [ 193.827045][T12567] ? kasan_check_write+0x14/0x20 [ 193.831979][T12567] ? _copy_from_user+0xe0/0x120 [ 193.836821][T12567] ? rw_copy_check_uvector+0x2e4/0x310 [ 193.842275][T12567] ? import_iovec+0x17e/0x340 [ 193.846941][T12567] ? rcu_irq_exit+0x118/0x2b0 [ 193.851613][T12567] ? security_socket_recvmsg+0xa9/0xd0 [ 193.857061][T12567] ? aead_sendmsg+0x110/0x110 [ 193.861730][T12567] sock_recvmsg+0xe7/0x100 [ 193.866141][T12567] ___sys_recvmsg+0x28b/0x9c0 [ 193.870819][T12567] ? __sys_recvmsg+0x250/0x250 [ 193.875589][T12567] ? rcu_lock_release+0xd/0x30 [ 193.880356][T12567] ? rcu_lock_release+0x26/0x30 [ 193.885202][T12567] ? __fget+0x4fe/0x540 [ 193.889359][T12567] ? fget_many+0x30/0x30 [ 193.893593][T12567] ? __mutex_lock_common+0x56b/0x2fc0 [ 193.898960][T12567] ? __fdget+0x17c/0x200 [ 193.903199][T12567] do_recvmmsg+0x33d/0x870 [ 193.907625][T12567] ? __sys_recvmmsg+0x220/0x220 [ 193.912463][T12567] ? kasan_check_write+0x14/0x20 [ 193.917397][T12567] ? __mutex_unlock_slowpath+0x18c/0x630 [ 193.923025][T12567] ? kasan_check_write+0x14/0x20 [ 193.927950][T12567] ? fput_many+0x47/0x1a0 [ 193.932273][T12567] ? check_preemption_disabled+0xb7/0x280 [ 193.937989][T12567] __x64_sys_recvmmsg+0x17c/0x220 [ 193.943005][T12567] ? do_recvmmsg+0x870/0x870 [ 193.947587][T12567] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 193.959547][T12567] ? do_syscall_64+0x1d/0x140 [ 193.964224][T12567] do_syscall_64+0xfe/0x140 [ 193.968720][T12567] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.974601][T12567] RIP: 0033:0x459519 [ 193.978495][T12567] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 193.998457][T12567] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 194.006862][T12567] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 194.014827][T12567] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 194.022788][T12567] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 194.030752][T12567] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 194.038710][T12567] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:21 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:21 executing program 1 (fault-call:6 fault-nth:26): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:21 executing program 3 (fault-call:6 fault-nth:20): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 194.063023][T12565] Dev loop5: unable to read RDB block 8 [ 194.068797][T12565] loop5: unable to read partition table [ 194.074854][T12565] loop5: partition table beyond EOD, truncated [ 194.087267][T12565] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 194.158427][T12565] Dev loop5: unable to read RDB block 8 [ 194.170637][T12565] loop5: unable to read partition table [ 194.178650][T12565] loop5: partition table beyond EOD, truncated [ 194.198625][T12581] FAULT_INJECTION: forcing a failure. [ 194.198625][T12581] name failslab, interval 1, probability 0, space 0, times 0 [ 194.205740][T12579] FAULT_INJECTION: forcing a failure. [ 194.205740][T12579] name failslab, interval 1, probability 0, space 0, times 0 [ 194.224971][T12565] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 194.232768][T12581] CPU: 1 PID: 12581 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 194.240853][T12581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.250889][T12581] Call Trace: [ 194.254166][T12581] dump_stack+0x1d8/0x2f8 [ 194.258560][T12581] should_fail+0x608/0x860 [ 194.262960][T12581] ? setup_fault_attr+0x2b0/0x2b0 [ 194.267962][T12581] ? sock_kmalloc+0xac/0x120 [ 194.272530][T12581] __should_failslab+0x11a/0x160 [ 194.277444][T12581] ? sock_kmalloc+0xac/0x120 [ 194.282007][T12581] should_failslab+0x9/0x20 [ 194.286497][T12581] __kmalloc+0x7a/0x310 [ 194.290629][T12581] sock_kmalloc+0xac/0x120 [ 194.295022][T12581] af_alg_alloc_areq+0x28/0x180 [ 194.299848][T12581] aead_recvmsg+0x51e/0x1c50 [ 194.304428][T12581] ? aead_sendmsg+0x110/0x110 [ 194.309098][T12581] ? __might_fault+0xf9/0x160 [ 194.313752][T12581] ? kasan_check_write+0x14/0x20 [ 194.318661][T12581] ? _copy_from_user+0xe0/0x120 [ 194.323510][T12581] ? rw_copy_check_uvector+0x2e4/0x310 [ 194.328954][T12581] ? import_iovec+0x17e/0x340 [ 194.333602][T12581] ? __might_fault+0xf9/0x160 [ 194.338257][T12581] ? security_socket_recvmsg+0xa9/0xd0 [ 194.343878][T12581] ? aead_sendmsg+0x110/0x110 [ 194.348615][T12581] sock_recvmsg+0xe7/0x100 [ 194.353010][T12581] ___sys_recvmsg+0x28b/0x9c0 [ 194.357749][T12581] ? __sys_recvmsg+0x250/0x250 [ 194.362493][T12581] ? rcu_lock_release+0xd/0x30 [ 194.367250][T12581] ? rcu_lock_release+0x26/0x30 [ 194.372072][T12581] ? __fget+0x4fe/0x540 [ 194.376203][T12581] ? fget_many+0x30/0x30 [ 194.380419][T12581] ? __mutex_lock_common+0x56b/0x2fc0 [ 194.385764][T12581] ? __fdget+0x17c/0x200 [ 194.389983][T12581] do_recvmmsg+0x33d/0x870 [ 194.394392][T12581] ? __sys_recvmmsg+0x220/0x220 [ 194.399213][T12581] ? kasan_check_write+0x14/0x20 [ 194.404126][T12581] ? __mutex_unlock_slowpath+0x18c/0x630 [ 194.409735][T12581] ? kasan_check_write+0x14/0x20 [ 194.414644][T12581] ? fput_many+0x47/0x1a0 [ 194.418954][T12581] ? check_preemption_disabled+0xb7/0x280 [ 194.424653][T12581] __x64_sys_recvmmsg+0x17c/0x220 [ 194.429655][T12581] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 194.435265][T12581] ? do_recvmmsg+0x870/0x870 [ 194.439916][T12581] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 194.445616][T12581] ? do_syscall_64+0x1d/0x140 [ 194.450273][T12581] do_syscall_64+0xfe/0x140 [ 194.454755][T12581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.460630][T12581] RIP: 0033:0x459519 [ 194.464502][T12581] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.484167][T12581] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 194.492551][T12581] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 194.500499][T12581] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 194.508444][T12581] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 194.516439][T12581] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 194.524387][T12581] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 194.534220][T12579] CPU: 0 PID: 12579 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 194.542121][T12579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.542126][T12579] Call Trace: [ 194.542151][T12579] dump_stack+0x1d8/0x2f8 [ 194.542166][T12579] should_fail+0x608/0x860 [ 194.555566][T12579] ? setup_fault_attr+0x2b0/0x2b0 [ 194.555578][T12579] ? sock_kmalloc+0xac/0x120 [ 194.555595][T12579] __should_failslab+0x11a/0x160 [ 194.555610][T12579] ? sock_kmalloc+0xac/0x120 [ 194.583388][T12579] should_failslab+0x9/0x20 [ 194.587886][T12579] __kmalloc+0x7a/0x310 [ 194.592040][T12579] sock_kmalloc+0xac/0x120 [ 194.596452][T12579] af_alg_alloc_areq+0x28/0x180 [ 194.601299][T12579] aead_recvmsg+0x51e/0x1c50 [ 194.605903][T12579] ? aead_sendmsg+0x110/0x110 [ 194.610575][T12579] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 194.616038][T12579] ? __might_fault+0xf9/0x160 [ 194.620714][T12579] ? kasan_check_write+0x14/0x20 [ 194.625728][T12579] ? _copy_from_user+0xe0/0x120 [ 194.630568][T12579] ? rw_copy_check_uvector+0x2e4/0x310 [ 194.636371][T12579] ? import_iovec+0x17e/0x340 [ 194.641115][T12579] ? __might_fault+0xf9/0x160 [ 194.645788][T12579] ? security_socket_recvmsg+0xa9/0xd0 [ 194.651237][T12579] ? aead_sendmsg+0x110/0x110 [ 194.655913][T12579] sock_recvmsg+0xe7/0x100 [ 194.660352][T12579] ___sys_recvmsg+0x28b/0x9c0 [ 194.665241][T12579] ? __sys_recvmsg+0x250/0x250 [ 194.670182][T12579] ? rcu_lock_release+0xd/0x30 [ 194.674943][T12579] ? rcu_lock_release+0x26/0x30 [ 194.679780][T12579] ? __fget+0x4fe/0x540 [ 194.683931][T12579] ? fget_many+0x30/0x30 [ 194.688174][T12579] ? trace_hardirqs_on_caller+0x74/0x80 [ 194.693716][T12579] ? __fdget+0x17c/0x200 [ 194.698040][T12579] do_recvmmsg+0x33d/0x870 [ 194.702460][T12579] ? __sys_recvmmsg+0x220/0x220 [ 194.707312][T12579] ? kasan_check_write+0x14/0x20 [ 194.712238][T12579] ? __mutex_unlock_slowpath+0x18c/0x630 [ 194.717866][T12579] ? kasan_check_write+0x14/0x20 [ 194.722792][T12579] ? fput_many+0x47/0x1a0 [ 194.727111][T12579] ? check_preemption_disabled+0xb7/0x280 [ 194.732841][T12579] __x64_sys_recvmmsg+0x17c/0x220 [ 194.737854][T12579] ? do_recvmmsg+0x870/0x870 [ 194.742435][T12579] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 194.748235][T12579] ? do_syscall_64+0x1d/0x140 [ 194.752909][T12579] do_syscall_64+0xfe/0x140 [ 194.757417][T12579] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.763301][T12579] RIP: 0033:0x459519 [ 194.767193][T12579] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 194.786871][T12579] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 194.795271][T12579] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 194.803231][T12579] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 194.811189][T12579] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 194.819151][T12579] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 194.827130][T12579] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xc07e000000000000}}], 0x1, 0x0, 0x0) 23:26:22 executing program 5: syz_read_part_table(0x1200, 0x0, 0x0) 23:26:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:22 executing program 1 (fault-call:6 fault-nth:27): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:22 executing program 3 (fault-call:6 fault-nth:21): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 194.958340][T12590] FAULT_INJECTION: forcing a failure. [ 194.958340][T12590] name failslab, interval 1, probability 0, space 0, times 0 [ 194.972150][T12590] CPU: 1 PID: 12590 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 194.980062][T12590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.990552][T12590] Call Trace: [ 194.993844][T12590] dump_stack+0x1d8/0x2f8 [ 194.998173][T12590] should_fail+0x608/0x860 [ 195.002584][T12590] ? setup_fault_attr+0x2b0/0x2b0 23:26:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xd002000000000000}}], 0x1, 0x0, 0x0) [ 195.007611][T12590] ? sock_kmalloc+0xac/0x120 [ 195.012205][T12590] __should_failslab+0x11a/0x160 [ 195.017224][T12590] ? sock_kmalloc+0xac/0x120 [ 195.018797][T12591] FAULT_INJECTION: forcing a failure. [ 195.018797][T12591] name failslab, interval 1, probability 0, space 0, times 0 [ 195.021806][T12590] should_failslab+0x9/0x20 [ 195.021816][T12590] __kmalloc+0x7a/0x310 [ 195.021832][T12590] sock_kmalloc+0xac/0x120 [ 195.021844][T12590] af_alg_alloc_areq+0x28/0x180 [ 195.021856][T12590] aead_recvmsg+0x51e/0x1c50 [ 195.021883][T12590] ? aead_sendmsg+0x110/0x110 [ 195.061690][T12590] ? __might_fault+0xf9/0x160 [ 195.066376][T12590] ? kasan_check_write+0x14/0x20 [ 195.071300][T12590] ? _copy_from_user+0xe0/0x120 [ 195.076147][T12590] ? rw_copy_check_uvector+0x2e4/0x310 [ 195.081609][T12590] ? import_iovec+0x17e/0x340 [ 195.086276][T12590] ? __might_fault+0xf9/0x160 [ 195.090949][T12590] ? security_socket_recvmsg+0xa9/0xd0 [ 195.096400][T12590] ? aead_sendmsg+0x110/0x110 [ 195.101162][T12590] sock_recvmsg+0xe7/0x100 [ 195.105576][T12590] ___sys_recvmsg+0x28b/0x9c0 [ 195.111830][T12590] ? __sys_recvmsg+0x250/0x250 [ 195.116600][T12590] ? rcu_lock_release+0xd/0x30 [ 195.121368][T12590] ? rcu_lock_release+0x26/0x30 [ 195.126206][T12590] ? __fget+0x4fe/0x540 [ 195.130390][T12590] ? fget_many+0x30/0x30 [ 195.134627][T12590] ? __mutex_lock_common+0x56b/0x2fc0 [ 195.139994][T12590] ? __fdget+0x17c/0x200 [ 195.144228][T12590] do_recvmmsg+0x33d/0x870 [ 195.148651][T12590] ? __sys_recvmmsg+0x220/0x220 [ 195.153495][T12590] ? kasan_check_write+0x14/0x20 [ 195.158455][T12590] ? __mutex_unlock_slowpath+0x18c/0x630 [ 195.165019][T12590] ? kasan_check_write+0x14/0x20 [ 195.169956][T12590] ? fput_many+0x47/0x1a0 [ 195.174285][T12590] ? check_preemption_disabled+0xb7/0x280 [ 195.180015][T12590] __x64_sys_recvmmsg+0x17c/0x220 [ 195.185044][T12590] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 195.190701][T12590] ? do_recvmmsg+0x870/0x870 [ 195.195280][T12590] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 195.200994][T12590] ? do_syscall_64+0x1d/0x140 [ 195.205669][T12590] do_syscall_64+0xfe/0x140 [ 195.210166][T12590] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.216532][T12590] RIP: 0033:0x459519 [ 195.220420][T12590] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.240018][T12590] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 195.248421][T12590] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 195.248427][T12590] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 195.248432][T12590] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 195.248437][T12590] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 195.248443][T12590] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 195.267371][T12591] CPU: 1 PID: 12591 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 195.288693][T12591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.288697][T12591] Call Trace: [ 195.288713][T12591] dump_stack+0x1d8/0x2f8 [ 195.288728][T12591] should_fail+0x608/0x860 [ 195.288741][T12591] ? setup_fault_attr+0x2b0/0x2b0 [ 195.288753][T12591] ? sock_kmalloc+0xac/0x120 [ 195.288769][T12591] __should_failslab+0x11a/0x160 [ 195.288778][T12591] ? sock_kmalloc+0xac/0x120 [ 195.288787][T12591] should_failslab+0x9/0x20 [ 195.288795][T12591] __kmalloc+0x7a/0x310 [ 195.288807][T12591] sock_kmalloc+0xac/0x120 [ 195.288816][T12591] af_alg_alloc_areq+0x28/0x180 23:26:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 195.288828][T12591] aead_recvmsg+0x51e/0x1c50 [ 195.306750][T12591] ? __bfs+0x550/0x550 [ 195.306765][T12591] ? aead_sendmsg+0x110/0x110 [ 195.306790][T12591] ? __might_fault+0xf9/0x160 [ 195.306808][T12591] ? kasan_check_write+0x14/0x20 [ 195.306820][T12591] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 195.306832][T12591] ? retint_kernel+0x2b/0x2b [ 195.306842][T12591] ? trace_hardirqs_on_caller+0x74/0x80 [ 195.306851][T12591] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 195.306861][T12591] ? rcu_irq_exit+0x118/0x2b0 [ 195.306875][T12591] ? security_socket_recvmsg+0xa9/0xd0 23:26:22 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0xffffffff00000000}}], 0x1, 0x0, 0x0) 23:26:22 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 195.306882][T12591] ? aead_sendmsg+0x110/0x110 [ 195.306893][T12591] sock_recvmsg+0xe7/0x100 [ 195.306907][T12591] ___sys_recvmsg+0x28b/0x9c0 [ 195.314506][T12591] ? __sys_recvmsg+0x250/0x250 [ 195.314527][T12591] ? rcu_lock_release+0xd/0x30 [ 195.314537][T12591] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 195.314551][T12591] ? retint_kernel+0x2b/0x2b [ 195.314561][T12591] ? trace_hardirqs_on_caller+0x74/0x80 [ 195.314570][T12591] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 195.314586][T12591] ? rcu_irq_exit+0x118/0x2b0 [ 195.314596][T12591] ? retint_kernel+0x2b/0x2b [ 195.314612][T12591] ? __fdget+0x16f/0x200 [ 195.314620][T12591] ? __fdget+0x17c/0x200 [ 195.314631][T12591] do_recvmmsg+0x33d/0x870 [ 195.314650][T12591] ? __sys_recvmmsg+0x220/0x220 [ 195.314666][T12591] ? switch_fpu_return+0x1ca/0x290 [ 195.314678][T12591] ? copy_init_fpstate_to_fpregs+0x150/0x150 [ 195.328649][T12591] ? ksys_write+0x23a/0x2a0 [ 195.328665][T12591] __x64_sys_recvmmsg+0x17c/0x220 [ 195.328677][T12591] ? do_recvmmsg+0x870/0x870 23:26:22 executing program 3 (fault-call:6 fault-nth:22): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:22 executing program 1 (fault-call:6 fault-nth:28): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 195.328688][T12591] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 195.328699][T12591] ? do_syscall_64+0x1d/0x140 [ 195.328713][T12591] do_syscall_64+0xfe/0x140 [ 195.338199][T12591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.346799][T12591] RIP: 0033:0x459519 [ 195.346810][T12591] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.346816][T12591] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 195.346826][T12591] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 195.346832][T12591] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 195.346837][T12591] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 195.346843][T12591] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 195.346849][T12591] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 195.652785][T12613] FAULT_INJECTION: forcing a failure. [ 195.652785][T12613] name failslab, interval 1, probability 0, space 0, times 0 [ 195.667382][T12615] FAULT_INJECTION: forcing a failure. [ 195.667382][T12615] name failslab, interval 1, probability 0, space 0, times 0 [ 195.681101][T12603] Dev loop5: unable to read RDB block 9 [ 195.704485][T12603] loop5: unable to read partition table [ 195.710224][T12603] loop5: partition table beyond EOD, truncated [ 195.727644][T12613] CPU: 1 PID: 12613 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 195.735560][T12613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.735566][T12613] Call Trace: [ 195.735584][T12613] dump_stack+0x1d8/0x2f8 [ 195.735600][T12613] should_fail+0x608/0x860 [ 195.735613][T12613] ? setup_fault_attr+0x2b0/0x2b0 [ 195.735626][T12613] ? sock_kmalloc+0xac/0x120 [ 195.735642][T12613] __should_failslab+0x11a/0x160 [ 195.735652][T12613] ? sock_kmalloc+0xac/0x120 [ 195.735660][T12613] should_failslab+0x9/0x20 [ 195.735669][T12613] __kmalloc+0x7a/0x310 [ 195.735686][T12613] sock_kmalloc+0xac/0x120 [ 195.753315][T12613] af_alg_alloc_areq+0x28/0x180 [ 195.753329][T12613] aead_recvmsg+0x51e/0x1c50 [ 195.753357][T12613] ? aead_sendmsg+0x110/0x110 [ 195.753381][T12613] ? __might_fault+0xf9/0x160 [ 195.753398][T12613] ? kasan_check_write+0x14/0x20 [ 195.753411][T12613] ? _copy_from_user+0xe0/0x120 [ 195.818797][T12613] ? rw_copy_check_uvector+0x2e4/0x310 [ 195.824256][T12613] ? import_iovec+0x17e/0x340 [ 195.828920][T12613] ? __might_fault+0xf9/0x160 [ 195.833597][T12613] ? security_socket_recvmsg+0xa9/0xd0 [ 195.839044][T12613] ? aead_sendmsg+0x110/0x110 [ 195.843717][T12613] sock_recvmsg+0xe7/0x100 [ 195.848130][T12613] ___sys_recvmsg+0x28b/0x9c0 [ 195.852806][T12613] ? __sys_recvmsg+0x250/0x250 [ 195.857675][T12613] ? rcu_lock_release+0xd/0x30 [ 195.862526][T12613] ? rcu_lock_release+0x26/0x30 [ 195.867463][T12613] ? __fget+0x4fe/0x540 [ 195.871621][T12613] ? fget_many+0x30/0x30 [ 195.875857][T12613] ? __mutex_lock_common+0x56b/0x2fc0 [ 195.881222][T12613] ? __fdget+0x17c/0x200 [ 195.885458][T12613] do_recvmmsg+0x33d/0x870 [ 195.889876][T12613] ? __sys_recvmmsg+0x220/0x220 [ 195.894723][T12613] ? kasan_check_write+0x14/0x20 [ 195.899645][T12613] ? __mutex_unlock_slowpath+0x18c/0x630 [ 195.905366][T12613] ? kasan_check_write+0x14/0x20 [ 195.910297][T12613] ? fput_many+0x47/0x1a0 [ 195.914622][T12613] ? check_preemption_disabled+0xb7/0x280 [ 195.920349][T12613] __x64_sys_recvmmsg+0x17c/0x220 [ 195.925373][T12613] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 195.930997][T12613] ? do_recvmmsg+0x870/0x870 [ 195.935580][T12613] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 195.941295][T12613] ? do_syscall_64+0x1d/0x140 [ 195.945970][T12613] do_syscall_64+0xfe/0x140 [ 195.950467][T12613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.956354][T12613] RIP: 0033:0x459519 [ 195.960239][T12613] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 195.979835][T12613] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 195.988247][T12613] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 195.996210][T12613] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 196.004173][T12613] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 196.012139][T12613] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 196.020191][T12613] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 196.028199][T12615] CPU: 0 PID: 12615 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 196.029425][T12603] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 196.036084][T12615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.036089][T12615] Call Trace: [ 196.036106][T12615] dump_stack+0x1d8/0x2f8 [ 196.036120][T12615] should_fail+0x608/0x860 [ 196.036131][T12615] ? setup_fault_attr+0x2b0/0x2b0 [ 196.036141][T12615] ? sock_kmalloc+0xac/0x120 [ 196.036157][T12615] __should_failslab+0x11a/0x160 [ 196.080650][T12615] ? sock_kmalloc+0xac/0x120 [ 196.085230][T12615] should_failslab+0x9/0x20 [ 196.089722][T12615] __kmalloc+0x7a/0x310 [ 196.093873][T12615] sock_kmalloc+0xac/0x120 [ 196.098283][T12615] af_alg_alloc_areq+0x28/0x180 [ 196.103125][T12615] aead_recvmsg+0x51e/0x1c50 [ 196.107730][T12615] ? aead_sendmsg+0x110/0x110 [ 196.112412][T12615] ? __might_fault+0xf9/0x160 [ 196.117089][T12615] ? kasan_check_write+0x14/0x20 [ 196.122019][T12615] ? _copy_from_user+0xe0/0x120 [ 196.126862][T12615] ? rw_copy_check_uvector+0x2e4/0x310 [ 196.132317][T12615] ? import_iovec+0x17e/0x340 [ 196.136985][T12615] ? __might_fault+0xf9/0x160 [ 196.141668][T12615] ? security_socket_recvmsg+0xa9/0xd0 [ 196.147115][T12615] ? aead_sendmsg+0x110/0x110 [ 196.151781][T12615] sock_recvmsg+0xe7/0x100 [ 196.156197][T12615] ___sys_recvmsg+0x28b/0x9c0 [ 196.160870][T12615] ? __sys_recvmsg+0x250/0x250 [ 196.165633][T12615] ? rcu_lock_release+0xd/0x30 [ 196.170397][T12615] ? rcu_lock_release+0x26/0x30 [ 196.175234][T12615] ? __fget+0x4fe/0x540 [ 196.179385][T12615] ? fget_many+0x30/0x30 [ 196.183623][T12615] ? __mutex_lock_common+0x56b/0x2fc0 [ 196.188991][T12615] ? __fdget+0x17c/0x200 [ 196.193240][T12615] do_recvmmsg+0x33d/0x870 [ 196.197662][T12615] ? __sys_recvmmsg+0x220/0x220 [ 196.202675][T12615] ? kasan_check_write+0x14/0x20 [ 196.207598][T12615] ? __mutex_unlock_slowpath+0x18c/0x630 [ 196.213226][T12615] ? kasan_check_write+0x14/0x20 [ 196.218150][T12615] ? fput_many+0x47/0x1a0 [ 196.222472][T12615] ? check_preemption_disabled+0xb7/0x280 [ 196.228189][T12615] __x64_sys_recvmmsg+0x17c/0x220 [ 196.233214][T12615] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 196.238840][T12615] ? do_recvmmsg+0x870/0x870 [ 196.243418][T12615] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 196.249127][T12615] ? do_syscall_64+0x1d/0x140 [ 196.253799][T12615] do_syscall_64+0xfe/0x140 [ 196.258293][T12615] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.264172][T12615] RIP: 0033:0x459519 [ 196.268060][T12615] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 196.287652][T12615] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 196.296061][T12615] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 23:26:23 executing program 5: syz_read_part_table(0x1f00, 0x0, 0x0) 23:26:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}], 0x1, 0x0, 0x0) 23:26:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:23 executing program 1 (fault-call:6 fault-nth:29): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:23 executing program 3 (fault-call:6 fault-nth:23): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 196.304024][T12615] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 196.311990][T12615] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 196.319953][T12615] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 196.327914][T12615] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 196.418542][T12623] FAULT_INJECTION: forcing a failure. [ 196.418542][T12623] name failslab, interval 1, probability 0, space 0, times 0 [ 196.471599][T12628] FAULT_INJECTION: forcing a failure. [ 196.471599][T12628] name failslab, interval 1, probability 0, space 0, times 0 [ 196.471655][T12623] CPU: 0 PID: 12623 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 196.492647][T12623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.502786][T12623] Call Trace: [ 196.506075][T12623] dump_stack+0x1d8/0x2f8 [ 196.510404][T12623] should_fail+0x608/0x860 [ 196.514814][T12623] ? setup_fault_attr+0x2b0/0x2b0 [ 196.519832][T12623] ? sock_kmalloc+0xac/0x120 [ 196.524419][T12623] __should_failslab+0x11a/0x160 [ 196.529348][T12623] ? sock_kmalloc+0xac/0x120 [ 196.533939][T12623] should_failslab+0x9/0x20 [ 196.538436][T12623] __kmalloc+0x7a/0x310 [ 196.542590][T12623] sock_kmalloc+0xac/0x120 [ 196.547084][T12623] af_alg_alloc_areq+0x28/0x180 [ 196.552193][T12623] aead_recvmsg+0x51e/0x1c50 [ 196.556794][T12623] ? aead_sendmsg+0x110/0x110 [ 196.561560][T12623] ? __might_fault+0xf9/0x160 [ 196.566234][T12623] ? kasan_check_write+0x14/0x20 [ 196.571165][T12623] ? _copy_from_user+0xe0/0x120 [ 196.576008][T12623] ? rw_copy_check_uvector+0x2e4/0x310 [ 196.581455][T12623] ? import_iovec+0x17e/0x340 [ 196.586125][T12623] ? security_socket_recvmsg+0xa9/0xd0 [ 196.591571][T12623] ? aead_sendmsg+0x110/0x110 [ 196.596245][T12623] sock_recvmsg+0xe7/0x100 [ 196.600650][T12623] ___sys_recvmsg+0x28b/0x9c0 [ 196.605319][T12623] ? __sys_recvmsg+0x250/0x250 [ 196.610078][T12623] ? rcu_lock_release+0xd/0x30 [ 196.614829][T12623] ? rcu_lock_release+0x26/0x30 [ 196.619669][T12623] ? __fget+0x4fe/0x540 [ 196.623822][T12623] ? fget_many+0x30/0x30 [ 196.628051][T12623] ? retint_kernel+0x2b/0x2b [ 196.632655][T12623] ? trace_hardirqs_on_caller+0x74/0x80 [ 196.638190][T12623] ? __fdget+0x17c/0x200 [ 196.642431][T12623] do_recvmmsg+0x33d/0x870 [ 196.646846][T12623] ? __sys_recvmmsg+0x220/0x220 [ 196.651684][T12623] ? kasan_check_write+0x14/0x20 [ 196.656626][T12623] ? __mutex_unlock_slowpath+0x18c/0x630 [ 196.662265][T12623] ? kasan_check_write+0x14/0x20 [ 196.667200][T12623] ? fput_many+0x47/0x1a0 [ 196.671522][T12623] ? check_preemption_disabled+0xb7/0x280 [ 196.677249][T12623] __x64_sys_recvmmsg+0x17c/0x220 [ 196.682266][T12623] ? do_recvmmsg+0x870/0x870 [ 196.686846][T12623] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 196.692547][T12623] ? do_syscall_64+0x1d/0x140 [ 196.697219][T12623] do_syscall_64+0xfe/0x140 [ 196.701722][T12623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.707608][T12623] RIP: 0033:0x459519 [ 196.711490][T12623] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 196.731175][T12623] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 196.739573][T12623] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 196.747536][T12623] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 196.755503][T12623] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 196.763470][T12623] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 23:26:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) 23:26:24 executing program 1 (fault-call:6 fault-nth:30): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 196.771429][T12623] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 196.779901][T12628] CPU: 1 PID: 12628 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 196.787792][T12628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.797860][T12628] Call Trace: [ 196.801157][T12628] dump_stack+0x1d8/0x2f8 [ 196.805493][T12628] should_fail+0x608/0x860 [ 196.809907][T12628] ? setup_fault_attr+0x2b0/0x2b0 [ 196.814933][T12628] ? sock_kmalloc+0xac/0x120 [ 196.819528][T12628] __should_failslab+0x11a/0x160 [ 196.824476][T12628] ? sock_kmalloc+0xac/0x120 [ 196.829063][T12628] should_failslab+0x9/0x20 [ 196.833556][T12628] __kmalloc+0x7a/0x310 [ 196.838418][T12628] sock_kmalloc+0xac/0x120 [ 196.842833][T12628] af_alg_alloc_areq+0x28/0x180 [ 196.847676][T12628] aead_recvmsg+0x51e/0x1c50 [ 196.852282][T12628] ? aead_sendmsg+0x110/0x110 [ 196.856967][T12628] ? __might_fault+0xf9/0x160 [ 196.861643][T12628] ? kasan_check_write+0x14/0x20 [ 196.866569][T12628] ? _copy_from_user+0xe0/0x120 [ 196.871413][T12628] ? rw_copy_check_uvector+0x2e4/0x310 [ 196.876885][T12628] ? import_iovec+0x17e/0x340 [ 196.881553][T12628] ? __might_fault+0xf9/0x160 [ 196.886226][T12628] ? security_socket_recvmsg+0xa9/0xd0 [ 196.891675][T12628] ? aead_sendmsg+0x110/0x110 [ 196.896346][T12628] sock_recvmsg+0xe7/0x100 [ 196.900934][T12628] ___sys_recvmsg+0x28b/0x9c0 [ 196.905612][T12628] ? __sys_recvmsg+0x250/0x250 [ 196.910375][T12628] ? rcu_lock_release+0xd/0x30 [ 196.915140][T12628] ? rcu_lock_release+0x26/0x30 [ 196.919984][T12628] ? __fget+0x4fe/0x540 [ 196.924145][T12628] ? fget_many+0x30/0x30 [ 196.928384][T12628] ? __mutex_lock_common+0x56b/0x2fc0 [ 196.933763][T12628] ? __fdget+0x17c/0x200 [ 196.938089][T12628] do_recvmmsg+0x33d/0x870 [ 196.943261][T12628] ? __sys_recvmmsg+0x220/0x220 [ 196.948104][T12628] ? kasan_check_write+0x14/0x20 [ 196.953034][T12628] ? __mutex_unlock_slowpath+0x18c/0x630 [ 196.958667][T12628] ? kasan_check_write+0x14/0x20 [ 196.963597][T12628] ? fput_many+0x47/0x1a0 [ 196.967924][T12628] ? check_preemption_disabled+0xb7/0x280 [ 196.973728][T12628] __x64_sys_recvmmsg+0x17c/0x220 [ 196.978751][T12628] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 196.984727][T12628] ? do_recvmmsg+0x870/0x870 [ 196.989307][T12628] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 196.995021][T12628] ? do_syscall_64+0x1d/0x140 [ 196.999697][T12628] do_syscall_64+0xfe/0x140 [ 197.004195][T12628] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.010076][T12628] RIP: 0033:0x459519 [ 197.013963][T12628] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.033564][T12628] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 197.041966][T12628] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 197.049927][T12628] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 197.057888][T12628] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 197.065852][T12628] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 197.073813][T12628] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 197.099107][T12629] Dev loop5: unable to read RDB block 15 [ 197.113357][T12629] loop5: unable to read partition table 23:26:24 executing program 3 (fault-call:6 fault-nth:24): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:24 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}], 0x1, 0x0, 0x0) [ 197.129816][T12629] loop5: partition table beyond EOD, truncated [ 197.153374][T12629] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 197.203760][T12642] FAULT_INJECTION: forcing a failure. [ 197.203760][T12642] name failslab, interval 1, probability 0, space 0, times 0 [ 197.227222][T12639] FAULT_INJECTION: forcing a failure. [ 197.227222][T12639] name failslab, interval 1, probability 0, space 0, times 0 [ 197.237985][T12642] CPU: 1 PID: 12642 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 197.247739][T12642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.257796][T12642] Call Trace: [ 197.261090][T12642] dump_stack+0x1d8/0x2f8 [ 197.265428][T12642] should_fail+0x608/0x860 [ 197.269842][T12642] ? setup_fault_attr+0x2b0/0x2b0 [ 197.274861][T12642] ? sock_kmalloc+0xac/0x120 [ 197.279449][T12642] __should_failslab+0x11a/0x160 [ 197.284382][T12642] ? sock_kmalloc+0xac/0x120 [ 197.288977][T12642] should_failslab+0x9/0x20 [ 197.293469][T12642] __kmalloc+0x7a/0x310 [ 197.297626][T12642] sock_kmalloc+0xac/0x120 [ 197.302035][T12642] af_alg_alloc_areq+0x28/0x180 [ 197.306881][T12642] aead_recvmsg+0x51e/0x1c50 [ 197.311483][T12642] ? aead_sendmsg+0x110/0x110 [ 197.316166][T12642] ? __might_fault+0xf9/0x160 [ 197.320844][T12642] ? kasan_check_write+0x14/0x20 [ 197.325775][T12642] ? _copy_from_user+0xe0/0x120 [ 197.330620][T12642] ? rw_copy_check_uvector+0x2e4/0x310 [ 197.336090][T12642] ? import_iovec+0x17e/0x340 [ 197.340753][T12642] ? __might_fault+0xf9/0x160 [ 197.345427][T12642] ? security_socket_recvmsg+0xa9/0xd0 [ 197.350876][T12642] ? aead_sendmsg+0x110/0x110 [ 197.355550][T12642] sock_recvmsg+0xe7/0x100 [ 197.359962][T12642] ___sys_recvmsg+0x28b/0x9c0 [ 197.364637][T12642] ? __sys_recvmsg+0x250/0x250 [ 197.369402][T12642] ? rcu_lock_release+0xd/0x30 [ 197.374159][T12642] ? rcu_lock_release+0x26/0x30 [ 197.378999][T12642] ? __fget+0x4fe/0x540 [ 197.383148][T12642] ? fget_many+0x30/0x30 [ 197.387381][T12642] ? __mutex_lock_common+0x56b/0x2fc0 [ 197.392749][T12642] ? __fdget+0x17c/0x200 [ 197.396983][T12642] do_recvmmsg+0x33d/0x870 [ 197.401404][T12642] ? __sys_recvmmsg+0x220/0x220 [ 197.406373][T12642] ? kasan_check_write+0x14/0x20 [ 197.411302][T12642] ? __mutex_unlock_slowpath+0x18c/0x630 [ 197.416931][T12642] ? kasan_check_write+0x14/0x20 [ 197.421855][T12642] ? fput_many+0x47/0x1a0 [ 197.426178][T12642] ? check_preemption_disabled+0xb7/0x280 [ 197.431899][T12642] __x64_sys_recvmmsg+0x17c/0x220 [ 197.436929][T12642] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 197.442550][T12642] ? do_recvmmsg+0x870/0x870 [ 197.447797][T12642] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 197.453517][T12642] ? do_syscall_64+0x1d/0x140 [ 197.458198][T12642] do_syscall_64+0xfe/0x140 [ 197.462697][T12642] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.468577][T12642] RIP: 0033:0x459519 [ 197.472461][T12642] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.492102][T12642] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 197.500506][T12642] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 197.508473][T12642] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 197.517137][T12642] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 197.525102][T12642] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 197.533066][T12642] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 197.541052][T12639] CPU: 0 PID: 12639 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 197.548944][T12639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.559000][T12639] Call Trace: [ 197.562296][T12639] dump_stack+0x1d8/0x2f8 [ 197.566630][T12639] should_fail+0x608/0x860 [ 197.571050][T12639] ? setup_fault_attr+0x2b0/0x2b0 [ 197.576080][T12639] ? sock_kmalloc+0xac/0x120 [ 197.580670][T12639] __should_failslab+0x11a/0x160 [ 197.585606][T12639] ? sock_kmalloc+0xac/0x120 [ 197.590184][T12639] should_failslab+0x9/0x20 [ 197.594677][T12639] __kmalloc+0x7a/0x310 [ 197.598913][T12639] sock_kmalloc+0xac/0x120 [ 197.603333][T12639] af_alg_alloc_areq+0x28/0x180 [ 197.608193][T12639] aead_recvmsg+0x51e/0x1c50 [ 197.612796][T12639] ? aead_sendmsg+0x110/0x110 [ 197.617564][T12639] ? __might_fault+0xf9/0x160 [ 197.622237][T12639] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.627689][T12639] ? retint_kernel+0x2b/0x2b [ 197.632267][T12639] ? trace_hardirqs_on_caller+0x74/0x80 [ 197.637798][T12639] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.643336][T12639] ? rcu_irq_exit+0x118/0x2b0 [ 197.648003][T12639] ? retint_kernel+0x2b/0x2b [ 197.652585][T12639] ? aead_sendmsg+0x110/0x110 [ 197.657256][T12639] ? aead_sendmsg+0x110/0x110 [ 197.662014][T12639] sock_recvmsg+0xe7/0x100 [ 197.666423][T12639] ___sys_recvmsg+0x28b/0x9c0 [ 197.671099][T12639] ? __sys_recvmsg+0x250/0x250 [ 197.675863][T12639] ? rcu_lock_release+0xd/0x30 [ 197.680624][T12639] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.686076][T12639] ? retint_kernel+0x2b/0x2b [ 197.690655][T12639] ? trace_hardirqs_on_caller+0x74/0x80 [ 197.696189][T12639] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 197.701641][T12639] ? rcu_irq_exit+0x118/0x2b0 [ 197.706308][T12639] ? retint_kernel+0x2b/0x2b [ 197.710906][T12639] do_recvmmsg+0x33d/0x870 [ 197.715323][T12639] ? __sys_recvmmsg+0x220/0x220 [ 197.720165][T12639] ? kasan_check_write+0x14/0x20 [ 197.725274][T12639] ? __mutex_unlock_slowpath+0x18c/0x630 [ 197.730916][T12639] ? kasan_check_write+0x14/0x20 [ 197.735970][T12639] ? fput_many+0x47/0x1a0 [ 197.740312][T12639] ? check_preemption_disabled+0xb7/0x280 [ 197.746032][T12639] __x64_sys_recvmmsg+0x17c/0x220 [ 197.751045][T12639] ? do_recvmmsg+0x870/0x870 [ 197.755623][T12639] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 197.761417][T12639] ? do_syscall_64+0x1d/0x140 [ 197.766093][T12639] do_syscall_64+0xfe/0x140 [ 197.770590][T12639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.776472][T12639] RIP: 0033:0x459519 [ 197.780355][T12639] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 197.800085][T12639] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 197.808485][T12639] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 197.816451][T12639] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 197.824411][T12639] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 197.832559][T12639] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 197.840518][T12639] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 197.867083][T12629] Dev loop5: unable to read RDB block 15 [ 197.875091][T12629] loop5: unable to read partition table [ 197.886410][T12629] loop5: partition table beyond EOD, truncated [ 197.902104][T12629] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:26:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:25 executing program 5: syz_read_part_table(0x2000, 0x0, 0x0) 23:26:25 executing program 3 (fault-call:6 fault-nth:25): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}], 0x1, 0x0, 0x0) 23:26:25 executing program 1 (fault-call:6 fault-nth:31): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d0400000028", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}], 0x1, 0x0, 0x0) 23:26:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 198.067831][T12655] FAULT_INJECTION: forcing a failure. [ 198.067831][T12655] name failslab, interval 1, probability 0, space 0, times 0 [ 198.106685][T12656] FAULT_INJECTION: forcing a failure. 23:26:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 198.106685][T12656] name failslab, interval 1, probability 0, space 0, times 0 [ 198.127837][T12655] CPU: 1 PID: 12655 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 198.135761][T12655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.145809][T12655] Call Trace: [ 198.149095][T12655] dump_stack+0x1d8/0x2f8 [ 198.153421][T12655] should_fail+0x608/0x860 [ 198.157832][T12655] ? setup_fault_attr+0x2b0/0x2b0 [ 198.162858][T12655] ? sock_kmalloc+0xac/0x120 23:26:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xa}}], 0x1, 0x0, 0x0) [ 198.167448][T12655] __should_failslab+0x11a/0x160 [ 198.172476][T12655] ? sock_kmalloc+0xac/0x120 [ 198.177063][T12655] should_failslab+0x9/0x20 [ 198.181562][T12655] __kmalloc+0x7a/0x310 [ 198.185718][T12655] sock_kmalloc+0xac/0x120 [ 198.190126][T12655] af_alg_alloc_areq+0x28/0x180 [ 198.194973][T12655] aead_recvmsg+0x51e/0x1c50 [ 198.199577][T12655] ? trace_lock_acquire+0x190/0x190 [ 198.204767][T12655] ? aead_sendmsg+0x110/0x110 [ 198.209470][T12655] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.214946][T12655] ? retint_kernel+0x2b/0x2b [ 198.219528][T12655] ? trace_hardirqs_on_caller+0x74/0x80 [ 198.225070][T12655] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.230519][T12655] ? rcu_irq_exit+0x118/0x2b0 [ 198.235190][T12655] ? retint_kernel+0x2b/0x2b [ 198.239772][T12655] ? import_iovec+0x12a/0x340 [ 198.244441][T12655] ? import_iovec+0x162/0x340 [ 198.249106][T12655] ? import_iovec+0x17e/0x340 [ 198.253775][T12655] ? security_socket_recvmsg+0xa9/0xd0 [ 198.259309][T12655] ? aead_sendmsg+0x110/0x110 [ 198.263981][T12655] sock_recvmsg+0xe7/0x100 [ 198.268395][T12655] ___sys_recvmsg+0x28b/0x9c0 [ 198.273070][T12655] ? __sys_recvmsg+0x250/0x250 [ 198.277834][T12655] ? rcu_lock_release+0xd/0x30 [ 198.282595][T12655] ? rcu_lock_release+0x26/0x30 [ 198.287437][T12655] ? __fget+0x4fe/0x540 [ 198.291584][T12655] ? fget_many+0x30/0x30 [ 198.295817][T12655] ? trace_hardirqs_on_caller+0x74/0x80 [ 198.301366][T12655] ? __fdget+0x17c/0x200 [ 198.305601][T12655] do_recvmmsg+0x33d/0x870 [ 198.310018][T12655] ? __sys_recvmmsg+0x220/0x220 [ 198.314860][T12655] ? kasan_check_write+0x14/0x20 [ 198.319790][T12655] ? __mutex_unlock_slowpath+0x18c/0x630 [ 198.325419][T12655] ? kasan_check_write+0x14/0x20 [ 198.330432][T12655] ? fput_many+0x47/0x1a0 [ 198.334756][T12655] ? check_preemption_disabled+0xb7/0x280 [ 198.340476][T12655] __x64_sys_recvmmsg+0x17c/0x220 [ 198.345953][T12655] ? do_recvmmsg+0x870/0x870 [ 198.350718][T12655] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 198.356427][T12655] ? do_syscall_64+0x1d/0x140 [ 198.361095][T12655] do_syscall_64+0xfe/0x140 [ 198.365780][T12655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.371923][T12655] RIP: 0033:0x459519 [ 198.375811][T12655] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 198.395428][T12655] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 198.403830][T12655] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 198.411790][T12655] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 198.419850][T12655] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 198.427816][T12655] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 198.435777][T12655] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 198.443856][T12656] CPU: 0 PID: 12656 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 198.446718][T12660] loop5: unable to read partition table [ 198.451747][T12656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.451752][T12656] Call Trace: [ 198.451769][T12656] dump_stack+0x1d8/0x2f8 [ 198.451785][T12656] should_fail+0x608/0x860 [ 198.451800][T12656] ? setup_fault_attr+0x2b0/0x2b0 [ 198.466353][T12660] loop5: partition table beyond EOD, truncated [ 198.467637][T12656] ? sock_kmalloc+0xac/0x120 [ 198.467656][T12656] __should_failslab+0x11a/0x160 [ 198.467666][T12656] ? sock_kmalloc+0xac/0x120 [ 198.467681][T12656] should_failslab+0x9/0x20 [ 198.473096][T12660] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 198.475259][T12656] __kmalloc+0x7a/0x310 [ 198.475276][T12656] sock_kmalloc+0xac/0x120 [ 198.475287][T12656] af_alg_alloc_areq+0x28/0x180 [ 198.475299][T12656] aead_recvmsg+0x51e/0x1c50 [ 198.500435][T12656] ? aead_sendmsg+0x110/0x110 [ 198.500458][T12656] ? __might_fault+0xf9/0x160 [ 198.517505][T12656] ? kasan_check_write+0x14/0x20 [ 198.517524][T12656] ? _copy_from_user+0xe0/0x120 [ 198.555066][T12656] ? rw_copy_check_uvector+0x2e4/0x310 [ 198.560523][T12656] ? import_iovec+0x17e/0x340 [ 198.565188][T12656] ? __might_fault+0xf9/0x160 [ 198.569862][T12656] ? security_socket_recvmsg+0xa9/0xd0 [ 198.575308][T12656] ? aead_sendmsg+0x110/0x110 [ 198.579981][T12656] sock_recvmsg+0xe7/0x100 [ 198.584424][T12656] ___sys_recvmsg+0x28b/0x9c0 [ 198.589112][T12656] ? __sys_recvmsg+0x250/0x250 [ 198.594060][T12656] ? rcu_lock_release+0xd/0x30 [ 198.598826][T12656] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.604279][T12656] ? trace_hardirqs_on_caller+0x74/0x80 [ 198.609868][T12656] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 198.615342][T12656] ? rcu_irq_exit+0x118/0x2b0 [ 198.620103][T12656] ? retint_kernel+0x2b/0x2b [ 198.624884][T12656] do_recvmmsg+0x33d/0x870 [ 198.629308][T12656] ? __sys_recvmmsg+0x220/0x220 [ 198.634148][T12656] ? kasan_check_write+0x14/0x20 [ 198.639076][T12656] ? __mutex_unlock_slowpath+0x18c/0x630 [ 198.644704][T12656] ? kasan_check_write+0x14/0x20 [ 198.649627][T12656] ? fput_many+0x47/0x1a0 [ 198.653948][T12656] ? check_preemption_disabled+0xb7/0x280 [ 198.659663][T12656] __x64_sys_recvmmsg+0x17c/0x220 [ 198.664769][T12656] ? do_recvmmsg+0x870/0x870 [ 198.669352][T12656] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 198.675063][T12656] ? do_syscall_64+0x1d/0x140 [ 198.679824][T12656] do_syscall_64+0xfe/0x140 [ 198.684324][T12656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.690220][T12656] RIP: 0033:0x459519 [ 198.694110][T12656] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:26:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:25 executing program 3 (fault-call:6 fault-nth:26): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 198.713706][T12656] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 198.722454][T12656] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 198.731118][T12656] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 198.739101][T12656] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 198.747068][T12656] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 198.755031][T12656] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:26 executing program 1 (fault-call:6 fault-nth:32): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 198.845595][T12673] FAULT_INJECTION: forcing a failure. [ 198.845595][T12673] name failslab, interval 1, probability 0, space 0, times 0 [ 198.881091][T12673] CPU: 1 PID: 12673 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 198.889018][T12673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.899075][T12673] Call Trace: [ 198.902380][T12673] dump_stack+0x1d8/0x2f8 [ 198.906712][T12673] should_fail+0x608/0x860 [ 198.911132][T12673] ? setup_fault_attr+0x2b0/0x2b0 [ 198.916153][T12673] ? sock_kmalloc+0xac/0x120 [ 198.920752][T12673] __should_failslab+0x11a/0x160 [ 198.925689][T12673] ? sock_kmalloc+0xac/0x120 [ 198.930293][T12673] should_failslab+0x9/0x20 [ 198.934800][T12673] __kmalloc+0x7a/0x310 [ 198.938956][T12673] sock_kmalloc+0xac/0x120 [ 198.944117][T12673] af_alg_alloc_areq+0x28/0x180 [ 198.948961][T12673] aead_recvmsg+0x51e/0x1c50 [ 198.953574][T12673] ? aead_sendmsg+0x110/0x110 [ 198.958255][T12673] ? __might_fault+0xf9/0x160 [ 198.960382][T12681] FAULT_INJECTION: forcing a failure. [ 198.960382][T12681] name failslab, interval 1, probability 0, space 0, times 0 [ 198.962950][T12673] ? kasan_check_write+0x14/0x20 [ 198.962959][T12673] ? _copy_from_user+0xe0/0x120 [ 198.962972][T12673] ? rw_copy_check_uvector+0x2e4/0x310 [ 198.962988][T12673] ? import_iovec+0x17e/0x340 [ 198.962996][T12673] ? __might_fault+0xf9/0x160 [ 198.963010][T12673] ? security_socket_recvmsg+0xa9/0xd0 [ 198.963018][T12673] ? aead_sendmsg+0x110/0x110 [ 198.963030][T12673] sock_recvmsg+0xe7/0x100 [ 198.963044][T12673] ___sys_recvmsg+0x28b/0x9c0 [ 198.963061][T12673] ? __sys_recvmsg+0x250/0x250 [ 198.963080][T12673] ? rcu_lock_release+0xd/0x30 [ 198.963095][T12673] ? rcu_lock_release+0x26/0x30 [ 198.963112][T12673] ? __fget+0x4fe/0x540 [ 199.037741][T12673] ? fget_many+0x30/0x30 [ 199.041975][T12673] ? __mutex_lock_common+0x56b/0x2fc0 [ 199.047343][T12673] ? __fdget+0x17c/0x200 [ 199.051575][T12673] do_recvmmsg+0x33d/0x870 [ 199.055990][T12673] ? __sys_recvmmsg+0x220/0x220 [ 199.060833][T12673] ? kasan_check_write+0x14/0x20 [ 199.065845][T12673] ? __mutex_unlock_slowpath+0x18c/0x630 [ 199.071471][T12673] ? kasan_check_write+0x14/0x20 [ 199.076396][T12673] ? fput_many+0x47/0x1a0 [ 199.080716][T12673] ? check_preemption_disabled+0xb7/0x280 [ 199.086429][T12673] __x64_sys_recvmmsg+0x17c/0x220 [ 199.091445][T12673] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 199.097071][T12673] ? do_recvmmsg+0x870/0x870 [ 199.101649][T12673] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 199.108867][T12673] ? do_syscall_64+0x1d/0x140 [ 199.113545][T12673] do_syscall_64+0xfe/0x140 [ 199.118044][T12673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.123927][T12673] RIP: 0033:0x459519 [ 199.127819][T12673] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.147419][T12673] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 199.155821][T12673] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 199.163788][T12673] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 199.171748][T12673] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 199.179709][T12673] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 199.187669][T12673] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 199.197990][T12681] CPU: 1 PID: 12681 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 199.205978][T12681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.216024][T12681] Call Trace: [ 199.219310][T12681] dump_stack+0x1d8/0x2f8 [ 199.223635][T12681] should_fail+0x608/0x860 [ 199.228050][T12681] ? setup_fault_attr+0x2b0/0x2b0 [ 199.233095][T12681] ? __should_failslab+0xb0/0x160 [ 199.238108][T12681] ? __should_failslab+0xf1/0x160 [ 199.243126][T12681] __should_failslab+0x11a/0x160 [ 199.248055][T12681] ? sock_kmalloc+0xac/0x120 [ 199.252638][T12681] should_failslab+0x9/0x20 [ 199.257134][T12681] __kmalloc+0x7a/0x310 [ 199.261284][T12681] sock_kmalloc+0xac/0x120 [ 199.265695][T12681] af_alg_alloc_areq+0x28/0x180 [ 199.270539][T12681] aead_recvmsg+0x51e/0x1c50 [ 199.275139][T12681] ? aead_sendmsg+0x110/0x110 [ 199.279821][T12681] ? __might_fault+0xf9/0x160 [ 199.284498][T12681] ? kasan_check_write+0x14/0x20 [ 199.289429][T12681] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 199.294886][T12681] ? retint_kernel+0x2b/0x2b [ 199.299470][T12681] ? trace_hardirqs_on_caller+0x74/0x80 [ 199.305013][T12681] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 199.310468][T12681] ? rcu_irq_exit+0x118/0x2b0 [ 199.315141][T12681] ? security_socket_recvmsg+0xa9/0xd0 [ 199.320588][T12681] ? aead_sendmsg+0x110/0x110 [ 199.325258][T12681] sock_recvmsg+0xe7/0x100 [ 199.329668][T12681] ___sys_recvmsg+0x28b/0x9c0 [ 199.334517][T12681] ? __sys_recvmsg+0x250/0x250 [ 199.339279][T12681] ? rcu_lock_release+0xd/0x30 [ 199.344047][T12681] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 199.349503][T12681] ? trace_hardirqs_on_caller+0x74/0x80 [ 199.355042][T12681] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 199.360492][T12681] ? rcu_irq_exit+0x118/0x2b0 [ 199.365162][T12681] ? retint_kernel+0x2b/0x2b [ 199.369753][T12681] do_recvmmsg+0x33d/0x870 [ 199.374171][T12681] ? __sys_recvmmsg+0x220/0x220 [ 199.379014][T12681] ? rcu_irq_exit+0x118/0x2b0 [ 199.383688][T12681] ? kasan_check_write+0x14/0x20 [ 199.388619][T12681] ? fput_many+0x47/0x1a0 [ 199.392940][T12681] ? check_preemption_disabled+0xb7/0x280 [ 199.398658][T12681] __x64_sys_recvmmsg+0x17c/0x220 [ 199.403675][T12681] ? do_recvmmsg+0x870/0x870 [ 199.408253][T12681] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 199.414050][T12681] ? do_syscall_64+0x1d/0x140 [ 199.418724][T12681] do_syscall_64+0xfe/0x140 [ 199.423229][T12681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.429113][T12681] RIP: 0033:0x459519 [ 199.432997][T12681] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.453036][T12681] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 199.461453][T12681] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 199.469415][T12681] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 199.477388][T12681] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 199.485355][T12681] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 199.493327][T12681] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 199.519165][T12660] loop5: unable to read partition table [ 199.533480][T12660] loop5: partition table beyond EOD, truncated [ 199.539730][T12660] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:26:26 executing program 5: syz_read_part_table(0x2500, 0x0, 0x0) 23:26:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc}}], 0x1, 0x0, 0x0) 23:26:26 executing program 3 (fault-call:6 fault-nth:27): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:26 executing program 1 (fault-call:6 fault-nth:33): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}], 0x1, 0x0, 0x0) [ 199.628183][T12690] FAULT_INJECTION: forcing a failure. [ 199.628183][T12690] name failslab, interval 1, probability 0, space 0, times 0 [ 199.667933][T12690] CPU: 1 PID: 12690 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 199.675859][T12690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.685953][T12690] Call Trace: [ 199.689249][T12690] dump_stack+0x1d8/0x2f8 [ 199.693815][T12690] should_fail+0x608/0x860 [ 199.698235][T12690] ? setup_fault_attr+0x2b0/0x2b0 [ 199.703342][T12690] ? sock_kmalloc+0xac/0x120 [ 199.707931][T12690] __should_failslab+0x11a/0x160 [ 199.712955][T12690] ? sock_kmalloc+0xac/0x120 [ 199.717539][T12690] should_failslab+0x9/0x20 [ 199.722037][T12690] __kmalloc+0x7a/0x310 23:26:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 199.726197][T12690] sock_kmalloc+0xac/0x120 [ 199.729302][T12693] FAULT_INJECTION: forcing a failure. [ 199.729302][T12693] name failslab, interval 1, probability 0, space 0, times 0 [ 199.730603][T12690] af_alg_alloc_areq+0x28/0x180 [ 199.730616][T12690] aead_recvmsg+0x51e/0x1c50 [ 199.730647][T12690] ? aead_sendmsg+0x110/0x110 [ 199.730670][T12690] ? __might_fault+0xf9/0x160 [ 199.761966][T12690] ? kasan_check_write+0x14/0x20 [ 199.766903][T12690] ? _copy_from_user+0xe0/0x120 [ 199.771754][T12690] ? rw_copy_check_uvector+0x2e4/0x310 [ 199.777218][T12690] ? import_iovec+0x17e/0x340 [ 199.781887][T12690] ? __might_fault+0xf9/0x160 [ 199.786568][T12690] ? security_socket_recvmsg+0xa9/0xd0 [ 199.792016][T12690] ? aead_sendmsg+0x110/0x110 [ 199.796774][T12690] sock_recvmsg+0xe7/0x100 [ 199.801193][T12690] ___sys_recvmsg+0x28b/0x9c0 [ 199.805874][T12690] ? __sys_recvmsg+0x250/0x250 [ 199.810652][T12690] ? rcu_lock_release+0xd/0x30 [ 199.815411][T12690] ? rcu_lock_release+0x26/0x30 [ 199.820252][T12690] ? __fget+0x4fe/0x540 [ 199.824494][T12690] ? fget_many+0x30/0x30 [ 199.828728][T12690] ? __mutex_lock_common+0x56b/0x2fc0 [ 199.834098][T12690] ? __fdget+0x17c/0x200 [ 199.838336][T12690] do_recvmmsg+0x33d/0x870 [ 199.842756][T12690] ? __sys_recvmmsg+0x220/0x220 [ 199.847597][T12690] ? kasan_check_write+0x14/0x20 [ 199.852529][T12690] ? __mutex_unlock_slowpath+0x18c/0x630 [ 199.858167][T12690] ? kasan_check_write+0x14/0x20 [ 199.863106][T12690] ? fput_many+0x47/0x1a0 [ 199.867430][T12690] ? check_preemption_disabled+0xb7/0x280 [ 199.873152][T12690] __x64_sys_recvmmsg+0x17c/0x220 [ 199.878173][T12690] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 199.883807][T12690] ? do_recvmmsg+0x870/0x870 [ 199.888418][T12690] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 199.894136][T12690] ? do_syscall_64+0x1d/0x140 [ 199.898817][T12690] do_syscall_64+0xfe/0x140 [ 199.903322][T12690] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.909205][T12690] RIP: 0033:0x459519 23:26:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 199.913092][T12690] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 199.932694][T12690] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 199.941099][T12690] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 199.949074][T12690] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 199.957214][T12690] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 199.965184][T12690] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 199.973416][T12690] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 199.981601][T12693] CPU: 0 PID: 12693 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 199.989498][T12693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.999547][T12693] Call Trace: [ 200.002838][T12693] dump_stack+0x1d8/0x2f8 [ 200.007160][T12693] should_fail+0x608/0x860 [ 200.007174][T12693] ? setup_fault_attr+0x2b0/0x2b0 [ 200.007191][T12693] ? sock_kmalloc+0xac/0x120 [ 200.021161][T12693] __should_failslab+0x11a/0x160 [ 200.021180][T12693] ? sock_kmalloc+0xac/0x120 [ 200.030664][T12693] should_failslab+0x9/0x20 [ 200.035165][T12693] __kmalloc+0x7a/0x310 [ 200.039324][T12693] sock_kmalloc+0xac/0x120 [ 200.043741][T12693] af_alg_alloc_areq+0x28/0x180 [ 200.048592][T12693] aead_recvmsg+0x51e/0x1c50 [ 200.053193][T12693] ? aead_sendmsg+0x110/0x110 [ 200.057861][T12693] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 200.057877][T12693] ? retint_kernel+0x2b/0x2b [ 200.057886][T12693] ? trace_hardirqs_on_caller+0x74/0x80 [ 200.057898][T12693] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 200.067923][T12693] ? rcu_irq_exit+0x118/0x2b0 [ 200.067937][T12693] ? retint_kernel+0x2b/0x2b [ 200.067951][T12693] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 200.078911][T12693] ? retint_kernel+0x2b/0x2b [ 200.078922][T12693] ? trace_hardirqs_on_caller+0x74/0x80 [ 200.078935][T12693] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 200.088148][T12693] ? rcu_irq_exit+0x118/0x2b0 [ 200.088160][T12693] ? retint_kernel+0x2b/0x2b [ 200.088178][T12693] ? security_socket_recvmsg+0xa9/0xd0 [ 200.098191][T12693] ? aead_sendmsg+0x110/0x110 [ 200.098204][T12693] sock_recvmsg+0xe7/0x100 [ 200.098217][T12693] ___sys_recvmsg+0x28b/0x9c0 [ 200.137633][T12693] ? __sys_recvmsg+0x250/0x250 [ 200.142400][T12693] ? rcu_lock_release+0xd/0x30 [ 200.147159][T12693] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 200.152611][T12693] ? trace_hardirqs_on_caller+0x74/0x80 [ 200.158145][T12693] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 200.163594][T12693] ? rcu_irq_exit+0x118/0x2b0 [ 200.168265][T12693] ? retint_kernel+0x2b/0x2b [ 200.172853][T12693] do_recvmmsg+0x33d/0x870 [ 200.177270][T12693] ? __sys_recvmmsg+0x220/0x220 [ 200.182113][T12693] ? trace_hardirqs_on_caller+0x74/0x80 [ 200.187660][T12693] ? retint_kernel+0x2b/0x2b [ 200.192247][T12693] ? __x64_sys_recvmmsg+0x164/0x220 [ 200.197441][T12693] __x64_sys_recvmmsg+0x17c/0x220 [ 200.202455][T12693] ? do_recvmmsg+0x870/0x870 [ 200.207039][T12693] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 200.212745][T12693] ? do_syscall_64+0x1d/0x140 [ 200.217417][T12693] do_syscall_64+0xfe/0x140 [ 200.221913][T12693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.227795][T12693] RIP: 0033:0x459519 [ 200.231677][T12693] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 200.251267][T12693] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 200.259670][T12693] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 200.267730][T12693] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 23:26:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:27 executing program 3 (fault-call:6 fault-nth:28): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 200.275697][T12693] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 200.283659][T12693] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 200.291623][T12693] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 200.343980][T12698] loop5: unable to read partition table [ 200.360527][T12698] loop5: partition table beyond EOD, truncated [ 200.387649][T12698] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 200.388900][T12706] FAULT_INJECTION: forcing a failure. [ 200.388900][T12706] name failslab, interval 1, probability 0, space 0, times 0 [ 200.421166][T12706] CPU: 1 PID: 12706 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 200.429070][T12706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.429076][T12706] Call Trace: [ 200.429092][T12706] dump_stack+0x1d8/0x2f8 [ 200.429109][T12706] should_fail+0x608/0x860 [ 200.429121][T12706] ? setup_fault_attr+0x2b0/0x2b0 [ 200.429138][T12706] ? sock_kmalloc+0xac/0x120 [ 200.429153][T12706] __should_failslab+0x11a/0x160 [ 200.442465][T12706] ? sock_kmalloc+0xac/0x120 [ 200.470219][T12706] should_failslab+0x9/0x20 [ 200.474714][T12706] __kmalloc+0x7a/0x310 [ 200.478864][T12706] sock_kmalloc+0xac/0x120 [ 200.483271][T12706] af_alg_alloc_areq+0x28/0x180 [ 200.488116][T12706] aead_recvmsg+0x51e/0x1c50 [ 200.492721][T12706] ? aead_sendmsg+0x110/0x110 [ 200.497407][T12706] ? __might_fault+0xf9/0x160 [ 200.502080][T12706] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 200.507529][T12706] ? retint_kernel+0x2b/0x2b [ 200.512106][T12706] ? trace_hardirqs_on_caller+0x74/0x80 [ 200.517669][T12706] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 200.523137][T12706] ? rcu_irq_exit+0x118/0x2b0 [ 200.527807][T12706] ? retint_kernel+0x2b/0x2b [ 200.532391][T12706] ? sock_recvmsg+0x6b/0x100 [ 200.537060][T12706] ? aead_sendmsg+0x110/0x110 [ 200.541731][T12706] sock_recvmsg+0xe7/0x100 [ 200.546147][T12706] ___sys_recvmsg+0x28b/0x9c0 [ 200.550819][T12706] ? __sys_recvmsg+0x250/0x250 [ 200.555583][T12706] ? rcu_lock_release+0xd/0x30 [ 200.560341][T12706] ? rcu_lock_release+0x26/0x30 [ 200.565182][T12706] ? __fget+0x4fe/0x540 [ 200.569343][T12706] ? fget_many+0x30/0x30 [ 200.573581][T12706] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 200.578854][T12706] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 200.584309][T12706] ? __fdget+0x17c/0x200 [ 200.588545][T12706] do_recvmmsg+0x33d/0x870 [ 200.592960][T12706] ? __sys_recvmmsg+0x220/0x220 [ 200.597802][T12706] ? kasan_check_write+0x14/0x20 [ 200.602728][T12706] ? __mutex_unlock_slowpath+0x18c/0x630 [ 200.608356][T12706] ? kasan_check_write+0x14/0x20 [ 200.613284][T12706] ? fput_many+0x47/0x1a0 [ 200.617608][T12706] ? check_preemption_disabled+0xb7/0x280 [ 200.623849][T12706] __x64_sys_recvmmsg+0x17c/0x220 [ 200.628892][T12706] ? do_recvmmsg+0x870/0x870 [ 200.633479][T12706] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 200.639184][T12706] ? do_syscall_64+0x1d/0x140 [ 200.643857][T12706] do_syscall_64+0xfe/0x140 [ 200.648353][T12706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.654231][T12706] RIP: 0033:0x459519 [ 200.658120][T12706] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 200.677717][T12706] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 200.686123][T12706] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 200.694086][T12706] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 200.702054][T12706] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 200.710018][T12706] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 200.718088][T12706] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 200.814671][T12698] loop5: unable to read partition table [ 200.820571][T12698] loop5: partition table beyond EOD, truncated [ 200.832691][T12698] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:26:28 executing program 5: syz_read_part_table(0x260f, 0x0, 0x0) 23:26:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}], 0x1, 0x0, 0x0) 23:26:28 executing program 1 (fault-call:6 fault-nth:34): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:28 executing program 3 (fault-call:6 fault-nth:29): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x60}}], 0x1, 0x0, 0x0) [ 200.964209][T12721] FAULT_INJECTION: forcing a failure. [ 200.964209][T12721] name failslab, interval 1, probability 0, space 0, times 0 [ 200.989716][T12718] FAULT_INJECTION: forcing a failure. [ 200.989716][T12718] name failslab, interval 1, probability 0, space 0, times 0 [ 201.026824][T12721] CPU: 1 PID: 12721 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 201.034742][T12721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.034748][T12721] Call Trace: [ 201.034766][T12721] dump_stack+0x1d8/0x2f8 [ 201.034781][T12721] should_fail+0x608/0x860 [ 201.034791][T12721] ? setup_fault_attr+0x2b0/0x2b0 [ 201.034803][T12721] ? sock_kmalloc+0xac/0x120 [ 201.034820][T12721] __should_failslab+0x11a/0x160 [ 201.034830][T12721] ? sock_kmalloc+0xac/0x120 [ 201.034840][T12721] should_failslab+0x9/0x20 [ 201.034848][T12721] __kmalloc+0x7a/0x310 [ 201.034863][T12721] sock_kmalloc+0xac/0x120 [ 201.034876][T12721] af_alg_alloc_areq+0x28/0x180 [ 201.034887][T12721] aead_recvmsg+0x51e/0x1c50 [ 201.034914][T12721] ? aead_sendmsg+0x110/0x110 [ 201.034934][T12721] ? __might_fault+0xf9/0x160 [ 201.110239][T12721] ? kasan_check_write+0x14/0x20 [ 201.115173][T12721] ? _copy_from_user+0xe0/0x120 [ 201.120029][T12721] ? rw_copy_check_uvector+0x2e4/0x310 [ 201.125490][T12721] ? import_iovec+0x17e/0x340 [ 201.130163][T12721] ? __might_fault+0xf9/0x160 [ 201.134842][T12721] ? security_socket_recvmsg+0xa9/0xd0 [ 201.140286][T12721] ? aead_sendmsg+0x110/0x110 [ 201.144953][T12721] sock_recvmsg+0xe7/0x100 [ 201.149364][T12721] ___sys_recvmsg+0x28b/0x9c0 [ 201.154034][T12721] ? __sys_recvmsg+0x250/0x250 [ 201.154055][T12721] ? rcu_lock_release+0xd/0x30 [ 201.154074][T12721] ? rcu_lock_release+0x26/0x30 [ 201.154082][T12721] ? __fget+0x4fe/0x540 [ 201.154098][T12721] ? fget_many+0x30/0x30 [ 201.154109][T12721] ? __mutex_lock_common+0x56b/0x2fc0 [ 201.154122][T12721] ? __fdget+0x17c/0x200 [ 201.154134][T12721] do_recvmmsg+0x33d/0x870 [ 201.190767][T12721] ? __sys_recvmmsg+0x220/0x220 [ 201.195615][T12721] ? kasan_check_write+0x14/0x20 [ 201.200550][T12721] ? __mutex_unlock_slowpath+0x18c/0x630 [ 201.206187][T12721] ? kasan_check_write+0x14/0x20 [ 201.211114][T12721] ? fput_many+0x47/0x1a0 [ 201.215432][T12721] ? check_preemption_disabled+0xb7/0x280 [ 201.221150][T12721] __x64_sys_recvmmsg+0x17c/0x220 [ 201.226173][T12721] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 201.231805][T12721] ? do_recvmmsg+0x870/0x870 [ 201.236392][T12721] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 201.242106][T12721] ? do_syscall_64+0x1d/0x140 [ 201.246782][T12721] do_syscall_64+0xfe/0x140 [ 201.251282][T12721] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.257163][T12721] RIP: 0033:0x459519 [ 201.261047][T12721] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 201.280643][T12721] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 201.289047][T12721] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 201.297012][T12721] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 201.304975][T12721] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 201.312937][T12721] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 201.320896][T12721] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 201.329865][T12718] CPU: 0 PID: 12718 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 201.337763][T12718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.347812][T12718] Call Trace: [ 201.351103][T12718] dump_stack+0x1d8/0x2f8 [ 201.355448][T12718] should_fail+0x608/0x860 [ 201.359866][T12718] ? setup_fault_attr+0x2b0/0x2b0 [ 201.364888][T12718] ? sock_kmalloc+0xac/0x120 [ 201.369481][T12718] __should_failslab+0x11a/0x160 [ 201.374416][T12718] ? sock_kmalloc+0xac/0x120 [ 201.379002][T12718] should_failslab+0x9/0x20 [ 201.383495][T12718] __kmalloc+0x7a/0x310 [ 201.387662][T12718] sock_kmalloc+0xac/0x120 [ 201.392073][T12718] af_alg_alloc_areq+0x28/0x180 [ 201.396917][T12718] aead_recvmsg+0x51e/0x1c50 [ 201.401521][T12718] ? aead_sendmsg+0x110/0x110 [ 201.406190][T12718] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 201.411637][T12718] ? rcu_irq_exit+0x118/0x2b0 [ 201.416318][T12718] ? __might_fault+0xf9/0x160 [ 201.420995][T12718] ? kasan_check_write+0x14/0x20 [ 201.425929][T12718] ? _copy_from_user+0xe0/0x120 [ 201.430778][T12718] ? rw_copy_check_uvector+0x2e4/0x310 [ 201.436235][T12718] ? import_iovec+0x17e/0x340 [ 201.440898][T12718] ? __might_fault+0xf9/0x160 [ 201.445574][T12718] ? security_socket_recvmsg+0xa9/0xd0 [ 201.451022][T12718] ? aead_sendmsg+0x110/0x110 [ 201.455690][T12718] sock_recvmsg+0xe7/0x100 [ 201.460105][T12718] ___sys_recvmsg+0x28b/0x9c0 [ 201.464781][T12718] ? __sys_recvmsg+0x250/0x250 [ 201.469553][T12718] ? rcu_lock_release+0xd/0x30 [ 201.474311][T12718] ? rcu_lock_release+0x26/0x30 [ 201.479150][T12718] ? __fget+0x4fe/0x540 [ 201.483311][T12718] ? fget_many+0x30/0x30 [ 201.487549][T12718] ? __mutex_lock_common+0x56b/0x2fc0 [ 201.492914][T12718] ? __fdget+0x17c/0x200 [ 201.497148][T12718] do_recvmmsg+0x33d/0x870 [ 201.501567][T12718] ? __sys_recvmmsg+0x220/0x220 [ 201.506411][T12718] ? kasan_check_write+0x14/0x20 [ 201.511341][T12718] ? __mutex_unlock_slowpath+0x18c/0x630 [ 201.516968][T12718] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 201.522417][T12718] ? retint_kernel+0x2b/0x2b [ 201.527005][T12718] ? trace_hardirqs_on_caller+0x74/0x80 [ 201.532546][T12718] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 201.537999][T12718] __x64_sys_recvmmsg+0x17c/0x220 [ 201.543018][T12718] ? retint_kernel+0x2b/0x2b [ 201.547603][T12718] ? do_recvmmsg+0x870/0x870 [ 201.552189][T12718] ? do_syscall_64+0xc0/0x140 [ 201.556865][T12718] do_syscall_64+0xfe/0x140 [ 201.561379][T12718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.567268][T12718] RIP: 0033:0x459519 [ 201.571150][T12718] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 201.590744][T12718] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 201.599147][T12718] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 201.607107][T12718] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 201.615066][T12718] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:26:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2d0}}], 0x1, 0x0, 0x0) 23:26:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 201.623025][T12718] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 201.631069][T12718] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 201.663944][T12724] loop5: unable to read partition table 23:26:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 201.675187][T12724] loop5: partition table beyond EOD, truncated [ 201.681372][T12724] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 201.833756][T12724] loop5: unable to read partition table [ 201.839492][T12724] loop5: partition table beyond EOD, truncated [ 201.845709][T12724] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) 23:26:29 executing program 3 (fault-call:6 fault-nth:30): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x300}}], 0x1, 0x0, 0x0) 23:26:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:29 executing program 5: syz_read_part_table(0x3f00, 0x0, 0x0) 23:26:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:29 executing program 1 (fault-call:6 fault-nth:35): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x500}}], 0x1, 0x0, 0x0) [ 201.986321][T12756] FAULT_INJECTION: forcing a failure. [ 201.986321][T12756] name failslab, interval 1, probability 0, space 0, times 0 [ 202.013691][T12754] loop5: unable to read partition table [ 202.020376][T12748] FAULT_INJECTION: forcing a failure. [ 202.020376][T12748] name failslab, interval 1, probability 0, space 0, times 0 23:26:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 202.025269][T12754] loop5: partition table beyond EOD, truncated [ 202.053018][T12754] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 202.061257][T12756] CPU: 1 PID: 12756 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 202.069142][T12756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.079190][T12756] Call Trace: 23:26:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x600}}], 0x1, 0x0, 0x0) [ 202.082480][T12756] dump_stack+0x1d8/0x2f8 [ 202.087262][T12756] should_fail+0x608/0x860 [ 202.091690][T12756] ? setup_fault_attr+0x2b0/0x2b0 [ 202.096723][T12756] ? sock_kmalloc+0xac/0x120 [ 202.101720][T12756] __should_failslab+0x11a/0x160 [ 202.107438][T12756] ? sock_kmalloc+0xac/0x120 [ 202.112722][T12756] should_failslab+0x9/0x20 [ 202.117217][T12756] __kmalloc+0x7a/0x310 [ 202.121367][T12756] sock_kmalloc+0xac/0x120 [ 202.125797][T12756] af_alg_alloc_areq+0x28/0x180 [ 202.130756][T12756] aead_recvmsg+0x51e/0x1c50 [ 202.135362][T12756] ? aead_sendmsg+0x110/0x110 [ 202.140316][T12756] ? __might_fault+0xf9/0x160 [ 202.145002][T12756] ? kasan_check_write+0x14/0x20 [ 202.149931][T12756] ? _copy_from_user+0xe0/0x120 [ 202.154778][T12756] ? rw_copy_check_uvector+0x2e4/0x310 [ 202.160237][T12756] ? import_iovec+0x17e/0x340 [ 202.164907][T12756] ? __might_fault+0xf9/0x160 [ 202.169581][T12756] ? security_socket_recvmsg+0xa9/0xd0 [ 202.175030][T12756] ? aead_sendmsg+0x110/0x110 [ 202.179794][T12756] sock_recvmsg+0xe7/0x100 23:26:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 202.184203][T12756] ___sys_recvmsg+0x28b/0x9c0 [ 202.188879][T12756] ? __sys_recvmsg+0x250/0x250 [ 202.193650][T12756] ? rcu_lock_release+0xd/0x30 [ 202.198927][T12756] ? rcu_lock_release+0x26/0x30 [ 202.203770][T12756] ? __fget+0x4fe/0x540 [ 202.207927][T12756] ? fget_many+0x30/0x30 [ 202.212172][T12756] ? __mutex_lock_common+0x56b/0x2fc0 [ 202.217546][T12756] ? __fdget+0x17c/0x200 [ 202.221789][T12756] do_recvmmsg+0x33d/0x870 [ 202.226209][T12756] ? __sys_recvmmsg+0x220/0x220 [ 202.231053][T12756] ? kasan_check_write+0x14/0x20 [ 202.235986][T12756] ? __mutex_unlock_slowpath+0x18c/0x630 [ 202.241618][T12756] ? kasan_check_write+0x14/0x20 [ 202.246549][T12756] ? fput_many+0x47/0x1a0 [ 202.250874][T12756] ? check_preemption_disabled+0xb7/0x280 [ 202.256860][T12756] __x64_sys_recvmmsg+0x17c/0x220 [ 202.261882][T12756] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 202.267615][T12756] ? do_recvmmsg+0x870/0x870 [ 202.272199][T12756] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 202.277921][T12756] ? do_syscall_64+0x1d/0x140 [ 202.282599][T12756] do_syscall_64+0xfe/0x140 [ 202.287103][T12756] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.292985][T12756] RIP: 0033:0x459519 [ 202.296869][T12756] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 202.316469][T12756] RSP: 002b:00007f3b465c4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 202.324879][T12756] RAX: ffffffffffffffda RBX: 00007f3b465c4c90 RCX: 0000000000459519 [ 202.332842][T12756] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 202.340810][T12756] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 202.348776][T12756] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465c56d4 [ 202.356915][T12756] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 202.364905][T12748] CPU: 0 PID: 12748 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 202.372791][T12748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.372796][T12748] Call Trace: [ 202.372810][T12748] dump_stack+0x1d8/0x2f8 [ 202.372825][T12748] should_fail+0x608/0x860 [ 202.372835][T12748] ? setup_fault_attr+0x2b0/0x2b0 [ 202.372845][T12748] ? sock_kmalloc+0xac/0x120 [ 202.372860][T12748] __should_failslab+0x11a/0x160 [ 202.394878][T12748] ? sock_kmalloc+0xac/0x120 [ 202.394889][T12748] should_failslab+0x9/0x20 [ 202.394898][T12748] __kmalloc+0x7a/0x310 [ 202.394911][T12748] sock_kmalloc+0xac/0x120 [ 202.404510][T12748] af_alg_alloc_areq+0x28/0x180 [ 202.404523][T12748] aead_recvmsg+0x51e/0x1c50 [ 202.404551][T12748] ? aead_sendmsg+0x110/0x110 [ 202.404560][T12748] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 202.404575][T12748] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 202.414063][T12748] ? rcu_irq_exit+0x118/0x2b0 [ 202.414077][T12748] ? retint_kernel+0x2b/0x2b [ 202.414093][T12748] ? copy_user_generic_unrolled+0x89/0xc0 [ 202.414105][T12748] ? _copy_from_user+0xe0/0x120 [ 202.422729][T12748] ? rw_copy_check_uvector+0x2e4/0x310 [ 202.422746][T12748] ? import_iovec+0x17e/0x340 [ 202.422760][T12748] ? security_socket_recvmsg+0xa9/0xd0 [ 202.422772][T12748] ? aead_sendmsg+0x110/0x110 [ 202.432072][T12748] sock_recvmsg+0xe7/0x100 [ 202.432086][T12748] ___sys_recvmsg+0x28b/0x9c0 [ 202.432103][T12748] ? __sys_recvmsg+0x250/0x250 [ 202.506026][T12748] ? lock_release+0x489/0x790 [ 202.510697][T12748] ? rcu_lock_release+0xd/0x30 [ 202.515480][T12748] ? rcu_lock_release+0x26/0x30 [ 202.520339][T12748] ? __fget+0x4fe/0x540 [ 202.524491][T12748] ? fget_many+0x30/0x30 [ 202.528724][T12748] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 202.534181][T12748] ? __fdget+0x17c/0x200 [ 202.538420][T12748] do_recvmmsg+0x33d/0x870 [ 202.542840][T12748] ? __sys_recvmmsg+0x220/0x220 [ 202.547680][T12748] ? kasan_check_write+0x14/0x20 [ 202.552610][T12748] ? __mutex_unlock_slowpath+0x18c/0x630 [ 202.558323][T12748] ? kasan_check_write+0x14/0x20 [ 202.563249][T12748] ? fput_many+0x47/0x1a0 [ 202.567567][T12748] ? check_preemption_disabled+0xb7/0x280 [ 202.573281][T12748] __x64_sys_recvmmsg+0x17c/0x220 [ 202.578302][T12748] ? do_recvmmsg+0x870/0x870 [ 202.582883][T12748] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 202.588592][T12748] ? do_syscall_64+0x1d/0x140 [ 202.593263][T12748] do_syscall_64+0xfe/0x140 [ 202.597760][T12748] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.603737][T12748] RIP: 0033:0x459519 [ 202.607627][T12748] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 202.627222][T12748] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 202.636062][T12748] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 202.644027][T12748] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 202.651991][T12748] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 202.660041][T12748] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 202.668010][T12748] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:29 executing program 3 (fault-call:6 fault-nth:31): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}}], 0x1, 0x0, 0x0) [ 202.763645][T12754] loop5: unable to read partition table [ 202.769441][T12754] loop5: partition table beyond EOD, truncated [ 202.788246][T12754] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 202.816696][T12778] FAULT_INJECTION: forcing a failure. [ 202.816696][T12778] name failslab, interval 1, probability 0, space 0, times 0 [ 202.829705][T12778] CPU: 0 PID: 12778 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 202.837606][T12778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.837611][T12778] Call Trace: [ 202.837633][T12778] dump_stack+0x1d8/0x2f8 [ 202.837651][T12778] should_fail+0x608/0x860 [ 202.837670][T12778] ? setup_fault_attr+0x2b0/0x2b0 [ 202.837682][T12778] ? sock_kmalloc+0xac/0x120 [ 202.837698][T12778] __should_failslab+0x11a/0x160 [ 202.837709][T12778] ? sock_kmalloc+0xac/0x120 [ 202.837729][T12778] should_failslab+0x9/0x20 [ 202.837744][T12778] __kmalloc+0x7a/0x310 [ 202.837765][T12778] sock_kmalloc+0xac/0x120 [ 202.837793][T12778] af_alg_alloc_areq+0x28/0x180 [ 202.837820][T12778] aead_recvmsg+0x51e/0x1c50 [ 202.869629][T12778] ? aead_sendmsg+0x110/0x110 [ 202.879093][T12778] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 202.879112][T12778] ? retint_kernel+0x2b/0x2b [ 202.887726][T12778] ? trace_hardirqs_on_caller+0x74/0x80 [ 202.897029][T12778] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 202.897040][T12778] ? rcu_irq_exit+0x118/0x2b0 [ 202.897052][T12778] ? retint_kernel+0x2b/0x2b [ 202.897067][T12778] ? rw_copy_check_uvector+0x23d/0x310 [ 202.943366][T12778] ? rw_copy_check_uvector+0x2e4/0x310 [ 202.948818][T12778] ? __sanitizer_cov_trace_pc+0x31/0x50 [ 202.954351][T12778] ? rw_copy_check_uvector+0x2e4/0x310 [ 202.960969][T12778] ? import_iovec+0x17e/0x340 [ 202.965728][T12778] ? security_socket_recvmsg+0xa9/0xd0 [ 202.971178][T12778] ? aead_sendmsg+0x110/0x110 [ 202.975851][T12778] sock_recvmsg+0xe7/0x100 [ 202.981272][T12778] ___sys_recvmsg+0x28b/0x9c0 [ 202.985944][T12778] ? __sys_recvmsg+0x250/0x250 [ 202.990705][T12778] ? rcu_lock_release+0xd/0x30 [ 202.995550][T12778] ? rcu_lock_release+0x26/0x30 [ 203.000395][T12778] ? __fget+0x4fe/0x540 [ 203.004559][T12778] ? fget_many+0x30/0x30 [ 203.008789][T12778] ? __mutex_lock_common+0x56b/0x2fc0 [ 203.014153][T12778] ? __fdget+0x17c/0x200 [ 203.018386][T12778] do_recvmmsg+0x33d/0x870 [ 203.023027][T12778] ? __sys_recvmmsg+0x220/0x220 [ 203.027866][T12778] ? kasan_check_write+0x14/0x20 [ 203.032789][T12778] ? __mutex_unlock_slowpath+0x18c/0x630 [ 203.038543][T12778] ? kasan_check_write+0x14/0x20 [ 203.043557][T12778] ? fput_many+0x47/0x1a0 [ 203.047883][T12778] ? check_preemption_disabled+0xb7/0x280 [ 203.053594][T12778] __x64_sys_recvmmsg+0x17c/0x220 [ 203.058606][T12778] ? do_recvmmsg+0x870/0x870 [ 203.063196][T12778] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 203.068903][T12778] ? do_syscall_64+0x1d/0x140 [ 203.073570][T12778] do_syscall_64+0xfe/0x140 [ 203.078068][T12778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.083949][T12778] RIP: 0033:0x459519 [ 203.087832][T12778] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 203.108284][T12778] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b 23:26:30 executing program 5: syz_read_part_table(0x4000, 0x0, 0x0) 23:26:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:30 executing program 1 (fault-call:6 fault-nth:36): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}}], 0x1, 0x0, 0x0) [ 203.116682][T12778] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 203.124643][T12778] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 203.132603][T12778] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 203.140570][T12778] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 203.148527][T12778] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 203.194739][T12785] FAULT_INJECTION: forcing a failure. [ 203.194739][T12785] name failslab, interval 1, probability 0, space 0, times 0 [ 203.221345][T12785] CPU: 0 PID: 12785 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 203.229261][T12785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.229267][T12785] Call Trace: [ 203.229285][T12785] dump_stack+0x1d8/0x2f8 [ 203.229301][T12785] should_fail+0x608/0x860 [ 203.229313][T12785] ? setup_fault_attr+0x2b0/0x2b0 [ 203.229325][T12785] ? sock_kmalloc+0xac/0x120 [ 203.229339][T12785] __should_failslab+0x11a/0x160 [ 203.266846][T12785] ? sock_kmalloc+0xac/0x120 [ 203.271513][T12785] should_failslab+0x9/0x20 [ 203.276016][T12785] __kmalloc+0x7a/0x310 [ 203.280182][T12785] sock_kmalloc+0xac/0x120 [ 203.284589][T12785] af_alg_alloc_areq+0x28/0x180 [ 203.284601][T12785] aead_recvmsg+0x51e/0x1c50 [ 203.284626][T12785] ? aead_sendmsg+0x110/0x110 [ 203.298798][T12785] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 203.298816][T12785] ? retint_kernel+0x2b/0x2b [ 203.308811][T12785] ? trace_hardirqs_on_caller+0x74/0x80 [ 203.308823][T12785] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 203.308835][T12785] ? rcu_irq_exit+0x118/0x2b0 [ 203.319791][T12785] ? retint_kernel+0x2b/0x2b [ 203.319808][T12785] ? import_iovec+0x17e/0x340 [ 203.319822][T12785] ? __sanitizer_cov_trace_const_cmp8+0x4/0x80 [ 203.329291][T12785] ? import_iovec+0x17e/0x340 [ 203.329299][T12785] ? __might_fault+0xf9/0x160 [ 203.329315][T12785] ? security_socket_recvmsg+0xa9/0xd0 [ 203.354843][T12785] ? aead_sendmsg+0x110/0x110 [ 203.359514][T12785] sock_recvmsg+0xe7/0x100 [ 203.363925][T12785] ___sys_recvmsg+0x28b/0x9c0 [ 203.368601][T12785] ? __sys_recvmsg+0x250/0x250 [ 203.373363][T12785] ? rcu_lock_release+0xd/0x30 [ 203.378125][T12785] ? rcu_lock_release+0x26/0x30 [ 203.382970][T12785] ? __fget+0x4fe/0x540 [ 203.387122][T12785] ? fget_many+0x30/0x30 [ 203.391354][T12785] ? rcu_irq_exit+0x118/0x2b0 [ 203.396033][T12785] ? __fdget+0x17c/0x200 [ 203.400265][T12785] do_recvmmsg+0x33d/0x870 [ 203.404672][T12785] ? _raw_spin_unlock_irq+0x5f/0x80 [ 203.409868][T12785] ? __sys_recvmmsg+0x220/0x220 [ 203.414719][T12785] ? __schedule+0x660/0x9e0 [ 203.419221][T12785] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 203.424676][T12785] ? retint_kernel+0x2b/0x2b [ 203.429263][T12785] ? trace_hardirqs_on_caller+0x74/0x80 [ 203.434796][T12785] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 203.440250][T12785] __x64_sys_recvmmsg+0x17c/0x220 [ 203.445274][T12785] ? do_recvmmsg+0x870/0x870 [ 203.449871][T12785] do_syscall_64+0xfe/0x140 [ 203.454372][T12785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.460256][T12785] RIP: 0033:0x459519 [ 203.464146][T12785] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 203.483799][T12785] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b 23:26:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xec0}}], 0x1, 0x0, 0x0) 23:26:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 203.492198][T12785] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 203.500167][T12785] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 203.508125][T12785] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 203.516086][T12785] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 203.524047][T12785] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:30 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}}], 0x1, 0x0, 0x0) 23:26:30 executing program 3 (fault-call:6 fault-nth:32): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:30 executing program 1 (fault-call:6 fault-nth:37): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 203.674741][T12804] FAULT_INJECTION: forcing a failure. [ 203.674741][T12804] name failslab, interval 1, probability 0, space 0, times 0 [ 203.701668][T12807] FAULT_INJECTION: forcing a failure. [ 203.701668][T12807] name failslab, interval 1, probability 0, space 0, times 0 [ 203.712981][T12804] CPU: 0 PID: 12804 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 203.722160][T12804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.732297][T12804] Call Trace: [ 203.735586][T12804] dump_stack+0x1d8/0x2f8 [ 203.739922][T12804] should_fail+0x608/0x860 [ 203.744331][T12804] ? setup_fault_attr+0x2b0/0x2b0 [ 203.749353][T12804] ? sock_kmalloc+0xac/0x120 [ 203.753937][T12804] __should_failslab+0x11a/0x160 [ 203.758879][T12804] ? sock_kmalloc+0xac/0x120 [ 203.763454][T12804] should_failslab+0x9/0x20 [ 203.767944][T12804] __kmalloc+0x7a/0x310 [ 203.772088][T12804] sock_kmalloc+0xac/0x120 [ 203.776488][T12804] af_alg_alloc_areq+0x28/0x180 [ 203.781326][T12804] aead_recvmsg+0x51e/0x1c50 [ 203.786147][T12804] ? aead_sendmsg+0x110/0x110 [ 203.790819][T12804] ? __might_fault+0xf9/0x160 [ 203.795493][T12804] ? kasan_check_write+0x14/0x20 [ 203.800416][T12804] ? _copy_from_user+0xe0/0x120 [ 203.805254][T12804] ? rw_copy_check_uvector+0x2e4/0x310 [ 203.810700][T12804] ? import_iovec+0x17e/0x340 [ 203.815364][T12804] ? __might_fault+0xf9/0x160 [ 203.820030][T12804] ? security_socket_recvmsg+0xa9/0xd0 [ 203.825470][T12804] ? aead_sendmsg+0x110/0x110 [ 203.830130][T12804] sock_recvmsg+0xe7/0x100 [ 203.834536][T12804] ___sys_recvmsg+0x28b/0x9c0 [ 203.839201][T12804] ? __sys_recvmsg+0x250/0x250 [ 203.843957][T12804] ? rcu_lock_release+0xd/0x30 [ 203.848708][T12804] ? rcu_lock_release+0x26/0x30 [ 203.853538][T12804] ? __fget+0x4fe/0x540 [ 203.857680][T12804] ? fget_many+0x30/0x30 [ 203.861903][T12804] ? rcu_irq_exit+0x118/0x2b0 [ 203.866573][T12804] ? __fdget+0x17c/0x200 [ 203.870800][T12804] do_recvmmsg+0x33d/0x870 [ 203.875219][T12804] ? __sys_recvmmsg+0x220/0x220 [ 203.880053][T12804] ? kasan_check_write+0x14/0x20 [ 203.884976][T12804] ? __mutex_unlock_slowpath+0x18c/0x630 [ 203.890684][T12804] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 203.896138][T12804] ? retint_kernel+0x2b/0x2b [ 203.900726][T12804] ? trace_hardirqs_on_caller+0x74/0x80 [ 203.906255][T12804] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 203.911698][T12804] __x64_sys_recvmmsg+0x17c/0x220 [ 203.916707][T12804] ? retint_kernel+0x2b/0x2b [ 203.921287][T12804] ? do_recvmmsg+0x870/0x870 [ 203.925950][T12804] ? do_syscall_64+0xc0/0x140 [ 203.930616][T12804] do_syscall_64+0xfe/0x140 [ 203.935110][T12804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.940986][T12804] RIP: 0033:0x459519 [ 203.944863][T12804] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 203.966366][T12804] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 203.974764][T12804] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 203.982862][T12804] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 203.990819][T12804] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 203.998779][T12804] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 204.006736][T12804] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 204.014715][T12807] CPU: 1 PID: 12807 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 204.022606][T12807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.032657][T12807] Call Trace: [ 204.035945][T12807] dump_stack+0x1d8/0x2f8 [ 204.040354][T12807] should_fail+0x608/0x860 [ 204.045546][T12807] ? setup_fault_attr+0x2b0/0x2b0 [ 204.050559][T12807] ? sock_kmalloc+0xac/0x120 [ 204.055144][T12807] __should_failslab+0x11a/0x160 [ 204.060072][T12807] ? sock_kmalloc+0xac/0x120 [ 204.064650][T12807] should_failslab+0x9/0x20 [ 204.069314][T12807] __kmalloc+0x7a/0x310 [ 204.073466][T12807] sock_kmalloc+0xac/0x120 [ 204.077871][T12807] af_alg_alloc_areq+0x28/0x180 [ 204.082895][T12807] aead_recvmsg+0x51e/0x1c50 [ 204.087491][T12807] ? aead_sendmsg+0x110/0x110 [ 204.092174][T12807] ? __might_fault+0xf9/0x160 [ 204.096849][T12807] ? kasan_check_write+0x14/0x20 [ 204.101774][T12807] ? _copy_from_user+0xe0/0x120 [ 204.106619][T12807] ? rw_copy_check_uvector+0x2e4/0x310 [ 204.112097][T12807] ? import_iovec+0x17e/0x340 [ 204.116848][T12807] ? __might_fault+0xf9/0x160 [ 204.121522][T12807] ? security_socket_recvmsg+0xa9/0xd0 [ 204.126967][T12807] ? aead_sendmsg+0x110/0x110 [ 204.131634][T12807] sock_recvmsg+0xe7/0x100 [ 204.136045][T12807] ___sys_recvmsg+0x28b/0x9c0 [ 204.140716][T12807] ? __sys_recvmsg+0x250/0x250 [ 204.145479][T12807] ? rcu_lock_release+0xd/0x30 [ 204.150239][T12807] ? rcu_lock_release+0x26/0x30 [ 204.155082][T12807] ? __fget+0x4fe/0x540 [ 204.159231][T12807] ? fget_many+0x30/0x30 [ 204.163481][T12807] ? __mutex_lock_common+0x56b/0x2fc0 [ 204.168846][T12807] ? __fdget+0x17c/0x200 [ 204.173081][T12807] do_recvmmsg+0x33d/0x870 [ 204.177497][T12807] ? __sys_recvmmsg+0x220/0x220 [ 204.182420][T12807] ? kasan_check_write+0x14/0x20 [ 204.187528][T12807] ? __mutex_unlock_slowpath+0x18c/0x630 [ 204.193274][T12807] ? kasan_check_write+0x14/0x20 [ 204.198200][T12807] ? fput_many+0x47/0x1a0 [ 204.202519][T12807] ? check_preemption_disabled+0xb7/0x280 [ 204.208680][T12807] __x64_sys_recvmmsg+0x17c/0x220 [ 204.213699][T12807] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 204.219321][T12807] ? do_recvmmsg+0x870/0x870 [ 204.223897][T12807] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 204.229607][T12807] ? do_syscall_64+0x1d/0x140 [ 204.234363][T12807] do_syscall_64+0xfe/0x140 [ 204.238865][T12807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.244918][T12807] RIP: 0033:0x459519 [ 204.248808][T12807] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 204.268485][T12807] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b 23:26:31 executing program 5: syz_read_part_table(0x4800, 0x0, 0x0) 23:26:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}}], 0x1, 0x0, 0x0) 23:26:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 204.276885][T12807] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 204.284847][T12807] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 204.292813][T12807] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 204.300858][T12807] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 204.308816][T12807] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:31 executing program 3 (fault-call:6 fault-nth:33): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}], 0x1, 0x0, 0x0) 23:26:31 executing program 1 (fault-call:6 fault-nth:38): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4788}}], 0x1, 0x0, 0x0) [ 204.521501][T12830] FAULT_INJECTION: forcing a failure. [ 204.521501][T12830] name failslab, interval 1, probability 0, space 0, times 0 [ 204.557214][T12830] CPU: 1 PID: 12830 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 204.561774][T12828] FAULT_INJECTION: forcing a failure. [ 204.561774][T12828] name failslab, interval 1, probability 0, space 0, times 0 [ 204.565134][T12830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.565139][T12830] Call Trace: [ 204.565157][T12830] dump_stack+0x1d8/0x2f8 [ 204.565171][T12830] should_fail+0x608/0x860 [ 204.565184][T12830] ? setup_fault_attr+0x2b0/0x2b0 [ 204.565197][T12830] ? sock_kmalloc+0xac/0x120 [ 204.565212][T12830] __should_failslab+0x11a/0x160 [ 204.565224][T12830] ? sock_kmalloc+0xac/0x120 [ 204.565233][T12830] should_failslab+0x9/0x20 [ 204.565240][T12830] __kmalloc+0x7a/0x310 [ 204.565256][T12830] sock_kmalloc+0xac/0x120 [ 204.587889][T12830] af_alg_alloc_areq+0x28/0x180 [ 204.587901][T12830] aead_recvmsg+0x51e/0x1c50 [ 204.587926][T12830] ? aead_sendmsg+0x110/0x110 [ 204.587954][T12830] ? __might_fault+0xf9/0x160 [ 204.595549][T12830] ? kasan_check_write+0x14/0x20 [ 204.655617][T12830] ? _copy_from_user+0xe0/0x120 [ 204.660458][T12830] ? rw_copy_check_uvector+0x2e4/0x310 [ 204.665917][T12830] ? import_iovec+0x17e/0x340 [ 204.670592][T12830] ? __might_fault+0xf9/0x160 [ 204.675265][T12830] ? security_socket_recvmsg+0xa9/0xd0 [ 204.680714][T12830] ? aead_sendmsg+0x110/0x110 [ 204.685383][T12830] sock_recvmsg+0xe7/0x100 [ 204.689792][T12830] ___sys_recvmsg+0x28b/0x9c0 [ 204.694463][T12830] ? __sys_recvmsg+0x250/0x250 [ 204.699221][T12830] ? rcu_lock_release+0xd/0x30 [ 204.703984][T12830] ? rcu_lock_release+0x26/0x30 [ 204.708825][T12830] ? __fget+0x4fe/0x540 [ 204.712978][T12830] ? fget_many+0x30/0x30 [ 204.717207][T12830] ? __mutex_lock_common+0x56b/0x2fc0 [ 204.722743][T12830] ? __fdget+0x17c/0x200 [ 204.727070][T12830] do_recvmmsg+0x33d/0x870 [ 204.731479][T12830] ? __sys_recvmmsg+0x220/0x220 [ 204.736316][T12830] ? kasan_check_write+0x14/0x20 [ 204.741240][T12830] ? __mutex_unlock_slowpath+0x18c/0x630 [ 204.746868][T12830] ? kasan_check_write+0x14/0x20 [ 204.751793][T12830] ? fput_many+0x47/0x1a0 [ 204.756121][T12830] ? check_preemption_disabled+0xb7/0x280 [ 204.761831][T12830] __x64_sys_recvmmsg+0x17c/0x220 [ 204.766847][T12830] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 204.772861][T12830] ? do_recvmmsg+0x870/0x870 [ 204.777437][T12830] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 204.783146][T12830] ? do_syscall_64+0x1d/0x140 [ 204.787820][T12830] do_syscall_64+0xfe/0x140 [ 204.792315][T12830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.798201][T12830] RIP: 0033:0x459519 [ 204.802082][T12830] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 204.821670][T12830] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 204.830075][T12830] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 204.838038][T12830] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 204.846002][T12830] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 204.853960][T12830] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 [ 204.861928][T12830] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 204.871045][T12828] CPU: 0 PID: 12828 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 204.878945][T12828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.889084][T12828] Call Trace: [ 204.892382][T12828] dump_stack+0x1d8/0x2f8 [ 204.896712][T12828] should_fail+0x608/0x860 [ 204.901391][T12828] ? setup_fault_attr+0x2b0/0x2b0 [ 204.906429][T12828] ? sock_kmalloc+0xac/0x120 [ 204.911041][T12828] __should_failslab+0x11a/0x160 [ 204.915983][T12828] ? sock_kmalloc+0xac/0x120 [ 204.920567][T12828] should_failslab+0x9/0x20 [ 204.925060][T12828] __kmalloc+0x7a/0x310 [ 204.929214][T12828] sock_kmalloc+0xac/0x120 [ 204.933632][T12828] af_alg_alloc_areq+0x28/0x180 [ 204.938482][T12828] aead_recvmsg+0x51e/0x1c50 [ 204.944604][T12828] ? aead_sendmsg+0x110/0x110 [ 204.949291][T12828] ? __might_fault+0xf9/0x160 [ 204.953969][T12828] ? kasan_check_write+0x14/0x20 [ 204.958892][T12828] ? _copy_from_user+0xe0/0x120 [ 204.963734][T12828] ? rw_copy_check_uvector+0x2e4/0x310 [ 204.969196][T12828] ? import_iovec+0x17e/0x340 [ 204.973873][T12828] ? __might_fault+0xf9/0x160 [ 204.978545][T12828] ? security_socket_recvmsg+0xa9/0xd0 [ 204.983996][T12828] ? aead_sendmsg+0x110/0x110 [ 204.988842][T12828] sock_recvmsg+0xe7/0x100 [ 204.993258][T12828] ___sys_recvmsg+0x28b/0x9c0 [ 204.997943][T12828] ? __sys_recvmsg+0x250/0x250 [ 205.002707][T12828] ? rcu_lock_release+0xd/0x30 [ 205.007470][T12828] ? rcu_lock_release+0x26/0x30 [ 205.012309][T12828] ? __fget+0x4fe/0x540 [ 205.016463][T12828] ? fget_many+0x30/0x30 [ 205.020695][T12828] ? trace_hardirqs_on_caller+0x74/0x80 [ 205.026236][T12828] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 205.031687][T12828] ? __fdget+0x17c/0x200 [ 205.035921][T12828] do_recvmmsg+0x33d/0x870 [ 205.040341][T12828] ? __sys_recvmmsg+0x220/0x220 [ 205.045180][T12828] ? kasan_check_write+0x14/0x20 [ 205.050107][T12828] ? __mutex_unlock_slowpath+0x18c/0x630 [ 205.055735][T12828] ? kasan_check_write+0x14/0x20 [ 205.060658][T12828] ? fput_many+0x47/0x1a0 [ 205.064982][T12828] ? check_preemption_disabled+0xb7/0x280 [ 205.070697][T12828] __x64_sys_recvmmsg+0x17c/0x220 [ 205.075717][T12828] ? do_recvmmsg+0x870/0x870 [ 205.080293][T12828] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 205.086011][T12828] ? do_syscall_64+0x1d/0x140 [ 205.090682][T12828] do_syscall_64+0xfe/0x140 [ 205.095183][T12828] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 205.101065][T12828] RIP: 0033:0x459519 23:26:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 205.104952][T12828] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 205.125196][T12828] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 205.133605][T12828] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 205.141565][T12828] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 205.149527][T12828] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 205.157486][T12828] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 205.165450][T12828] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:32 executing program 3 (fault-call:6 fault-nth:34): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:32 executing program 5: syz_read_part_table(0x4c00, 0x0, 0x0) 23:26:32 executing program 1 (fault-call:6 fault-nth:39): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 205.273595][T12842] FAULT_INJECTION: forcing a failure. [ 205.273595][T12842] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 205.286819][T12842] CPU: 1 PID: 12842 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 205.286825][T12842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.286832][T12842] Call Trace: [ 205.296630][T12841] FAULT_INJECTION: forcing a failure. [ 205.296630][T12841] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 205.304797][T12842] dump_stack+0x1d8/0x2f8 [ 205.325738][T12842] should_fail+0x608/0x860 [ 205.330137][T12842] ? setup_fault_attr+0x2b0/0x2b0 [ 205.335154][T12842] should_fail_alloc_page+0x55/0x60 [ 205.340333][T12842] prepare_alloc_pages+0x283/0x460 [ 205.345428][T12842] __alloc_pages_nodemask+0x11c/0x790 [ 205.350873][T12842] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 205.356399][T12842] ? do_raw_spin_lock+0x143/0x3a0 [ 205.361410][T12842] ? _raw_spin_unlock_irqrestore+0x77/0xe0 [ 205.367197][T12842] kmem_getpages+0x46/0x480 [ 205.371942][T12842] cache_grow_begin+0x7e/0x2c0 [ 205.376684][T12842] cache_alloc_refill+0x311/0x3f0 [ 205.381690][T12842] ? check_preemption_disabled+0xb7/0x280 [ 205.387393][T12842] __kmalloc+0x2e5/0x310 [ 205.391785][T12842] ? sock_kmalloc+0xac/0x120 [ 205.396365][T12842] sock_kmalloc+0xac/0x120 [ 205.400759][T12842] af_alg_alloc_areq+0x28/0x180 [ 205.405587][T12842] aead_recvmsg+0x51e/0x1c50 [ 205.410174][T12842] ? aead_sendmsg+0x110/0x110 [ 205.414841][T12842] ? __might_fault+0xf9/0x160 [ 205.419506][T12842] ? kasan_check_write+0x14/0x20 [ 205.424420][T12842] ? _copy_from_user+0xe0/0x120 [ 205.429264][T12842] ? rw_copy_check_uvector+0x2e4/0x310 [ 205.434711][T12842] ? import_iovec+0x17e/0x340 [ 205.439382][T12842] ? __might_fault+0xf9/0x160 [ 205.444051][T12842] ? security_socket_recvmsg+0xa9/0xd0 [ 205.449489][T12842] ? aead_sendmsg+0x110/0x110 [ 205.454149][T12842] sock_recvmsg+0xe7/0x100 [ 205.458633][T12842] ___sys_recvmsg+0x28b/0x9c0 [ 205.463299][T12842] ? __sys_recvmsg+0x250/0x250 [ 205.468047][T12842] ? rcu_lock_release+0xd/0x30 [ 205.472801][T12842] ? rcu_lock_release+0x26/0x30 [ 205.477628][T12842] ? __fget+0x4fe/0x540 [ 205.481776][T12842] ? fget_many+0x30/0x30 [ 205.486000][T12842] ? __mutex_lock_common+0x56b/0x2fc0 [ 205.491364][T12842] ? __fdget+0x17c/0x200 [ 205.495599][T12842] do_recvmmsg+0x33d/0x870 [ 205.500129][T12842] ? __sys_recvmmsg+0x220/0x220 [ 205.504958][T12842] ? kasan_check_write+0x14/0x20 [ 205.509871][T12842] ? __mutex_unlock_slowpath+0x18c/0x630 [ 205.515490][T12842] ? kasan_check_write+0x14/0x20 [ 205.520403][T12842] ? fput_many+0x47/0x1a0 [ 205.524710][T12842] ? check_preemption_disabled+0xb7/0x280 [ 205.530413][T12842] __x64_sys_recvmmsg+0x17c/0x220 [ 205.535419][T12842] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 205.541027][T12842] ? do_recvmmsg+0x870/0x870 [ 205.545596][T12842] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 205.551386][T12842] ? do_syscall_64+0x1d/0x140 [ 205.556048][T12842] do_syscall_64+0xfe/0x140 [ 205.560532][T12842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 205.566489][T12842] RIP: 0033:0x459519 [ 205.570382][T12842] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 205.589966][T12842] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 205.599149][T12842] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 205.607118][T12842] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 205.615066][T12842] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 205.623015][T12842] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 205.631137][T12842] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 [ 205.639366][T12841] CPU: 0 PID: 12841 Comm: syz-executor.3 Not tainted 5.2.0-rc6+ #9 [ 205.647251][T12841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.657307][T12841] Call Trace: [ 205.660597][T12841] dump_stack+0x1d8/0x2f8 [ 205.664924][T12841] should_fail+0x608/0x860 [ 205.669335][T12841] ? setup_fault_attr+0x2b0/0x2b0 [ 205.674370][T12841] should_fail_alloc_page+0x55/0x60 [ 205.679648][T12841] prepare_alloc_pages+0x283/0x460 [ 205.684752][T12841] __alloc_pages_nodemask+0x11c/0x790 [ 205.690113][T12841] ? retint_kernel+0x2b/0x2b [ 205.694694][T12841] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 205.700142][T12841] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 205.705677][T12841] ? rcu_irq_exit+0x118/0x2b0 [ 205.710357][T12841] kmem_getpages+0x46/0x480 [ 205.714850][T12841] cache_grow_begin+0x7e/0x2c0 [ 205.719613][T12841] cache_alloc_refill+0x311/0x3f0 [ 205.724633][T12841] ? check_preemption_disabled+0xb7/0x280 [ 205.730344][T12841] __kmalloc+0x2e5/0x310 [ 205.734576][T12841] ? sock_kmalloc+0xac/0x120 [ 205.739161][T12841] sock_kmalloc+0xac/0x120 [ 205.743573][T12841] af_alg_alloc_areq+0x28/0x180 [ 205.748417][T12841] aead_recvmsg+0x51e/0x1c50 [ 205.753194][T12841] ? aead_sendmsg+0x110/0x110 [ 205.757880][T12841] ? __might_fault+0xf9/0x160 [ 205.762557][T12841] ? kasan_check_write+0x14/0x20 [ 205.767487][T12841] ? _copy_from_user+0xe0/0x120 [ 205.772337][T12841] ? rw_copy_check_uvector+0x2e4/0x310 [ 205.777909][T12841] ? import_iovec+0x17e/0x340 [ 205.782578][T12841] ? __might_fault+0xf9/0x160 [ 205.787247][T12841] ? security_socket_recvmsg+0xa9/0xd0 [ 205.792711][T12841] ? aead_sendmsg+0x110/0x110 [ 205.797380][T12841] sock_recvmsg+0xe7/0x100 [ 205.801809][T12841] ___sys_recvmsg+0x28b/0x9c0 [ 205.806484][T12841] ? __sys_recvmsg+0x250/0x250 [ 205.811252][T12841] ? rcu_lock_release+0xd/0x30 [ 205.816018][T12841] ? rcu_lock_release+0x26/0x30 [ 205.820893][T12841] ? __fget+0x4fe/0x540 [ 205.825048][T12841] ? fget_many+0x30/0x30 [ 205.829288][T12841] ? __fdget+0x17c/0x200 [ 205.833525][T12841] do_recvmmsg+0x33d/0x870 [ 205.837946][T12841] ? __sys_recvmmsg+0x220/0x220 [ 205.842784][T12841] ? kasan_check_write+0x14/0x20 [ 205.847717][T12841] ? __mutex_unlock_slowpath+0x18c/0x630 [ 205.853348][T12841] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 205.858795][T12841] ? retint_kernel+0x2b/0x2b [ 205.863381][T12841] ? trace_hardirqs_on_caller+0x74/0x80 [ 205.868915][T12841] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 205.874378][T12841] __x64_sys_recvmmsg+0x17c/0x220 [ 205.879389][T12841] ? retint_kernel+0x2b/0x2b [ 205.883971][T12841] ? do_recvmmsg+0x870/0x870 [ 205.888551][T12841] ? do_syscall_64+0x90/0x140 [ 205.893216][T12841] ? do_syscall_64+0xac/0x140 [ 205.897888][T12841] do_syscall_64+0xfe/0x140 [ 205.902387][T12841] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 205.908267][T12841] RIP: 0033:0x459519 [ 205.912159][T12841] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 205.931751][T12841] RSP: 002b:00007f3b465e5c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 205.940155][T12841] RAX: ffffffffffffffda RBX: 00007f3b465e5c90 RCX: 0000000000459519 [ 205.948114][T12841] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 205.956084][T12841] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 205.964050][T12841] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b465e66d4 23:26:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4888}}], 0x1, 0x0, 0x0) 23:26:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 205.972014][T12841] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x5865}}], 0x1, 0x0, 0x0) 23:26:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}}], 0x1, 0x0, 0x0) 23:26:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:33 executing program 5: syz_read_part_table(0x5c00, 0x0, 0x0) 23:26:33 executing program 1 (fault-call:6 fault-nth:40): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 23:26:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x6558}}], 0x1, 0x0, 0x0) 23:26:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x3, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 23:26:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x7ec0}}], 0x1, 0x0, 0x0) [ 206.474519][T12885] FAULT_INJECTION: forcing a failure. [ 206.474519][T12885] name failslab, interval 1, probability 0, space 0, times 0 [ 206.489619][T12885] CPU: 0 PID: 12885 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 206.497545][T12885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.507597][T12885] Call Trace: [ 206.510887][T12885] dump_stack+0x1d8/0x2f8 [ 206.515212][T12885] should_fail+0x608/0x860 [ 206.519622][T12885] ? setup_fault_attr+0x2b0/0x2b0 [ 206.524648][T12885] __should_failslab+0x11a/0x160 [ 206.529578][T12885] ? sock_kmalloc+0xac/0x120 [ 206.534162][T12885] should_failslab+0x9/0x20 [ 206.538653][T12885] __kmalloc+0x7a/0x310 [ 206.542810][T12885] sock_kmalloc+0xac/0x120 [ 206.547221][T12885] af_alg_alloc_areq+0x28/0x180 [ 206.552066][T12885] aead_recvmsg+0x51e/0x1c50 [ 206.556674][T12885] ? aead_sendmsg+0x110/0x110 [ 206.561339][T12885] ? rcu_irq_exit+0x118/0x2b0 [ 206.566007][T12885] ? retint_kernel+0x2b/0x2b [ 206.570596][T12885] ? __might_fault+0xf9/0x160 [ 206.575290][T12885] ? kasan_check_write+0x14/0x20 [ 206.580221][T12885] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 206.585668][T12885] ? retint_kernel+0x2b/0x2b [ 206.590249][T12885] ? trace_hardirqs_on_caller+0x74/0x80 [ 206.595783][T12885] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 206.601230][T12885] ? rcu_irq_exit+0x118/0x2b0 [ 206.605906][T12885] ? security_socket_recvmsg+0xa9/0xd0 [ 206.611351][T12885] ? aead_sendmsg+0x110/0x110 [ 206.616019][T12885] sock_recvmsg+0xe7/0x100 [ 206.620438][T12885] ___sys_recvmsg+0x28b/0x9c0 [ 206.625123][T12885] ? __sys_recvmsg+0x250/0x250 [ 206.629888][T12885] ? rcu_lock_release+0xd/0x30 [ 206.634646][T12885] ? rcu_lock_release+0x26/0x30 [ 206.639487][T12885] ? __fget+0x4fe/0x540 [ 206.643639][T12885] ? fget_many+0x30/0x30 [ 206.647873][T12885] ? __mutex_lock_common+0x56b/0x2fc0 [ 206.653238][T12885] ? __fdget+0x17c/0x200 [ 206.657470][T12885] do_recvmmsg+0x33d/0x870 [ 206.661886][T12885] ? __sys_recvmmsg+0x220/0x220 [ 206.666731][T12885] ? kasan_check_write+0x14/0x20 [ 206.671656][T12885] ? __mutex_unlock_slowpath+0x18c/0x630 [ 206.677285][T12885] ? kasan_check_write+0x14/0x20 [ 206.682214][T12885] ? fput_many+0x47/0x1a0 [ 206.686533][T12885] ? check_preemption_disabled+0xb7/0x280 [ 206.692251][T12885] __x64_sys_recvmmsg+0x17c/0x220 [ 206.697282][T12885] ? do_recvmmsg+0x870/0x870 [ 206.701873][T12885] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 206.707585][T12885] ? do_syscall_64+0x1d/0x140 [ 206.712260][T12885] do_syscall_64+0xfe/0x140 [ 206.716756][T12885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.722642][T12885] RIP: 0033:0x459519 [ 206.726612][T12885] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 206.746212][T12885] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 206.754708][T12885] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 206.762686][T12885] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 23:26:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x300, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 206.770646][T12885] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 206.778612][T12885] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 206.786587][T12885] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:34 executing program 5: syz_read_part_table(0x6800, 0x0, 0x0) 23:26:34 executing program 1 (fault-call:6 fault-nth:41): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) 23:26:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}}], 0x1, 0x0, 0x0) [ 206.924883][T12901] FAULT_INJECTION: forcing a failure. [ 206.924883][T12901] name failslab, interval 1, probability 0, space 0, times 0 [ 206.980640][T12901] CPU: 1 PID: 12901 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 206.988574][T12901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.998716][T12901] Call Trace: [ 207.002013][T12901] dump_stack+0x1d8/0x2f8 [ 207.006348][T12901] should_fail+0x608/0x860 [ 207.010767][T12901] ? setup_fault_attr+0x2b0/0x2b0 [ 207.015796][T12901] ? sock_kmalloc+0xac/0x120 [ 207.020388][T12901] __should_failslab+0x11a/0x160 [ 207.025327][T12901] ? sock_kmalloc+0xac/0x120 23:26:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 207.029909][T12901] should_failslab+0x9/0x20 [ 207.034411][T12901] __kmalloc+0x7a/0x310 [ 207.038567][T12901] sock_kmalloc+0xac/0x120 [ 207.042964][T12901] af_alg_alloc_areq+0x28/0x180 [ 207.047797][T12901] aead_recvmsg+0x51e/0x1c50 [ 207.052391][T12901] ? aead_sendmsg+0x110/0x110 [ 207.057103][T12901] ? __might_fault+0xf9/0x160 [ 207.061757][T12901] ? kasan_check_write+0x14/0x20 [ 207.066700][T12901] ? _copy_from_user+0xe0/0x120 [ 207.071538][T12901] ? rw_copy_check_uvector+0x2e4/0x310 [ 207.076976][T12901] ? import_iovec+0x17e/0x340 [ 207.081623][T12901] ? __might_fault+0xf9/0x160 [ 207.086284][T12901] ? security_socket_recvmsg+0xa9/0xd0 [ 207.091725][T12901] ? aead_sendmsg+0x110/0x110 [ 207.096385][T12901] sock_recvmsg+0xe7/0x100 [ 207.100783][T12901] ___sys_recvmsg+0x28b/0x9c0 [ 207.105448][T12901] ? __sys_recvmsg+0x250/0x250 [ 207.111716][T12901] ? rcu_lock_release+0xd/0x30 [ 207.116476][T12901] ? rcu_lock_release+0x26/0x30 [ 207.121395][T12901] ? __fget+0x4fe/0x540 [ 207.125540][T12901] ? fget_many+0x30/0x30 [ 207.129774][T12901] ? __mutex_lock_common+0x56b/0x2fc0 [ 207.135127][T12901] ? __fdget+0x17c/0x200 [ 207.139347][T12901] do_recvmmsg+0x33d/0x870 [ 207.143760][T12901] ? __sys_recvmmsg+0x220/0x220 [ 207.148600][T12901] ? kasan_check_write+0x14/0x20 [ 207.153514][T12901] ? __mutex_unlock_slowpath+0x18c/0x630 [ 207.159132][T12901] ? kasan_check_write+0x14/0x20 [ 207.164055][T12901] ? fput_many+0x47/0x1a0 [ 207.168368][T12901] ? check_preemption_disabled+0xb7/0x280 [ 207.174066][T12901] __x64_sys_recvmmsg+0x17c/0x220 [ 207.179065][T12901] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 207.184679][T12901] ? do_recvmmsg+0x870/0x870 [ 207.189253][T12901] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 207.194946][T12901] ? do_syscall_64+0x1d/0x140 [ 207.199599][T12901] do_syscall_64+0xfe/0x140 [ 207.204089][T12901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.209986][T12901] RIP: 0033:0x459519 23:26:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00), 0x0, 0x0, 0x0) [ 207.213858][T12901] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 207.233438][T12901] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 207.241823][T12901] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 207.249788][T12901] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 207.257747][T12901] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 207.265711][T12901] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 207.273670][T12901] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x4000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:34 executing program 1 (fault-call:6 fault-nth:42): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00), 0x0, 0x0, 0x0) 23:26:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x8847}}], 0x1, 0x0, 0x0) 23:26:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:34 executing program 5: syz_read_part_table(0x6c00, 0x0, 0x0) 23:26:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00), 0x0, 0x0, 0x0) [ 207.432335][T12922] FAULT_INJECTION: forcing a failure. [ 207.432335][T12922] name failslab, interval 1, probability 0, space 0, times 0 [ 207.473224][T12922] CPU: 0 PID: 12922 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 207.473234][T12922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.491188][T12922] Call Trace: [ 207.491208][T12922] dump_stack+0x1d8/0x2f8 [ 207.491229][T12922] should_fail+0x608/0x860 [ 207.491242][T12922] ? setup_fault_attr+0x2b0/0x2b0 [ 207.491258][T12922] ? sock_kmalloc+0xac/0x120 [ 207.512818][T12922] __should_failslab+0x11a/0x160 [ 207.512833][T12922] ? sock_kmalloc+0xac/0x120 [ 207.512850][T12922] should_failslab+0x9/0x20 [ 207.526839][T12922] __kmalloc+0x7a/0x310 [ 207.526874][T12922] sock_kmalloc+0xac/0x120 [ 207.535400][T12922] af_alg_alloc_areq+0x28/0x180 [ 207.535413][T12922] aead_recvmsg+0x51e/0x1c50 [ 207.535441][T12922] ? aead_sendmsg+0x110/0x110 [ 207.535464][T12922] ? __might_fault+0xf9/0x160 [ 207.535484][T12922] ? kasan_check_write+0x14/0x20 [ 207.544962][T12922] ? _copy_from_user+0xe0/0x120 [ 207.544976][T12922] ? rw_copy_check_uvector+0x2e4/0x310 [ 207.544993][T12922] ? import_iovec+0x17e/0x340 [ 207.545001][T12922] ? __might_fault+0xf9/0x160 [ 207.545021][T12922] ? security_socket_recvmsg+0xa9/0xd0 [ 207.545031][T12922] ? aead_sendmsg+0x110/0x110 [ 207.588935][T12922] sock_recvmsg+0xe7/0x100 [ 207.593351][T12922] ___sys_recvmsg+0x28b/0x9c0 [ 207.598373][T12922] ? __sys_recvmsg+0x250/0x250 [ 207.603145][T12922] ? rcu_lock_release+0xd/0x30 [ 207.607921][T12922] ? rcu_lock_release+0x26/0x30 [ 207.612764][T12922] ? __fget+0x4fe/0x540 [ 207.616916][T12922] ? fget_many+0x30/0x30 [ 207.621241][T12922] ? __mutex_lock_common+0x56b/0x2fc0 [ 207.626609][T12922] ? __fdget+0x17c/0x200 [ 207.630848][T12922] do_recvmmsg+0x33d/0x870 [ 207.635268][T12922] ? __sys_recvmmsg+0x220/0x220 [ 207.640112][T12922] ? kasan_check_write+0x14/0x20 [ 207.645042][T12922] ? __mutex_unlock_slowpath+0x18c/0x630 [ 207.650671][T12922] ? kasan_check_write+0x14/0x20 [ 207.655598][T12922] ? fput_many+0x47/0x1a0 [ 207.659921][T12922] ? check_preemption_disabled+0xb7/0x280 [ 207.665638][T12922] __x64_sys_recvmmsg+0x17c/0x220 [ 207.670657][T12922] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 207.676280][T12922] ? do_recvmmsg+0x870/0x870 [ 207.680865][T12922] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 207.686578][T12922] ? do_syscall_64+0x1d/0x140 [ 207.691250][T12922] do_syscall_64+0xfe/0x140 [ 207.695749][T12922] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.701631][T12922] RIP: 0033:0x459519 23:26:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x8848}}], 0x1, 0x0, 0x0) [ 207.705512][T12922] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 207.725107][T12922] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 207.733509][T12922] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 207.741471][T12922] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 207.749432][T12922] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 207.757393][T12922] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 207.765355][T12922] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x1000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:26:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc00e}}], 0x1, 0x0, 0x0) 23:26:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:35 executing program 1 (fault-call:6 fault-nth:43): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 207.950652][T12947] FAULT_INJECTION: forcing a failure. [ 207.950652][T12947] name failslab, interval 1, probability 0, space 0, times 0 [ 207.973068][T12947] CPU: 1 PID: 12947 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 207.980981][T12947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.991030][T12947] Call Trace: [ 207.994313][T12947] dump_stack+0x1d8/0x2f8 [ 207.998643][T12947] should_fail+0x608/0x860 [ 208.003063][T12947] ? setup_fault_attr+0x2b0/0x2b0 [ 208.008092][T12947] ? sock_kmalloc+0xac/0x120 [ 208.012788][T12947] __should_failslab+0x11a/0x160 [ 208.017724][T12947] ? sock_kmalloc+0xac/0x120 [ 208.022307][T12947] should_failslab+0x9/0x20 [ 208.026802][T12947] __kmalloc+0x7a/0x310 [ 208.030952][T12947] sock_kmalloc+0xac/0x120 [ 208.035359][T12947] af_alg_alloc_areq+0x28/0x180 [ 208.040201][T12947] aead_recvmsg+0x51e/0x1c50 [ 208.044803][T12947] ? aead_sendmsg+0x110/0x110 [ 208.049484][T12947] ? __might_fault+0xf9/0x160 [ 208.054165][T12947] ? kasan_check_write+0x14/0x20 [ 208.059092][T12947] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 208.064551][T12947] ? retint_kernel+0x2b/0x2b [ 208.069131][T12947] ? trace_hardirqs_on_caller+0x74/0x80 [ 208.074666][T12947] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 208.080123][T12947] ? rcu_irq_exit+0x118/0x2b0 [ 208.084798][T12947] ? security_socket_recvmsg+0xa9/0xd0 [ 208.090247][T12947] ? aead_sendmsg+0x110/0x110 [ 208.094915][T12947] sock_recvmsg+0xe7/0x100 23:26:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc07e}}], 0x1, 0x0, 0x0) [ 208.099326][T12947] ___sys_recvmsg+0x28b/0x9c0 [ 208.104005][T12947] ? __sys_recvmsg+0x250/0x250 [ 208.108767][T12947] ? rcu_lock_release+0xd/0x30 [ 208.113526][T12947] ? rcu_lock_release+0x26/0x30 [ 208.118364][T12947] ? __fget+0x4fe/0x540 [ 208.122529][T12947] ? fget_many+0x30/0x30 [ 208.126775][T12947] ? trace_hardirqs_on_caller+0x74/0x80 [ 208.132318][T12947] ? __fdget+0x17c/0x200 [ 208.136555][T12947] do_recvmmsg+0x33d/0x870 [ 208.140971][T12947] ? __sys_recvmmsg+0x220/0x220 [ 208.145821][T12947] ? retint_kernel+0x2b/0x2b [ 208.150412][T12947] ? trace_hardirqs_on_caller+0x74/0x80 [ 208.155955][T12947] ? retint_kernel+0x2b/0x2b [ 208.160532][T12947] __x64_sys_recvmmsg+0x17c/0x220 [ 208.165538][T12947] ? do_recvmmsg+0x870/0x870 [ 208.170102][T12947] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 208.175799][T12947] ? do_syscall_64+0x1d/0x140 [ 208.180455][T12947] do_syscall_64+0xfe/0x140 [ 208.184932][T12947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.190796][T12947] RIP: 0033:0x459519 [ 208.194663][T12947] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 208.214420][T12947] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 208.222802][T12947] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 208.230752][T12947] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 208.238699][T12947] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:26:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 208.246990][T12947] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 208.255198][T12947] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:35 executing program 5: syz_read_part_table(0x7400, 0x0, 0x0) 23:26:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x3000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:26:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xd002}}], 0x1, 0x0, 0x0) 23:26:35 executing program 1 (fault-call:6 fault-nth:44): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1a000}}], 0x1, 0x0, 0x0) 23:26:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 23:26:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x40000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}}], 0x1, 0x0, 0x0) 23:26:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) 23:26:35 executing program 5: syz_read_part_table(0x7a00, 0x0, 0x0) 23:26:35 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0, 0x0) 23:26:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)}}], 0x1, 0x0, 0x0) [ 208.872631][T13000] FAULT_INJECTION: forcing a failure. [ 208.872631][T13000] name failslab, interval 1, probability 0, space 0, times 0 [ 208.891076][T13000] CPU: 0 PID: 13000 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 208.898979][T13000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.909026][T13000] Call Trace: [ 208.912315][T13000] dump_stack+0x1d8/0x2f8 [ 208.916652][T13000] should_fail+0x608/0x860 [ 208.921066][T13000] ? setup_fault_attr+0x2b0/0x2b0 [ 208.926082][T13000] ? sock_kmalloc+0xac/0x120 [ 208.930669][T13000] __should_failslab+0x11a/0x160 [ 208.935605][T13000] ? sock_kmalloc+0xac/0x120 [ 208.941716][T13000] should_failslab+0x9/0x20 [ 208.946213][T13000] __kmalloc+0x7a/0x310 [ 208.950376][T13000] sock_kmalloc+0xac/0x120 [ 208.958341][T13000] af_alg_alloc_areq+0x28/0x180 [ 208.963184][T13000] aead_recvmsg+0x51e/0x1c50 [ 208.967788][T13000] ? aead_sendmsg+0x110/0x110 [ 208.972473][T13000] ? __might_fault+0xf9/0x160 [ 208.977155][T13000] ? kasan_check_write+0x14/0x20 [ 208.982083][T13000] ? _copy_from_user+0xe0/0x120 [ 208.986922][T13000] ? rw_copy_check_uvector+0x2e4/0x310 [ 208.992807][T13000] ? import_iovec+0x17e/0x340 [ 208.997468][T13000] ? __might_fault+0xf9/0x160 [ 209.002136][T13000] ? security_socket_recvmsg+0xa9/0xd0 [ 209.007580][T13000] ? aead_sendmsg+0x110/0x110 [ 209.012244][T13000] sock_recvmsg+0xe7/0x100 [ 209.016655][T13000] ___sys_recvmsg+0x28b/0x9c0 [ 209.021327][T13000] ? __sys_recvmsg+0x250/0x250 [ 209.026091][T13000] ? rcu_lock_release+0xd/0x30 [ 209.030846][T13000] ? rcu_lock_release+0x26/0x30 [ 209.035686][T13000] ? __fget+0x4fe/0x540 [ 209.039839][T13000] ? fget_many+0x30/0x30 [ 209.044075][T13000] ? __mutex_lock_common+0x56b/0x2fc0 [ 209.049439][T13000] ? __fdget+0x17c/0x200 [ 209.053671][T13000] do_recvmmsg+0x33d/0x870 [ 209.058171][T13000] ? __sys_recvmmsg+0x220/0x220 [ 209.063011][T13000] ? kasan_check_write+0x14/0x20 [ 209.067945][T13000] ? __mutex_unlock_slowpath+0x18c/0x630 [ 209.073571][T13000] ? kasan_check_write+0x14/0x20 [ 209.078521][T13000] ? fput_many+0x47/0x1a0 [ 209.082844][T13000] ? check_preemption_disabled+0xb7/0x280 [ 209.088562][T13000] __x64_sys_recvmmsg+0x17c/0x220 [ 209.093575][T13000] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 209.099199][T13000] ? do_recvmmsg+0x870/0x870 [ 209.103779][T13000] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 209.110067][T13000] ? do_syscall_64+0x1d/0x140 [ 209.114741][T13000] do_syscall_64+0xfe/0x140 [ 209.119237][T13000] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.125120][T13000] RIP: 0033:0x459519 [ 209.129025][T13000] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 209.149221][T13000] RSP: 002b:00007f6eeea65c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 209.157622][T13000] RAX: ffffffffffffffda RBX: 00007f6eeea65c90 RCX: 0000000000459519 [ 209.165580][T13000] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 23:26:36 executing program 1 (fault-call:6 fault-nth:45): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}}], 0x1, 0x0, 0x0) 23:26:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x8dffffff, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) [ 209.173541][T13000] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 209.181507][T13000] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea666d4 [ 209.189465][T13000] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:36 executing program 5: syz_read_part_table(0x80000, 0x0, 0x0) 23:26:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xa00100}}], 0x1, 0x0, 0x0) 23:26:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) [ 209.320896][T13011] FAULT_INJECTION: forcing a failure. [ 209.320896][T13011] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 209.334125][T13011] CPU: 1 PID: 13011 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 209.334133][T13011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.334137][T13011] Call Trace: [ 209.334153][T13011] dump_stack+0x1d8/0x2f8 [ 209.334168][T13011] should_fail+0x608/0x860 [ 209.364343][T13011] ? setup_fault_attr+0x2b0/0x2b0 [ 209.369378][T13011] should_fail_alloc_page+0x55/0x60 [ 209.374560][T13011] prepare_alloc_pages+0x283/0x460 [ 209.374575][T13011] __alloc_pages_nodemask+0x11c/0x790 [ 209.374589][T13011] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 209.390640][T13011] ? do_raw_spin_lock+0x143/0x3a0 [ 209.395668][T13011] ? _raw_spin_unlock_irqrestore+0x77/0xe0 [ 209.401500][T13011] kmem_getpages+0x46/0x480 [ 209.405997][T13011] cache_grow_begin+0x7e/0x2c0 [ 209.410749][T13011] cache_alloc_refill+0x311/0x3f0 [ 209.415763][T13011] ? check_preemption_disabled+0xb7/0x280 [ 209.421481][T13011] __kmalloc+0x2e5/0x310 [ 209.425898][T13011] ? sock_kmalloc+0xac/0x120 [ 209.430479][T13011] sock_kmalloc+0xac/0x120 [ 209.434886][T13011] af_alg_alloc_areq+0x28/0x180 [ 209.439729][T13011] aead_recvmsg+0x51e/0x1c50 [ 209.444426][T13011] ? aead_sendmsg+0x110/0x110 [ 209.449106][T13011] ? __might_fault+0xf9/0x160 [ 209.453786][T13011] ? kasan_check_write+0x14/0x20 [ 209.459319][T13011] ? _copy_from_user+0xe0/0x120 [ 209.464164][T13011] ? rw_copy_check_uvector+0x2e4/0x310 [ 209.469621][T13011] ? import_iovec+0x17e/0x340 [ 209.474288][T13011] ? __might_fault+0xf9/0x160 [ 209.478961][T13011] ? security_socket_recvmsg+0xa9/0xd0 [ 209.484405][T13011] ? aead_sendmsg+0x110/0x110 [ 209.489075][T13011] sock_recvmsg+0xe7/0x100 [ 209.493487][T13011] ___sys_recvmsg+0x28b/0x9c0 [ 209.498161][T13011] ? __sys_recvmsg+0x250/0x250 [ 209.502927][T13011] ? rcu_lock_release+0xd/0x30 [ 209.507689][T13011] ? rcu_lock_release+0x26/0x30 [ 209.512528][T13011] ? __fget+0x4fe/0x540 [ 209.516684][T13011] ? fget_many+0x30/0x30 [ 209.520919][T13011] ? __mutex_lock_common+0x56b/0x2fc0 [ 209.526284][T13011] ? __fdget+0x17c/0x200 [ 209.530520][T13011] do_recvmmsg+0x33d/0x870 [ 209.534940][T13011] ? __sys_recvmmsg+0x220/0x220 [ 209.539786][T13011] ? kasan_check_write+0x14/0x20 [ 209.544710][T13011] ? __mutex_unlock_slowpath+0x18c/0x630 [ 209.550344][T13011] ? kasan_check_write+0x14/0x20 [ 209.555278][T13011] ? fput_many+0x47/0x1a0 [ 209.559620][T13011] ? check_preemption_disabled+0xb7/0x280 [ 209.565342][T13011] __x64_sys_recvmmsg+0x17c/0x220 [ 209.570362][T13011] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 209.575988][T13011] ? do_recvmmsg+0x870/0x870 [ 209.580566][T13011] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 209.586273][T13011] ? do_syscall_64+0x1d/0x140 [ 209.590949][T13011] do_syscall_64+0xfe/0x140 [ 209.595543][T13011] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 209.601428][T13011] RIP: 0033:0x459519 [ 209.605318][T13011] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 209.625617][T13011] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 209.625626][T13011] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 209.625631][T13011] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 209.625636][T13011] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 209.625641][T13011] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 23:26:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xf0ffffff, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:36 executing program 1 (fault-call:6 fault-nth:46): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 209.625647][T13011] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 23:26:36 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xffffff8d, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:36 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}], 0x1, 0x0, 0x0) [ 209.752455][T13028] FAULT_INJECTION: forcing a failure. [ 209.752455][T13028] name failslab, interval 1, probability 0, space 0, times 0 [ 209.776220][T13028] CPU: 0 PID: 13028 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 209.784139][T13028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.794181][T13028] Call Trace: [ 209.797494][T13028] dump_stack+0x1d8/0x2f8 [ 209.801826][T13028] should_fail+0x608/0x860 [ 209.806219][T13028] ? setup_fault_attr+0x2b0/0x2b0 [ 209.811217][T13028] ? sock_kmalloc+0xac/0x120 [ 209.815785][T13028] __should_failslab+0x11a/0x160 [ 209.820701][T13028] ? sock_kmalloc+0xac/0x120 [ 209.825262][T13028] should_failslab+0x9/0x20 [ 209.829740][T13028] __kmalloc+0x7a/0x310 [ 209.833872][T13028] sock_kmalloc+0xac/0x120 [ 209.838265][T13028] af_alg_alloc_areq+0x28/0x180 [ 209.843088][T13028] aead_recvmsg+0x51e/0x1c50 [ 209.847665][T13028] ? aead_sendmsg+0x110/0x110 [ 209.852496][T13028] ? __might_fault+0xf9/0x160 [ 209.857149][T13028] ? kasan_check_write+0x14/0x20 [ 209.862057][T13028] ? _copy_from_user+0xe0/0x120 [ 209.866885][T13028] ? rw_copy_check_uvector+0x2e4/0x310 [ 209.872318][T13028] ? import_iovec+0x17e/0x340 [ 209.877054][T13028] ? __might_fault+0xf9/0x160 [ 209.881709][T13028] ? security_socket_recvmsg+0xa9/0xd0 [ 209.887138][T13028] ? aead_sendmsg+0x110/0x110 [ 209.891792][T13028] sock_recvmsg+0xe7/0x100 [ 209.896189][T13028] ___sys_recvmsg+0x28b/0x9c0 [ 209.900841][T13028] ? __sys_recvmsg+0x250/0x250 [ 209.905586][T13028] ? rcu_lock_release+0xd/0x30 [ 209.910387][T13028] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 209.915825][T13028] ? trace_hardirqs_on_caller+0x74/0x80 [ 209.921346][T13028] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 209.926776][T13028] ? rcu_irq_exit+0x118/0x2b0 [ 209.931432][T13028] ? retint_kernel+0x2b/0x2b [ 209.936003][T13028] do_recvmmsg+0x33d/0x870 [ 209.940402][T13028] ? __sys_recvmmsg+0x220/0x220 [ 209.945227][T13028] ? kasan_check_write+0x14/0x20 [ 209.950138][T13028] ? __mutex_unlock_slowpath+0x18c/0x630 [ 209.955749][T13028] ? kasan_check_write+0x14/0x20 [ 209.960657][T13028] ? fput_many+0x47/0x1a0 [ 209.964964][T13028] ? check_preemption_disabled+0xb7/0x280 [ 209.971094][T13028] __x64_sys_recvmmsg+0x17c/0x220 [ 209.976092][T13028] ? do_recvmmsg+0x870/0x870 [ 209.981276][T13028] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 209.986981][T13028] ? do_syscall_64+0x1d/0x140 [ 209.991635][T13028] do_syscall_64+0xfe/0x140 [ 209.996200][T13028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.002067][T13028] RIP: 0033:0x459519 [ 210.005936][T13028] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 210.025520][T13028] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 210.033994][T13028] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 210.041946][T13028] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 210.049890][T13028] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 210.057838][T13028] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 210.065797][T13028] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:37 executing program 1 (fault-call:6 fault-nth:47): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}], 0x1, 0x0, 0x0) 23:26:37 executing program 5: syz_read_part_table(0x1000000, 0x0, 0x0) 23:26:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x88', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000001700)=[{&(0x7f0000000280)=""/211, 0xd3}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) r2 = dup(r0) shutdown(r2, 0x0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r3, &(0x7f0000002700)={0x0, 0x0, &(0x7f0000001600)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7}, 0x0) shutdown(r1, 0x0) 23:26:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffff0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}}], 0x1, 0x0, 0x0) 23:26:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 210.291922][T13050] FAULT_INJECTION: forcing a failure. [ 210.291922][T13050] name failslab, interval 1, probability 0, space 0, times 0 [ 210.309875][T13050] CPU: 1 PID: 13050 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 210.317769][T13050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.327813][T13050] Call Trace: [ 210.331106][T13050] dump_stack+0x1d8/0x2f8 [ 210.335443][T13050] should_fail+0x608/0x860 [ 210.339863][T13050] ? setup_fault_attr+0x2b0/0x2b0 [ 210.344882][T13050] ? sock_kmalloc+0xac/0x120 [ 210.349472][T13050] __should_failslab+0x11a/0x160 [ 210.354402][T13050] ? sock_kmalloc+0xac/0x120 [ 210.358981][T13050] should_failslab+0x9/0x20 [ 210.363479][T13050] __kmalloc+0x7a/0x310 [ 210.367633][T13050] sock_kmalloc+0xac/0x120 [ 210.372041][T13050] af_alg_alloc_areq+0x28/0x180 [ 210.376895][T13050] aead_recvmsg+0x51e/0x1c50 [ 210.381534][T13050] ? aead_sendmsg+0x110/0x110 [ 210.386219][T13050] ? __might_fault+0xf9/0x160 [ 210.390898][T13050] ? kasan_check_write+0x14/0x20 [ 210.395827][T13050] ? _copy_from_user+0xe0/0x120 [ 210.400669][T13050] ? rw_copy_check_uvector+0x2e4/0x310 [ 210.406124][T13050] ? import_iovec+0x17e/0x340 [ 210.410792][T13050] ? __might_fault+0xf9/0x160 [ 210.415464][T13050] ? security_socket_recvmsg+0xa9/0xd0 [ 210.420919][T13050] ? aead_sendmsg+0x110/0x110 [ 210.425683][T13050] sock_recvmsg+0xe7/0x100 [ 210.430095][T13050] ___sys_recvmsg+0x28b/0x9c0 [ 210.434765][T13050] ? __sys_recvmsg+0x250/0x250 [ 210.439529][T13050] ? rcu_lock_release+0xd/0x30 [ 210.444290][T13050] ? rcu_lock_release+0x26/0x30 [ 210.449134][T13050] ? __fget+0x4fe/0x540 [ 210.453287][T13050] ? fget_many+0x30/0x30 [ 210.457525][T13050] ? __mutex_lock_common+0x56b/0x2fc0 [ 210.462888][T13050] ? __fdget+0x17c/0x200 [ 210.467125][T13050] do_recvmmsg+0x33d/0x870 [ 210.471543][T13050] ? __sys_recvmmsg+0x220/0x220 [ 210.476385][T13050] ? kasan_check_write+0x14/0x20 [ 210.481313][T13050] ? __mutex_unlock_slowpath+0x18c/0x630 [ 210.486948][T13050] ? kasan_check_write+0x14/0x20 [ 210.491874][T13050] ? fput_many+0x47/0x1a0 [ 210.496194][T13050] ? check_preemption_disabled+0xb7/0x280 [ 210.501916][T13050] __x64_sys_recvmmsg+0x17c/0x220 [ 210.507019][T13050] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 210.512644][T13050] ? do_recvmmsg+0x870/0x870 [ 210.517221][T13050] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 210.522938][T13050] ? do_syscall_64+0x1d/0x140 [ 210.527618][T13050] do_syscall_64+0xfe/0x140 [ 210.532121][T13050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.538003][T13050] RIP: 0033:0x459519 [ 210.541888][T13050] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 210.561479][T13050] RSP: 002b:00007f6eeea65c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 210.569882][T13050] RAX: ffffffffffffffda RBX: 00007f6eeea65c90 RCX: 0000000000459519 [ 210.577844][T13050] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 210.585806][T13050] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 210.593767][T13050] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea666d4 [ 210.601815][T13050] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x100000000000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:37 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}], 0x1, 0x0, 0x0) 23:26:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:37 executing program 1 (fault-call:6 fault-nth:48): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:37 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYPTR64=&(0x7f00000006c0)=ANY=[@ANYBLOB="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", @ANYRES64=r0, @ANYRES16=r0, @ANYRESOCT, @ANYRES64=r0, @ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT]], 0x8) ppoll(&(0x7f0000000100)=[{r0, 0xfffffffdfffffffe}], 0x1, 0x0, 0x0, 0x0) 23:26:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:38 executing program 5: syz_read_part_table(0x2000000, 0x0, 0x0) 23:26:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/208, 0xd0}, {0x0}, {0x0}], 0x3) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000002c0)=""/194, 0xc2}, {0x0}], 0x2}, 0x2) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) poll(0x0, 0x0, 0xe69) shutdown(r5, 0x0) shutdown(r2, 0x0) 23:26:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}}], 0x1, 0x0, 0x0) 23:26:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x300000000000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}}], 0x1, 0x0, 0x0) 23:26:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 210.992847][T13093] FAULT_INJECTION: forcing a failure. [ 210.992847][T13093] name failslab, interval 1, probability 0, space 0, times 0 [ 211.011018][T13093] CPU: 0 PID: 13093 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 211.018925][T13093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.029090][T13093] Call Trace: [ 211.032380][T13093] dump_stack+0x1d8/0x2f8 [ 211.036724][T13093] should_fail+0x608/0x860 [ 211.041150][T13093] ? setup_fault_attr+0x2b0/0x2b0 [ 211.046174][T13093] ? sock_kmalloc+0xac/0x120 [ 211.050765][T13093] __should_failslab+0x11a/0x160 [ 211.055708][T13093] ? sock_kmalloc+0xac/0x120 [ 211.060320][T13093] should_failslab+0x9/0x20 [ 211.064828][T13093] __kmalloc+0x7a/0x310 [ 211.069844][T13093] sock_kmalloc+0xac/0x120 [ 211.074238][T13093] af_alg_alloc_areq+0x28/0x180 [ 211.079061][T13093] aead_recvmsg+0x51e/0x1c50 [ 211.083660][T13093] ? aead_sendmsg+0x110/0x110 [ 211.088337][T13093] ? __might_fault+0xf9/0x160 [ 211.092994][T13093] ? kasan_check_write+0x14/0x20 [ 211.097906][T13093] ? _copy_from_user+0xe0/0x120 [ 211.102732][T13093] ? rw_copy_check_uvector+0x2e4/0x310 [ 211.108987][T13093] ? import_iovec+0x17e/0x340 [ 211.113639][T13093] ? __might_fault+0xf9/0x160 [ 211.118290][T13093] ? security_socket_recvmsg+0xa9/0xd0 [ 211.123719][T13093] ? aead_sendmsg+0x110/0x110 [ 211.128369][T13093] sock_recvmsg+0xe7/0x100 [ 211.132760][T13093] ___sys_recvmsg+0x28b/0x9c0 [ 211.137414][T13093] ? __sys_recvmsg+0x250/0x250 [ 211.142269][T13093] ? rcu_lock_release+0xd/0x30 [ 211.147011][T13093] ? rcu_lock_release+0x26/0x30 [ 211.151843][T13093] ? __fget+0x4fe/0x540 [ 211.155975][T13093] ? fget_many+0x30/0x30 [ 211.160192][T13093] ? __mutex_lock_common+0x56b/0x2fc0 [ 211.165698][T13093] ? __fdget+0x17c/0x200 [ 211.169922][T13093] do_recvmmsg+0x33d/0x870 [ 211.174330][T13093] ? __sys_recvmmsg+0x220/0x220 [ 211.179155][T13093] ? kasan_check_write+0x14/0x20 [ 211.184063][T13093] ? __mutex_unlock_slowpath+0x18c/0x630 [ 211.189670][T13093] ? kasan_check_write+0x14/0x20 [ 211.194583][T13093] ? fput_many+0x47/0x1a0 [ 211.198890][T13093] ? check_preemption_disabled+0xb7/0x280 [ 211.204679][T13093] __x64_sys_recvmmsg+0x17c/0x220 [ 211.209699][T13093] ? do_recvmmsg+0x870/0x870 [ 211.214268][T13093] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 211.219971][T13093] ? do_syscall_64+0x1d/0x140 [ 211.224630][T13093] do_syscall_64+0xfe/0x140 [ 211.229212][T13093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.235088][T13093] RIP: 0033:0x459519 [ 211.238961][T13093] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 211.258536][T13093] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 211.267275][T13093] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 211.275218][T13093] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 211.283166][T13093] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:26:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x4000000000000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:38 executing program 1 (fault-call:6 fault-nth:49): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 211.291120][T13093] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 211.299070][T13093] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:38 executing program 5: syz_read_part_table(0x3000000, 0x0, 0x0) 23:26:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}}], 0x1, 0x0, 0x0) [ 211.375194][T13108] FAULT_INJECTION: forcing a failure. [ 211.375194][T13108] name failslab, interval 1, probability 0, space 0, times 0 [ 211.390766][T13108] CPU: 1 PID: 13108 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 211.398669][T13108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.408711][T13108] Call Trace: [ 211.408730][T13108] dump_stack+0x1d8/0x2f8 [ 211.408745][T13108] should_fail+0x608/0x860 [ 211.408755][T13108] ? setup_fault_attr+0x2b0/0x2b0 [ 211.408768][T13108] ? sock_kmalloc+0xac/0x120 [ 211.408785][T13108] __should_failslab+0x11a/0x160 [ 211.408798][T13108] ? sock_kmalloc+0xac/0x120 [ 211.439845][T13108] should_failslab+0x9/0x20 [ 211.444349][T13108] __kmalloc+0x7a/0x310 [ 211.448500][T13108] sock_kmalloc+0xac/0x120 [ 211.452903][T13108] af_alg_alloc_areq+0x28/0x180 [ 211.457750][T13108] aead_recvmsg+0x51e/0x1c50 [ 211.462440][T13108] ? aead_sendmsg+0x110/0x110 [ 211.467127][T13108] ? __might_fault+0xf9/0x160 [ 211.471806][T13108] ? kasan_check_write+0x14/0x20 [ 211.476735][T13108] ? _copy_from_user+0xe0/0x120 [ 211.481588][T13108] ? rw_copy_check_uvector+0x2e4/0x310 [ 211.487041][T13108] ? import_iovec+0x17e/0x340 [ 211.491710][T13108] ? __might_fault+0xf9/0x160 [ 211.496383][T13108] ? security_socket_recvmsg+0xa9/0xd0 [ 211.501829][T13108] ? aead_sendmsg+0x110/0x110 [ 211.506502][T13108] sock_recvmsg+0xe7/0x100 [ 211.510911][T13108] ___sys_recvmsg+0x28b/0x9c0 [ 211.515593][T13108] ? __sys_recvmsg+0x250/0x250 [ 211.520360][T13108] ? rcu_lock_release+0xd/0x30 [ 211.525120][T13108] ? rcu_lock_release+0x26/0x30 [ 211.530080][T13108] ? __fget+0x4fe/0x540 [ 211.534231][T13108] ? fget_many+0x30/0x30 [ 211.538466][T13108] ? __mutex_lock_common+0x56b/0x2fc0 [ 211.543834][T13108] ? __fdget+0x17c/0x200 [ 211.548070][T13108] do_recvmmsg+0x33d/0x870 [ 211.552487][T13108] ? __sys_recvmmsg+0x220/0x220 [ 211.557323][T13108] ? kasan_check_write+0x14/0x20 [ 211.562248][T13108] ? __mutex_unlock_slowpath+0x18c/0x630 [ 211.567882][T13108] ? kasan_check_write+0x14/0x20 [ 211.572809][T13108] ? fput_many+0x47/0x1a0 [ 211.577142][T13108] ? check_preemption_disabled+0xb7/0x280 [ 211.582866][T13108] __x64_sys_recvmmsg+0x17c/0x220 [ 211.587896][T13108] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 211.593520][T13108] ? do_recvmmsg+0x870/0x870 [ 211.598104][T13108] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 211.603814][T13108] ? do_syscall_64+0x1d/0x140 [ 211.608489][T13108] do_syscall_64+0xfe/0x140 [ 211.612997][T13108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.618875][T13108] RIP: 0033:0x459519 [ 211.622764][T13108] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 211.642363][T13108] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 211.650767][T13108] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 211.658732][T13108] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 211.667047][T13108] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:26:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 211.675012][T13108] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 211.682976][T13108] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x8000000000000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:39 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864, 0x11, 0x0, @local, @dev={0xac, 0x14, 0x14, 0xac1414aa}}}}}}}, 0x0) 23:26:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:39 executing program 1 (fault-call:6 fault-nth:50): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}], 0x1, 0x0, 0x0) 23:26:39 executing program 5: syz_read_part_table(0x4000000, 0x0, 0x0) 23:26:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x8dffffff00000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 211.931785][T13127] FAULT_INJECTION: forcing a failure. [ 211.931785][T13127] name failslab, interval 1, probability 0, space 0, times 0 [ 211.967660][T13127] CPU: 0 PID: 13127 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 211.975593][T13127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.986814][T13127] Call Trace: [ 211.990112][T13127] dump_stack+0x1d8/0x2f8 [ 211.994450][T13127] should_fail+0x608/0x860 [ 211.998871][T13127] ? setup_fault_attr+0x2b0/0x2b0 [ 212.003899][T13127] ? sock_kmalloc+0xac/0x120 [ 212.008493][T13127] __should_failslab+0x11a/0x160 [ 212.013434][T13127] ? sock_kmalloc+0xac/0x120 [ 212.018023][T13127] should_failslab+0x9/0x20 [ 212.022946][T13127] __kmalloc+0x7a/0x310 [ 212.027102][T13127] sock_kmalloc+0xac/0x120 [ 212.031511][T13127] af_alg_alloc_areq+0x28/0x180 [ 212.036352][T13127] aead_recvmsg+0x51e/0x1c50 [ 212.040954][T13127] ? aead_sendmsg+0x110/0x110 [ 212.045638][T13127] ? __might_fault+0xf9/0x160 [ 212.050317][T13127] ? kasan_check_write+0x14/0x20 [ 212.055246][T13127] ? _copy_from_user+0xe0/0x120 [ 212.060093][T13127] ? rw_copy_check_uvector+0x2e4/0x310 [ 212.065548][T13127] ? import_iovec+0x17e/0x340 [ 212.070221][T13127] ? security_socket_recvmsg+0xa9/0xd0 [ 212.075674][T13127] ? aead_sendmsg+0x110/0x110 [ 212.080348][T13127] sock_recvmsg+0xe7/0x100 [ 212.084776][T13127] ___sys_recvmsg+0x28b/0x9c0 [ 212.089458][T13127] ? __sys_recvmsg+0x250/0x250 [ 212.094222][T13127] ? rcu_lock_release+0xd/0x30 [ 212.098986][T13127] ? rcu_lock_release+0x26/0x30 [ 212.103833][T13127] ? __fget+0x4fe/0x540 [ 212.107995][T13127] ? fget_many+0x30/0x30 [ 212.112228][T13127] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 212.117686][T13127] ? retint_kernel+0x2b/0x2b [ 212.122282][T13127] ? __fdget+0x17c/0x200 [ 212.126523][T13127] do_recvmmsg+0x33d/0x870 [ 212.130942][T13127] ? __sys_recvmmsg+0x220/0x220 [ 212.135787][T13127] ? kasan_check_write+0x14/0x20 [ 212.140716][T13127] ? __mutex_unlock_slowpath+0x18c/0x630 [ 212.146355][T13127] ? kasan_check_write+0x14/0x20 [ 212.151280][T13127] ? fput_many+0x47/0x1a0 [ 212.155613][T13127] ? check_preemption_disabled+0xb7/0x280 [ 212.161331][T13127] __x64_sys_recvmmsg+0x17c/0x220 [ 212.166347][T13127] ? do_recvmmsg+0x870/0x870 [ 212.170925][T13127] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 212.176638][T13127] ? do_syscall_64+0x1d/0x140 [ 212.181406][T13127] do_syscall_64+0xfe/0x140 [ 212.185934][T13127] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.191825][T13127] RIP: 0033:0x459519 [ 212.195712][T13127] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 212.215304][T13127] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 212.223703][T13127] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 23:26:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000040)=""/117, 0x75}, {0x0}, {0x0}], 0x3}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffecb, 0x2, 0x0, 0x800e00515) shutdown(r0, 0x0) msgget(0x3, 0x0) recvfrom$inet(r1, 0x0, 0xd172, 0x2, 0x0, 0x800e0050e) shutdown(r1, 0x0) 23:26:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}}], 0x1, 0x0, 0x0) 23:26:39 executing program 1 (fault-call:6 fault-nth:51): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 212.231664][T13127] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 212.239632][T13127] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 212.247600][T13127] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 212.255560][T13127] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x300, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}}], 0x1, 0x0, 0x0) 23:26:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 212.386563][T13150] FAULT_INJECTION: forcing a failure. [ 212.386563][T13150] name failslab, interval 1, probability 0, space 0, times 0 [ 212.433814][T13150] CPU: 1 PID: 13150 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 212.441746][T13150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.451888][T13150] Call Trace: [ 212.455188][T13150] dump_stack+0x1d8/0x2f8 [ 212.459517][T13150] should_fail+0x608/0x860 [ 212.463928][T13150] ? setup_fault_attr+0x2b0/0x2b0 [ 212.468945][T13150] ? sock_kmalloc+0xac/0x120 [ 212.473538][T13150] __should_failslab+0x11a/0x160 [ 212.478469][T13150] ? sock_kmalloc+0xac/0x120 [ 212.483053][T13150] should_failslab+0x9/0x20 [ 212.487550][T13150] __kmalloc+0x7a/0x310 [ 212.491704][T13150] sock_kmalloc+0xac/0x120 [ 212.496125][T13150] af_alg_alloc_areq+0x28/0x180 [ 212.496138][T13150] aead_recvmsg+0x51e/0x1c50 [ 212.496163][T13150] ? aead_sendmsg+0x110/0x110 [ 212.505568][T13150] ? __might_fault+0xf9/0x160 [ 212.505587][T13150] ? kasan_check_write+0x14/0x20 [ 212.505596][T13150] ? _copy_from_user+0xe0/0x120 [ 212.505608][T13150] ? rw_copy_check_uvector+0x2e4/0x310 23:26:39 executing program 5: syz_read_part_table(0x5000000, 0x0, 0x0) 23:26:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xf0ffffff00000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 212.505623][T13150] ? import_iovec+0x17e/0x340 [ 212.505629][T13150] ? __might_fault+0xf9/0x160 [ 212.505643][T13150] ? security_socket_recvmsg+0xa9/0xd0 [ 212.505651][T13150] ? aead_sendmsg+0x110/0x110 [ 212.505662][T13150] sock_recvmsg+0xe7/0x100 [ 212.505676][T13150] ___sys_recvmsg+0x28b/0x9c0 [ 212.505692][T13150] ? __sys_recvmsg+0x250/0x250 [ 212.505711][T13150] ? rcu_lock_release+0xd/0x30 [ 212.505724][T13150] ? rcu_lock_release+0x26/0x30 [ 212.505732][T13150] ? __fget+0x4fe/0x540 [ 212.505748][T13150] ? fget_many+0x30/0x30 [ 212.505758][T13150] ? __mutex_lock_common+0x56b/0x2fc0 [ 212.505772][T13150] ? __fdget+0x17c/0x200 [ 212.530506][T13150] do_recvmmsg+0x33d/0x870 [ 212.530524][T13150] ? __sys_recvmmsg+0x220/0x220 [ 212.530535][T13150] ? kasan_check_write+0x14/0x20 [ 212.530545][T13150] ? __mutex_unlock_slowpath+0x18c/0x630 [ 212.530561][T13150] ? kasan_check_write+0x14/0x20 [ 212.530578][T13150] ? fput_many+0x47/0x1a0 [ 212.549983][T13150] ? check_preemption_disabled+0xb7/0x280 [ 212.550003][T13150] __x64_sys_recvmmsg+0x17c/0x220 23:26:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}], 0x1, 0x0, 0x0) 23:26:39 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="24000000100007031dfffd946f610500000000000500000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) [ 212.550016][T13150] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 212.550025][T13150] ? do_recvmmsg+0x870/0x870 [ 212.550036][T13150] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 212.550047][T13150] ? do_syscall_64+0x1d/0x140 [ 212.550061][T13150] do_syscall_64+0xfe/0x140 [ 212.581787][T13150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.581797][T13150] RIP: 0033:0x459519 23:26:39 executing program 1 (fault-call:6 fault-nth:52): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 212.581807][T13150] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 212.581813][T13150] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 212.581822][T13150] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 212.581828][T13150] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 212.581836][T13150] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 212.600621][T13150] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 212.600627][T13150] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}], 0x1, 0x0, 0x0) 23:26:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xffffffff00000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 212.848311][T13178] FAULT_INJECTION: forcing a failure. [ 212.848311][T13178] name failslab, interval 1, probability 0, space 0, times 0 23:26:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:40 executing program 2: clone(0x41ffc, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) [ 212.893744][T13178] CPU: 1 PID: 13178 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 212.901670][T13178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.911726][T13178] Call Trace: [ 212.915018][T13178] dump_stack+0x1d8/0x2f8 [ 212.919362][T13178] should_fail+0x608/0x860 [ 212.923779][T13178] ? setup_fault_attr+0x2b0/0x2b0 [ 212.928797][T13178] ? sock_kmalloc+0xac/0x120 [ 212.933385][T13178] __should_failslab+0x11a/0x160 [ 212.938860][T13178] ? sock_kmalloc+0xac/0x120 [ 212.943466][T13178] should_failslab+0x9/0x20 [ 212.947959][T13178] __kmalloc+0x7a/0x310 [ 212.952113][T13178] sock_kmalloc+0xac/0x120 [ 212.958812][T13178] af_alg_alloc_areq+0x28/0x180 [ 212.966262][T13178] aead_recvmsg+0x51e/0x1c50 [ 212.970869][T13178] ? aead_sendmsg+0x110/0x110 [ 212.975552][T13178] ? __might_fault+0xf9/0x160 [ 212.980226][T13178] ? kasan_check_write+0x14/0x20 [ 212.985155][T13178] ? _copy_from_user+0xe0/0x120 [ 212.990004][T13178] ? rw_copy_check_uvector+0x2e4/0x310 [ 212.995468][T13178] ? import_iovec+0x17e/0x340 [ 213.000138][T13178] ? __might_fault+0xf9/0x160 [ 213.004812][T13178] ? security_socket_recvmsg+0xa9/0xd0 [ 213.010259][T13178] ? aead_sendmsg+0x110/0x110 [ 213.014931][T13178] sock_recvmsg+0xe7/0x100 [ 213.019342][T13178] ___sys_recvmsg+0x28b/0x9c0 [ 213.024015][T13178] ? __sys_recvmsg+0x250/0x250 [ 213.028779][T13178] ? rcu_lock_release+0xd/0x30 [ 213.033535][T13178] ? rcu_lock_release+0x26/0x30 [ 213.038374][T13178] ? __fget+0x4fe/0x540 [ 213.042526][T13178] ? fget_many+0x30/0x30 [ 213.046766][T13178] ? __mutex_lock_common+0x56b/0x2fc0 [ 213.052138][T13178] ? __fdget+0x17c/0x200 [ 213.056375][T13178] do_recvmmsg+0x33d/0x870 [ 213.060792][T13178] ? __sys_recvmmsg+0x220/0x220 [ 213.065633][T13178] ? kasan_check_write+0x14/0x20 [ 213.070556][T13178] ? __mutex_unlock_slowpath+0x18c/0x630 [ 213.076187][T13178] ? kasan_check_write+0x14/0x20 [ 213.081117][T13178] ? fput_many+0x47/0x1a0 [ 213.085440][T13178] ? check_preemption_disabled+0xb7/0x280 [ 213.091328][T13178] __x64_sys_recvmmsg+0x17c/0x220 [ 213.096347][T13178] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 213.101972][T13178] ? do_recvmmsg+0x870/0x870 [ 213.108062][T13178] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 213.113781][T13178] ? do_syscall_64+0x1d/0x140 [ 213.118456][T13178] do_syscall_64+0xfe/0x140 [ 213.123045][T13178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.129014][T13178] RIP: 0033:0x459519 [ 213.132989][T13178] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 213.152588][T13178] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 213.160993][T13178] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 213.168959][T13178] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 213.177118][T13178] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 213.185080][T13178] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 23:26:40 executing program 1 (fault-call:6 fault-nth:53): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}}], 0x1, 0x0, 0x0) [ 213.193039][T13178] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:40 executing program 5: syz_read_part_table(0x6000000, 0x0, 0x0) 23:26:40 executing program 2: clone(0x41ffc, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) 23:26:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 213.348884][T13190] FAULT_INJECTION: forcing a failure. [ 213.348884][T13190] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 213.362110][T13190] CPU: 0 PID: 13190 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 213.362117][T13190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.362120][T13190] Call Trace: [ 213.362137][T13190] dump_stack+0x1d8/0x2f8 [ 213.362152][T13190] should_fail+0x608/0x860 [ 213.362163][T13190] ? setup_fault_attr+0x2b0/0x2b0 [ 213.362182][T13190] should_fail_alloc_page+0x55/0x60 [ 213.362193][T13190] prepare_alloc_pages+0x283/0x460 [ 213.407396][T13190] __alloc_pages_nodemask+0x11c/0x790 [ 213.412774][T13190] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 213.418312][T13190] ? do_raw_spin_lock+0x143/0x3a0 [ 213.423335][T13190] ? _raw_spin_unlock_irqrestore+0x77/0xe0 [ 213.423351][T13190] kmem_getpages+0x46/0x480 [ 213.423361][T13190] cache_grow_begin+0x7e/0x2c0 [ 213.423374][T13190] cache_alloc_refill+0x311/0x3f0 [ 213.423384][T13190] ? check_preemption_disabled+0xb7/0x280 [ 213.423397][T13190] __kmalloc+0x2e5/0x310 [ 213.449109][T13190] ? sock_kmalloc+0xac/0x120 [ 213.449124][T13190] sock_kmalloc+0xac/0x120 [ 213.449136][T13190] af_alg_alloc_areq+0x28/0x180 [ 213.449148][T13190] aead_recvmsg+0x51e/0x1c50 [ 213.462362][T13190] ? aead_sendmsg+0x110/0x110 [ 213.462385][T13190] ? __might_fault+0xf9/0x160 [ 213.481189][T13190] ? kasan_check_write+0x14/0x20 [ 213.486124][T13190] ? _copy_from_user+0xe0/0x120 [ 213.491152][T13190] ? rw_copy_check_uvector+0x2e4/0x310 [ 213.496621][T13190] ? import_iovec+0x17e/0x340 [ 213.501294][T13190] ? __might_fault+0xf9/0x160 [ 213.505967][T13190] ? security_socket_recvmsg+0xa9/0xd0 [ 213.511413][T13190] ? aead_sendmsg+0x110/0x110 [ 213.516343][T13190] sock_recvmsg+0xe7/0x100 [ 213.520754][T13190] ___sys_recvmsg+0x28b/0x9c0 [ 213.525430][T13190] ? __sys_recvmsg+0x250/0x250 [ 213.530196][T13190] ? rcu_lock_release+0xd/0x30 [ 213.534962][T13190] ? rcu_lock_release+0x26/0x30 [ 213.539802][T13190] ? __fget+0x4fe/0x540 [ 213.543957][T13190] ? fget_many+0x30/0x30 [ 213.548187][T13190] ? __vfs_write+0xe5/0x7d0 [ 213.552689][T13190] ? __fdget+0x17c/0x200 [ 213.556923][T13190] do_recvmmsg+0x33d/0x870 [ 213.561331][T13190] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 213.566790][T13190] ? __sys_recvmmsg+0x220/0x220 [ 213.571628][T13190] ? rcu_irq_exit+0x118/0x2b0 [ 213.576302][T13190] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 213.581754][T13190] ? retint_kernel+0x2b/0x2b [ 213.586337][T13190] ? trace_hardirqs_on_caller+0x74/0x80 [ 213.591878][T13190] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 213.597332][T13190] __x64_sys_recvmmsg+0x17c/0x220 [ 213.603128][T13190] ? retint_kernel+0x2b/0x2b [ 213.607710][T13190] ? do_recvmmsg+0x870/0x870 [ 213.612288][T13190] ? do_syscall_64+0x90/0x140 [ 213.616953][T13190] ? do_syscall_64+0xac/0x140 [ 213.621623][T13190] do_syscall_64+0xfe/0x140 [ 213.626122][T13190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.632000][T13190] RIP: 0033:0x459519 [ 213.635946][T13190] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 213.655540][T13190] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 213.663939][T13190] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 213.671901][T13190] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 213.679858][T13190] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 213.687815][T13190] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 23:26:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x65580000}}], 0x1, 0x0, 0x0) 23:26:40 executing program 2: clone(0x41ffc, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) [ 213.695777][T13190] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:40 executing program 2: clone(0x41ffc, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) 23:26:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:41 executing program 1 (fault-call:6 fault-nth:54): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:41 executing program 2: clone(0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) 23:26:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:41 executing program 5: syz_read_part_table(0x7000000, 0x0, 0x0) 23:26:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000}}], 0x1, 0x0, 0x0) [ 213.854144][T13221] FAULT_INJECTION: forcing a failure. [ 213.854144][T13221] name failslab, interval 1, probability 0, space 0, times 0 [ 213.937511][T13221] CPU: 1 PID: 13221 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 213.945437][T13221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.958005][T13221] Call Trace: [ 213.961300][T13221] dump_stack+0x1d8/0x2f8 [ 213.965631][T13221] should_fail+0x608/0x860 [ 213.970048][T13221] ? setup_fault_attr+0x2b0/0x2b0 [ 213.975071][T13221] ? sock_kmalloc+0xac/0x120 [ 213.979666][T13221] __should_failslab+0x11a/0x160 23:26:41 executing program 2: clone(0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) [ 213.984607][T13221] ? sock_kmalloc+0xac/0x120 [ 213.989195][T13221] should_failslab+0x9/0x20 [ 213.993690][T13221] __kmalloc+0x7a/0x310 [ 213.997845][T13221] sock_kmalloc+0xac/0x120 [ 214.002260][T13221] af_alg_alloc_areq+0x28/0x180 [ 214.007630][T13221] aead_recvmsg+0x51e/0x1c50 [ 214.012234][T13221] ? aead_sendmsg+0x110/0x110 [ 214.016920][T13221] ? __might_fault+0xf9/0x160 [ 214.021634][T13221] ? kasan_check_write+0x14/0x20 [ 214.026573][T13221] ? _copy_from_user+0xe0/0x120 [ 214.031422][T13221] ? rw_copy_check_uvector+0x2e4/0x310 [ 214.036971][T13221] ? import_iovec+0x17e/0x340 [ 214.041642][T13221] ? __might_fault+0xf9/0x160 [ 214.046317][T13221] ? security_socket_recvmsg+0xa9/0xd0 [ 214.051764][T13221] ? aead_sendmsg+0x110/0x110 [ 214.056435][T13221] sock_recvmsg+0xe7/0x100 [ 214.060846][T13221] ___sys_recvmsg+0x28b/0x9c0 [ 214.065520][T13221] ? __sys_recvmsg+0x250/0x250 [ 214.070286][T13221] ? rcu_lock_release+0xd/0x30 [ 214.075053][T13221] ? rcu_lock_release+0x26/0x30 [ 214.079897][T13221] ? __fget+0x4fe/0x540 [ 214.084052][T13221] ? fget_many+0x30/0x30 [ 214.088291][T13221] ? __mutex_lock_common+0x56b/0x2fc0 [ 214.093659][T13221] ? __fdget+0x17c/0x200 [ 214.097893][T13221] do_recvmmsg+0x33d/0x870 [ 214.102320][T13221] ? __sys_recvmmsg+0x220/0x220 [ 214.107160][T13221] ? kasan_check_write+0x14/0x20 [ 214.107172][T13221] ? __mutex_unlock_slowpath+0x18c/0x630 [ 214.107189][T13221] ? kasan_check_write+0x14/0x20 [ 214.117717][T13221] ? fput_many+0x47/0x1a0 [ 214.117730][T13221] ? check_preemption_disabled+0xb7/0x280 [ 214.117746][T13221] __x64_sys_recvmmsg+0x17c/0x220 23:26:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000}}], 0x1, 0x0, 0x0) 23:26:41 executing program 2: clone(0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) [ 214.117757][T13221] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 214.117766][T13221] ? do_recvmmsg+0x870/0x870 [ 214.117777][T13221] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 214.117787][T13221] ? do_syscall_64+0x1d/0x140 [ 214.117800][T13221] do_syscall_64+0xfe/0x140 [ 214.117814][T13221] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.117823][T13221] RIP: 0033:0x459519 23:26:41 executing program 1 (fault-call:6 fault-nth:55): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 214.117832][T13221] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 214.117841][T13221] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 214.143385][T13221] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 214.143391][T13221] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 214.143396][T13221] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 214.143402][T13221] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 214.143408][T13221] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:41 executing program 2: clone(0x41ffc, 0x0, 0x0, &(0x7f0000000240), 0x0) 23:26:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000}}], 0x1, 0x0, 0x0) 23:26:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 214.335927][T13250] FAULT_INJECTION: forcing a failure. [ 214.335927][T13250] name failslab, interval 1, probability 0, space 0, times 0 [ 214.399631][T13250] CPU: 1 PID: 13250 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 214.407563][T13250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.417627][T13250] Call Trace: [ 214.420966][T13250] dump_stack+0x1d8/0x2f8 [ 214.425302][T13250] should_fail+0x608/0x860 [ 214.429711][T13250] ? setup_fault_attr+0x2b0/0x2b0 [ 214.434731][T13250] ? sock_kmalloc+0xac/0x120 [ 214.439321][T13250] __should_failslab+0x11a/0x160 [ 214.444251][T13250] ? sock_kmalloc+0xac/0x120 [ 214.448833][T13250] should_failslab+0x9/0x20 [ 214.453325][T13250] __kmalloc+0x7a/0x310 [ 214.457484][T13250] sock_kmalloc+0xac/0x120 [ 214.461897][T13250] af_alg_alloc_areq+0x28/0x180 [ 214.466762][T13250] aead_recvmsg+0x51e/0x1c50 [ 214.471684][T13250] ? aead_sendmsg+0x110/0x110 [ 214.476365][T13250] ? __might_fault+0xf9/0x160 [ 214.481048][T13250] ? kasan_check_write+0x14/0x20 [ 214.485974][T13250] ? _copy_from_user+0xe0/0x120 [ 214.490821][T13250] ? rw_copy_check_uvector+0x2e4/0x310 [ 214.496371][T13250] ? import_iovec+0x17e/0x340 [ 214.501046][T13250] ? __might_fault+0xf9/0x160 [ 214.505723][T13250] ? security_socket_recvmsg+0xa9/0xd0 [ 214.511371][T13250] ? aead_sendmsg+0x110/0x110 [ 214.516044][T13250] sock_recvmsg+0xe7/0x100 [ 214.520464][T13250] ___sys_recvmsg+0x28b/0x9c0 [ 214.525233][T13250] ? __sys_recvmsg+0x250/0x250 [ 214.530000][T13250] ? rcu_lock_release+0xd/0x30 [ 214.534760][T13250] ? rcu_lock_release+0x26/0x30 [ 214.539598][T13250] ? __fget+0x4fe/0x540 [ 214.543754][T13250] ? fget_many+0x30/0x30 [ 214.548012][T13250] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 214.553474][T13250] ? __fdget+0x17c/0x200 [ 214.557713][T13250] do_recvmmsg+0x33d/0x870 [ 214.562129][T13250] ? __sys_recvmmsg+0x220/0x220 [ 214.566976][T13250] ? kasan_check_write+0x14/0x20 [ 214.571916][T13250] ? __mutex_unlock_slowpath+0x18c/0x630 [ 214.577544][T13250] ? kasan_check_write+0x14/0x20 [ 214.582471][T13250] ? fput_many+0x47/0x1a0 [ 214.586796][T13250] ? check_preemption_disabled+0xb7/0x280 [ 214.592600][T13250] __x64_sys_recvmmsg+0x17c/0x220 [ 214.597615][T13250] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 214.603235][T13250] ? do_recvmmsg+0x870/0x870 [ 214.607817][T13250] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 214.613526][T13250] ? do_syscall_64+0x1d/0x140 [ 214.618197][T13250] do_syscall_64+0xfe/0x140 [ 214.622693][T13250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.628572][T13250] RIP: 0033:0x459519 [ 214.632456][T13250] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 214.652048][T13250] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 214.660447][T13250] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 214.668407][T13250] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 214.676366][T13250] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 214.684327][T13250] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 214.692374][T13250] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:41 executing program 5: syz_read_part_table(0x8000000, 0x0, 0x0) 23:26:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:41 executing program 2: clone(0x41ffc, 0x0, 0x0, &(0x7f0000000240), 0x0) 23:26:41 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff}}], 0x1, 0x0, 0x0) 23:26:42 executing program 1 (fault-call:6 fault-nth:56): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:42 executing program 2: clone(0x41ffc, 0x0, 0x0, &(0x7f0000000240), 0x0) 23:26:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc00e0000}}], 0x1, 0x0, 0x0) [ 214.908413][T13280] FAULT_INJECTION: forcing a failure. [ 214.908413][T13280] name failslab, interval 1, probability 0, space 0, times 0 [ 214.927257][T13280] CPU: 1 PID: 13280 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 214.935248][T13280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.945929][T13280] Call Trace: [ 214.949222][T13280] dump_stack+0x1d8/0x2f8 [ 214.953554][T13280] should_fail+0x608/0x860 [ 214.957970][T13280] ? setup_fault_attr+0x2b0/0x2b0 [ 214.962995][T13280] ? sock_kmalloc+0xac/0x120 [ 214.967585][T13280] __should_failslab+0x11a/0x160 [ 214.972512][T13280] ? sock_kmalloc+0xac/0x120 [ 214.977092][T13280] should_failslab+0x9/0x20 [ 214.981586][T13280] __kmalloc+0x7a/0x310 [ 214.985744][T13280] sock_kmalloc+0xac/0x120 [ 214.990150][T13280] af_alg_alloc_areq+0x28/0x180 [ 214.994993][T13280] aead_recvmsg+0x51e/0x1c50 [ 214.999771][T13280] ? aead_sendmsg+0x110/0x110 [ 215.004454][T13280] ? __might_fault+0xf9/0x160 [ 215.009128][T13280] ? kasan_check_write+0x14/0x20 [ 215.014059][T13280] ? _copy_from_user+0xe0/0x120 [ 215.018996][T13280] ? rw_copy_check_uvector+0x2e4/0x310 [ 215.024539][T13280] ? import_iovec+0x17e/0x340 [ 215.029210][T13280] ? __might_fault+0xf9/0x160 [ 215.033884][T13280] ? security_socket_recvmsg+0xa9/0xd0 [ 215.039332][T13280] ? aead_sendmsg+0x110/0x110 [ 215.044025][T13280] sock_recvmsg+0xe7/0x100 [ 215.048436][T13280] ___sys_recvmsg+0x28b/0x9c0 [ 215.053119][T13280] ? __sys_recvmsg+0x250/0x250 [ 215.057885][T13280] ? rcu_lock_release+0xd/0x30 [ 215.062649][T13280] ? rcu_lock_release+0x26/0x30 [ 215.067488][T13280] ? __fget+0x4fe/0x540 [ 215.071645][T13280] ? fget_many+0x30/0x30 [ 215.075884][T13280] ? __mutex_lock_common+0x56b/0x2fc0 [ 215.081257][T13280] ? __fdget+0x17c/0x200 [ 215.085494][T13280] do_recvmmsg+0x33d/0x870 [ 215.089944][T13280] ? __sys_recvmmsg+0x220/0x220 [ 215.094789][T13280] ? kasan_check_write+0x14/0x20 [ 215.099714][T13280] ? __mutex_unlock_slowpath+0x18c/0x630 [ 215.105350][T13280] ? kasan_check_write+0x14/0x20 [ 215.111792][T13280] ? fput_many+0x47/0x1a0 [ 215.111807][T13280] ? check_preemption_disabled+0xb7/0x280 [ 215.111825][T13280] __x64_sys_recvmmsg+0x17c/0x220 [ 215.121822][T13280] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 215.121833][T13280] ? do_recvmmsg+0x870/0x870 [ 215.121847][T13280] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 215.121860][T13280] ? do_syscall_64+0x1d/0x140 [ 215.147384][T13280] do_syscall_64+0xfe/0x140 [ 215.151884][T13280] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.157765][T13280] RIP: 0033:0x459519 [ 215.161651][T13280] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 215.161657][T13280] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 215.161666][T13280] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 215.161676][T13280] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 23:26:42 executing program 5: syz_read_part_table(0x9000000, 0x0, 0x0) 23:26:42 executing program 2: clone(0x41ffc, 0x0, &(0x7f0000000200), 0x0, 0x0) 23:26:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x11, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 215.189646][T13280] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 215.189653][T13280] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 215.189658][T13280] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc07e0000}}], 0x1, 0x0, 0x0) 23:26:42 executing program 1 (fault-call:6 fault-nth:57): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:42 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xd0020000}}], 0x1, 0x0, 0x0) 23:26:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x5}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r0, &(0x7f0000000200)}, 0x10) 23:26:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x88, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 215.424732][T13300] FAULT_INJECTION: forcing a failure. [ 215.424732][T13300] name failslab, interval 1, probability 0, space 0, times 0 [ 215.445098][T13300] CPU: 0 PID: 13300 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 215.453024][T13300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.463080][T13300] Call Trace: [ 215.466372][T13300] dump_stack+0x1d8/0x2f8 [ 215.470699][T13300] should_fail+0x608/0x860 [ 215.475135][T13300] ? setup_fault_attr+0x2b0/0x2b0 [ 215.480160][T13300] ? sock_kmalloc+0xac/0x120 [ 215.484748][T13300] __should_failslab+0x11a/0x160 [ 215.489702][T13300] ? sock_kmalloc+0xac/0x120 [ 215.494406][T13300] should_failslab+0x9/0x20 [ 215.498915][T13300] __kmalloc+0x7a/0x310 [ 215.503600][T13300] sock_kmalloc+0xac/0x120 [ 215.508016][T13300] af_alg_alloc_areq+0x28/0x180 [ 215.512860][T13300] aead_recvmsg+0x51e/0x1c50 [ 215.517463][T13300] ? aead_sendmsg+0x110/0x110 [ 215.522144][T13300] ? __might_fault+0xf9/0x160 [ 215.526827][T13300] ? kasan_check_write+0x14/0x20 [ 215.531758][T13300] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 215.537210][T13300] ? retint_kernel+0x2b/0x2b [ 215.541794][T13300] ? trace_hardirqs_on_caller+0x74/0x80 [ 215.547333][T13300] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 215.552787][T13300] ? rcu_irq_exit+0x118/0x2b0 [ 215.557459][T13300] ? security_socket_recvmsg+0xa9/0xd0 [ 215.562914][T13300] ? aead_sendmsg+0x110/0x110 [ 215.567582][T13300] sock_recvmsg+0xe7/0x100 [ 215.571992][T13300] ___sys_recvmsg+0x28b/0x9c0 [ 215.576754][T13300] ? __sys_recvmsg+0x250/0x250 [ 215.581517][T13300] ? rcu_lock_release+0xd/0x30 [ 215.586279][T13300] ? rcu_lock_release+0x26/0x30 [ 215.591121][T13300] ? __fget+0x4fe/0x540 [ 215.595268][T13300] ? trace_hardirqs_on_caller+0x74/0x80 [ 215.600813][T13300] ? fget_many+0x30/0x30 [ 215.605055][T13300] ? __fdget+0x17c/0x200 [ 215.609296][T13300] do_recvmmsg+0x33d/0x870 [ 215.613716][T13300] ? __sys_recvmmsg+0x220/0x220 [ 215.618559][T13300] ? kasan_check_write+0x14/0x20 [ 215.623487][T13300] ? __mutex_unlock_slowpath+0x18c/0x630 [ 215.629117][T13300] ? kasan_check_write+0x14/0x20 [ 215.634044][T13300] ? fput_many+0x47/0x1a0 [ 215.638362][T13300] ? check_preemption_disabled+0xb7/0x280 [ 215.644079][T13300] __x64_sys_recvmmsg+0x17c/0x220 [ 215.649095][T13300] ? do_recvmmsg+0x870/0x870 [ 215.653675][T13300] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 215.659388][T13300] ? do_syscall_64+0x1d/0x140 [ 215.664059][T13300] do_syscall_64+0xfe/0x140 [ 215.668587][T13300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.674468][T13300] RIP: 0033:0x459519 [ 215.678356][T13300] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 215.698037][T13300] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 215.706435][T13300] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 215.714396][T13300] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 23:26:42 executing program 5: syz_read_part_table(0xa000000, 0x0, 0x0) [ 215.722451][T13300] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 215.730417][T13300] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 215.738379][T13300] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888}}], 0x1, 0x0, 0x0) 23:26:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x1100, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:43 executing program 1 (fault-call:6 fault-nth:58): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:43 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x80000006, 0x0, 0x0, 0x50000}]}) r0 = syz_open_pts(0xffffffffffffff9c, 0x0) write$P9_RLOPEN(r0, 0x0, 0x0) [ 215.904376][T13328] FAULT_INJECTION: forcing a failure. [ 215.904376][T13328] name failslab, interval 1, probability 0, space 0, times 0 [ 215.931799][T13328] CPU: 1 PID: 13328 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 215.939721][T13328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.949782][T13328] Call Trace: [ 215.953073][T13328] dump_stack+0x1d8/0x2f8 [ 215.957413][T13328] should_fail+0x608/0x860 [ 215.961830][T13328] ? setup_fault_attr+0x2b0/0x2b0 [ 215.966858][T13328] ? sock_kmalloc+0xac/0x120 [ 215.971626][T13328] __should_failslab+0x11a/0x160 [ 215.976567][T13328] ? sock_kmalloc+0xac/0x120 [ 215.981174][T13328] should_failslab+0x9/0x20 [ 215.985672][T13328] __kmalloc+0x7a/0x310 [ 215.989828][T13328] sock_kmalloc+0xac/0x120 [ 215.994769][T13328] af_alg_alloc_areq+0x28/0x180 [ 215.999614][T13328] aead_recvmsg+0x51e/0x1c50 [ 216.004222][T13328] ? aead_sendmsg+0x110/0x110 [ 216.008905][T13328] ? __might_fault+0xf9/0x160 [ 216.013584][T13328] ? kasan_check_write+0x14/0x20 [ 216.018513][T13328] ? _copy_from_user+0xe0/0x120 [ 216.023363][T13328] ? rw_copy_check_uvector+0x2e4/0x310 [ 216.028825][T13328] ? import_iovec+0x17e/0x340 [ 216.033495][T13328] ? __might_fault+0xf9/0x160 [ 216.038169][T13328] ? security_socket_recvmsg+0xa9/0xd0 [ 216.043619][T13328] ? aead_sendmsg+0x110/0x110 [ 216.048282][T13328] sock_recvmsg+0xe7/0x100 [ 216.052675][T13328] ___sys_recvmsg+0x28b/0x9c0 [ 216.057330][T13328] ? __sys_recvmsg+0x250/0x250 [ 216.063030][T13328] ? rcu_lock_release+0xd/0x30 [ 216.067858][T13328] ? rcu_lock_release+0x26/0x30 [ 216.072680][T13328] ? __fget+0x4fe/0x540 [ 216.077596][T13328] ? fget_many+0x30/0x30 [ 216.081813][T13328] ? __mutex_lock_common+0x56b/0x2fc0 [ 216.087162][T13328] ? __fdget+0x17c/0x200 [ 216.091384][T13328] do_recvmmsg+0x33d/0x870 [ 216.095870][T13328] ? __sys_recvmmsg+0x220/0x220 [ 216.100695][T13328] ? kasan_check_write+0x14/0x20 [ 216.105614][T13328] ? __mutex_unlock_slowpath+0x18c/0x630 [ 216.111223][T13328] ? kasan_check_write+0x14/0x20 [ 216.116133][T13328] ? fput_many+0x47/0x1a0 [ 216.120437][T13328] ? check_preemption_disabled+0xb7/0x280 [ 216.126135][T13328] __x64_sys_recvmmsg+0x17c/0x220 [ 216.131136][T13328] ? do_recvmmsg+0x870/0x870 [ 216.135704][T13328] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 216.141394][T13328] ? do_syscall_64+0x1d/0x140 [ 216.146050][T13328] do_syscall_64+0xfe/0x140 [ 216.150526][T13328] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.156390][T13328] RIP: 0033:0x459519 [ 216.160262][T13328] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 216.179840][T13328] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 216.188322][T13328] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 216.196268][T13328] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 23:26:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x8800, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}}], 0x1, 0x0, 0x0) 23:26:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 216.204222][T13328] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 216.212261][T13328] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 216.220207][T13328] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:43 executing program 5: syz_read_part_table(0xb000000, 0x0, 0x0) 23:26:43 executing program 1 (fault-call:6 fault-nth:59): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000}}], 0x1, 0x0, 0x0) 23:26:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x1000000, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:43 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) poll(&(0x7f0000000240), 0x2000000000000001, 0x4f) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xd99, 0x0, 0x0, 0x800e0047f) recvmsg(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000000000)=""/19, 0x13}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) shutdown(r0, 0x0) [ 216.420184][T13344] FAULT_INJECTION: forcing a failure. [ 216.420184][T13344] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 216.433427][T13344] CPU: 1 PID: 13344 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 216.441325][T13344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.451471][T13344] Call Trace: [ 216.454780][T13344] dump_stack+0x1d8/0x2f8 [ 216.459128][T13344] should_fail+0x608/0x860 [ 216.463550][T13344] ? setup_fault_attr+0x2b0/0x2b0 23:26:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 216.468583][T13344] should_fail_alloc_page+0x55/0x60 [ 216.473785][T13344] prepare_alloc_pages+0x283/0x460 [ 216.478901][T13344] __alloc_pages_nodemask+0x11c/0x790 [ 216.484280][T13344] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 216.489823][T13344] ? do_raw_spin_lock+0x143/0x3a0 [ 216.494856][T13344] ? _raw_spin_unlock_irqrestore+0x77/0xe0 [ 216.500661][T13344] kmem_getpages+0x46/0x480 [ 216.505168][T13344] cache_grow_begin+0x7e/0x2c0 [ 216.509929][T13344] cache_alloc_refill+0x311/0x3f0 [ 216.514945][T13344] ? check_preemption_disabled+0xb7/0x280 [ 216.520663][T13344] __kmalloc+0x2e5/0x310 [ 216.525002][T13344] ? sock_kmalloc+0xac/0x120 [ 216.529588][T13344] sock_kmalloc+0xac/0x120 [ 216.534002][T13344] af_alg_alloc_areq+0x28/0x180 [ 216.538867][T13344] aead_recvmsg+0x51e/0x1c50 [ 216.543470][T13344] ? aead_sendmsg+0x110/0x110 [ 216.548159][T13344] ? __might_fault+0xf9/0x160 [ 216.552835][T13344] ? kasan_check_write+0x14/0x20 [ 216.557759][T13344] ? _copy_from_user+0xe0/0x120 [ 216.562604][T13344] ? rw_copy_check_uvector+0x2e4/0x310 [ 216.568063][T13344] ? import_iovec+0x17e/0x340 [ 216.572731][T13344] ? __might_fault+0xf9/0x160 [ 216.577406][T13344] ? security_socket_recvmsg+0xa9/0xd0 [ 216.582850][T13344] ? aead_sendmsg+0x110/0x110 [ 216.587527][T13344] sock_recvmsg+0xe7/0x100 [ 216.591949][T13344] ___sys_recvmsg+0x28b/0x9c0 [ 216.596629][T13344] ? __sys_recvmsg+0x250/0x250 [ 216.601406][T13344] ? rcu_lock_release+0xd/0x30 [ 216.606175][T13344] ? rcu_lock_release+0x26/0x30 [ 216.611024][T13344] ? __fget+0x4fe/0x540 [ 216.615192][T13344] ? fget_many+0x30/0x30 [ 216.619782][T13344] ? __mutex_lock_common+0x56b/0x2fc0 [ 216.625150][T13344] ? __fdget+0x17c/0x200 [ 216.629388][T13344] do_recvmmsg+0x33d/0x870 [ 216.633807][T13344] ? __sys_recvmmsg+0x220/0x220 [ 216.638749][T13344] ? kasan_check_write+0x14/0x20 [ 216.643766][T13344] ? __mutex_unlock_slowpath+0x18c/0x630 [ 216.649400][T13344] ? kasan_check_write+0x14/0x20 [ 216.654328][T13344] ? fput_many+0x47/0x1a0 [ 216.658647][T13344] ? check_preemption_disabled+0xb7/0x280 [ 216.664371][T13344] __x64_sys_recvmmsg+0x17c/0x220 [ 216.669389][T13344] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 216.675017][T13344] ? do_recvmmsg+0x870/0x870 [ 216.679597][T13344] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 216.685306][T13344] ? do_syscall_64+0x1d/0x140 [ 216.689977][T13344] do_syscall_64+0xfe/0x140 [ 216.694478][T13344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.700359][T13344] RIP: 0033:0x459519 [ 216.704246][T13344] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 216.723850][T13344] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 216.732255][T13344] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 216.732261][T13344] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 216.732266][T13344] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 216.732272][T13344] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 23:26:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x11000000, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xa0010000000000}}], 0x1, 0x0, 0x0) [ 216.732278][T13344] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x88000000, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}], 0x1, 0x0, 0x0) 23:26:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x100000000000000, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:44 executing program 5: syz_read_part_table(0xc000000, 0x0, 0x0) 23:26:44 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) msgget(0x3, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e0081f) 23:26:44 executing program 1 (fault-call:6 fault-nth:60): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}}], 0x1, 0x0, 0x0) 23:26:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x1100000000000000, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}}], 0x1, 0x0, 0x0) 23:26:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x8800000000000000, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 217.171573][T13390] FAULT_INJECTION: forcing a failure. [ 217.171573][T13390] name failslab, interval 1, probability 0, space 0, times 0 [ 217.199646][T13390] CPU: 1 PID: 13390 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 217.208484][T13390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.208490][T13390] Call Trace: [ 217.208508][T13390] dump_stack+0x1d8/0x2f8 [ 217.208524][T13390] should_fail+0x608/0x860 [ 217.208536][T13390] ? setup_fault_attr+0x2b0/0x2b0 [ 217.208549][T13390] ? sock_kmalloc+0xac/0x120 [ 217.208564][T13390] __should_failslab+0x11a/0x160 [ 217.221883][T13390] ? sock_kmalloc+0xac/0x120 [ 217.221895][T13390] should_failslab+0x9/0x20 [ 217.221906][T13390] __kmalloc+0x7a/0x310 [ 217.230614][T13390] sock_kmalloc+0xac/0x120 [ 217.230627][T13390] af_alg_alloc_areq+0x28/0x180 [ 217.230639][T13390] aead_recvmsg+0x51e/0x1c50 [ 217.230670][T13390] ? aead_sendmsg+0x110/0x110 [ 217.240319][T13390] ? __might_fault+0xf9/0x160 [ 217.240339][T13390] ? kasan_check_write+0x14/0x20 [ 217.249810][T13390] ? _copy_from_user+0xe0/0x120 [ 217.249824][T13390] ? rw_copy_check_uvector+0x2e4/0x310 [ 217.249841][T13390] ? import_iovec+0x17e/0x340 [ 217.249849][T13390] ? __might_fault+0xf9/0x160 [ 217.249863][T13390] ? security_socket_recvmsg+0xa9/0xd0 [ 217.262874][T13390] ? aead_sendmsg+0x110/0x110 [ 217.262888][T13390] sock_recvmsg+0xe7/0x100 [ 217.262901][T13390] ___sys_recvmsg+0x28b/0x9c0 [ 217.262916][T13390] ? __sys_recvmsg+0x250/0x250 [ 217.262934][T13390] ? rcu_lock_release+0xd/0x30 [ 217.262947][T13390] ? rcu_lock_release+0x26/0x30 [ 217.262958][T13390] ? __fget+0x4fe/0x540 [ 217.344088][T13390] ? fget_many+0x30/0x30 [ 217.348357][T13390] ? __mutex_lock_common+0x56b/0x2fc0 [ 217.353734][T13390] ? __fdget+0x17c/0x200 [ 217.357976][T13390] do_recvmmsg+0x33d/0x870 [ 217.362402][T13390] ? __sys_recvmmsg+0x220/0x220 [ 217.367244][T13390] ? kasan_check_write+0x14/0x20 [ 217.372168][T13390] ? __mutex_unlock_slowpath+0x18c/0x630 [ 217.377803][T13390] ? kasan_check_write+0x14/0x20 [ 217.382728][T13390] ? fput_many+0x47/0x1a0 [ 217.387051][T13390] ? check_preemption_disabled+0xb7/0x280 [ 217.392776][T13390] __x64_sys_recvmmsg+0x17c/0x220 [ 217.397805][T13390] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 217.403438][T13390] ? do_recvmmsg+0x870/0x870 [ 217.408028][T13390] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 217.413745][T13390] ? do_syscall_64+0x1d/0x140 [ 217.418422][T13390] do_syscall_64+0xfe/0x140 [ 217.422916][T13390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.428792][T13390] RIP: 0033:0x459519 [ 217.432848][T13390] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 217.452537][T13390] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 217.460941][T13390] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 23:26:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:44 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}}], 0x1, 0x0, 0x0) 23:26:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0xffffffff00000000, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 217.468997][T13390] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 217.476964][T13390] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 217.484930][T13390] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 217.493075][T13390] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:44 executing program 5: syz_read_part_table(0xd000000, 0x0, 0x0) 23:26:45 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) sendto$inet(r0, &(0x7f00000000c0)="51b04a00", 0x4, 0x20000004, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000080)="8d", 0x1}], 0x1}, 0x0) 23:26:45 executing program 1 (fault-call:6 fault-nth:61): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000003, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}}], 0x1, 0x0, 0x0) 23:26:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:45 executing program 5: syz_read_part_table(0xe000000, 0x0, 0x0) 23:26:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000111, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 217.964310][T13424] FAULT_INJECTION: forcing a failure. [ 217.964310][T13424] name failslab, interval 1, probability 0, space 0, times 0 [ 217.986937][T13424] CPU: 1 PID: 13424 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 217.994865][T13424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.004932][T13424] Call Trace: [ 218.008225][T13424] dump_stack+0x1d8/0x2f8 [ 218.012555][T13424] should_fail+0x608/0x860 [ 218.016971][T13424] ? setup_fault_attr+0x2b0/0x2b0 [ 218.021992][T13424] ? sock_kmalloc+0xac/0x120 [ 218.026584][T13424] __should_failslab+0x11a/0x160 [ 218.031545][T13424] ? sock_kmalloc+0xac/0x120 [ 218.036139][T13424] should_failslab+0x9/0x20 [ 218.040640][T13424] __kmalloc+0x7a/0x310 [ 218.044799][T13424] sock_kmalloc+0xac/0x120 [ 218.049211][T13424] af_alg_alloc_areq+0x28/0x180 [ 218.054060][T13424] aead_recvmsg+0x51e/0x1c50 [ 218.058667][T13424] ? aead_sendmsg+0x110/0x110 [ 218.063348][T13424] ? __might_fault+0xf9/0x160 [ 218.068024][T13424] ? kasan_check_write+0x14/0x20 [ 218.073071][T13424] ? _copy_from_user+0xe0/0x120 [ 218.077919][T13424] ? rw_copy_check_uvector+0x2e4/0x310 [ 218.083383][T13424] ? import_iovec+0x17e/0x340 [ 218.088055][T13424] ? __might_fault+0xf9/0x160 [ 218.092728][T13424] ? security_socket_recvmsg+0xa9/0xd0 [ 218.098180][T13424] ? aead_sendmsg+0x110/0x110 [ 218.102849][T13424] sock_recvmsg+0xe7/0x100 [ 218.107611][T13424] ___sys_recvmsg+0x28b/0x9c0 [ 218.112371][T13424] ? __sys_recvmsg+0x250/0x250 [ 218.117135][T13424] ? rcu_lock_release+0xd/0x30 [ 218.121896][T13424] ? rcu_lock_release+0x26/0x30 [ 218.126737][T13424] ? __fget+0x4fe/0x540 [ 218.130892][T13424] ? fget_many+0x30/0x30 [ 218.135131][T13424] ? __mutex_lock_common+0x56b/0x2fc0 [ 218.140498][T13424] ? __fdget+0x17c/0x200 [ 218.144733][T13424] do_recvmmsg+0x33d/0x870 [ 218.149147][T13424] ? __sys_recvmmsg+0x220/0x220 [ 218.153987][T13424] ? kasan_check_write+0x14/0x20 [ 218.158915][T13424] ? __mutex_unlock_slowpath+0x18c/0x630 [ 218.164549][T13424] ? kasan_check_write+0x14/0x20 [ 218.169479][T13424] ? fput_many+0x47/0x1a0 [ 218.173801][T13424] ? check_preemption_disabled+0xb7/0x280 [ 218.179521][T13424] __x64_sys_recvmmsg+0x17c/0x220 [ 218.184546][T13424] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 218.190174][T13424] ? do_recvmmsg+0x870/0x870 [ 218.194754][T13424] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 218.200473][T13424] ? do_syscall_64+0x1d/0x140 [ 218.205146][T13424] do_syscall_64+0xfe/0x140 [ 218.209650][T13424] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.215530][T13424] RIP: 0033:0x459519 [ 218.219426][T13424] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 218.239021][T13424] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 218.247422][T13424] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 218.255381][T13424] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 23:26:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}}], 0x1, 0x0, 0x0) [ 218.263342][T13424] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 218.271305][T13424] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 218.279271][T13424] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}}], 0x1, 0x0, 0x0) 23:26:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000188, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:45 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) 23:26:45 executing program 1 (fault-call:6 fault-nth:62): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000}}], 0x1, 0x0, 0x0) 23:26:45 executing program 5: syz_read_part_table(0x10000000, 0x0, 0x0) [ 218.516229][T13446] FAULT_INJECTION: forcing a failure. [ 218.516229][T13446] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 218.529542][T13446] CPU: 0 PID: 13446 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 218.529549][T13446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.529554][T13446] Call Trace: [ 218.529574][T13446] dump_stack+0x1d8/0x2f8 [ 218.550772][T13446] should_fail+0x608/0x860 [ 218.550784][T13446] ? setup_fault_attr+0x2b0/0x2b0 [ 218.550802][T13446] should_fail_alloc_page+0x55/0x60 [ 218.564508][T13446] prepare_alloc_pages+0x283/0x460 [ 218.564524][T13446] __alloc_pages_nodemask+0x11c/0x790 [ 218.564537][T13446] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 218.564554][T13446] ? do_raw_spin_lock+0x143/0x3a0 [ 218.574832][T13446] ? _raw_spin_unlock_irqrestore+0x77/0xe0 [ 218.574849][T13446] kmem_getpages+0x46/0x480 [ 218.574864][T13446] cache_grow_begin+0x7e/0x2c0 [ 218.574883][T13446] cache_alloc_refill+0x311/0x3f0 [ 218.601050][T13446] ? check_preemption_disabled+0xb7/0x280 [ 218.610785][T13446] __kmalloc+0x2e5/0x310 [ 218.620767][T13446] ? sock_kmalloc+0xac/0x120 [ 218.625363][T13446] sock_kmalloc+0xac/0x120 [ 218.630223][T13446] af_alg_alloc_areq+0x28/0x180 [ 218.635076][T13446] aead_recvmsg+0x51e/0x1c50 [ 218.639682][T13446] ? aead_sendmsg+0x110/0x110 [ 218.644369][T13446] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 218.649825][T13446] ? retint_kernel+0x2b/0x2b [ 218.654407][T13446] ? trace_hardirqs_on_caller+0x74/0x80 [ 218.659946][T13446] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 218.665398][T13446] ? rcu_irq_exit+0x118/0x2b0 [ 218.670071][T13446] ? retint_kernel+0x2b/0x2b [ 218.674657][T13446] ? import_iovec+0x17e/0x340 [ 218.679326][T13446] ? import_iovec+0x2c9/0x340 [ 218.683995][T13446] ? __might_fault+0xf9/0x160 [ 218.688673][T13446] ? security_socket_recvmsg+0xa9/0xd0 [ 218.694120][T13446] ? aead_sendmsg+0x110/0x110 [ 218.698789][T13446] sock_recvmsg+0xe7/0x100 [ 218.703204][T13446] ___sys_recvmsg+0x28b/0x9c0 [ 218.707879][T13446] ? __sys_recvmsg+0x250/0x250 [ 218.712646][T13446] ? rcu_lock_release+0xd/0x30 [ 218.717412][T13446] ? rcu_lock_release+0x26/0x30 [ 218.722259][T13446] ? __fget+0x4fe/0x540 [ 218.726417][T13446] ? fget_many+0x30/0x30 [ 218.730652][T13446] ? __mutex_lock_common+0x56b/0x2fc0 [ 218.736030][T13446] ? __fdget+0x17c/0x200 [ 218.740264][T13446] do_recvmmsg+0x33d/0x870 [ 218.744681][T13446] ? __sys_recvmmsg+0x220/0x220 [ 218.749519][T13446] ? kasan_check_write+0x14/0x20 [ 218.754446][T13446] ? __mutex_unlock_slowpath+0x18c/0x630 [ 218.760077][T13446] ? kasan_check_write+0x14/0x20 [ 218.765038][T13446] ? fput_many+0x47/0x1a0 [ 218.769388][T13446] ? check_preemption_disabled+0xb7/0x280 [ 218.775114][T13446] __x64_sys_recvmmsg+0x17c/0x220 [ 218.780145][T13446] ? do_recvmmsg+0x870/0x870 [ 218.784727][T13446] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 218.790435][T13446] ? do_syscall_64+0x1d/0x140 [ 218.795115][T13446] do_syscall_64+0xfe/0x140 [ 218.799877][T13446] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.805795][T13446] RIP: 0033:0x459519 [ 218.809692][T13446] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 218.829284][T13446] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 218.837690][T13446] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 218.845649][T13446] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 218.853610][T13446] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:26:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x11], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}}], 0x1, 0x0, 0x0) 23:26:46 executing program 2: 23:26:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 218.861571][T13446] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 218.869534][T13446] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x88], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:46 executing program 2: 23:26:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x1100], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:46 executing program 5: syz_read_part_table(0x11000000, 0x0, 0x0) 23:26:46 executing program 1 (fault-call:6 fault-nth:63): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}}], 0x1, 0x0, 0x0) 23:26:46 executing program 2: 23:26:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x8800], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:46 executing program 2: 23:26:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}}], 0x1, 0x0, 0x0) 23:26:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x1000000], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:46 executing program 5: syz_read_part_table(0x12000000, 0x0, 0x0) 23:26:46 executing program 2: [ 219.446339][T13488] FAULT_INJECTION: forcing a failure. [ 219.446339][T13488] name failslab, interval 1, probability 0, space 0, times 0 [ 219.471439][T13488] CPU: 0 PID: 13488 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 219.479381][T13488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.489424][T13488] Call Trace: [ 219.489441][T13488] dump_stack+0x1d8/0x2f8 [ 219.489455][T13488] should_fail+0x608/0x860 [ 219.489466][T13488] ? setup_fault_attr+0x2b0/0x2b0 [ 219.489478][T13488] ? sock_kmalloc+0xac/0x120 [ 219.489495][T13488] __should_failslab+0x11a/0x160 [ 219.489507][T13488] ? sock_kmalloc+0xac/0x120 [ 219.520763][T13488] should_failslab+0x9/0x20 [ 219.525274][T13488] __kmalloc+0x7a/0x310 [ 219.529432][T13488] sock_kmalloc+0xac/0x120 [ 219.533844][T13488] af_alg_alloc_areq+0x28/0x180 [ 219.538688][T13488] aead_recvmsg+0x51e/0x1c50 [ 219.543288][T13488] ? aead_sendmsg+0x110/0x110 [ 219.547985][T13488] ? __might_fault+0xf9/0x160 [ 219.552657][T13488] ? kasan_check_write+0x14/0x20 [ 219.557588][T13488] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 219.563038][T13488] ? retint_kernel+0x2b/0x2b [ 219.567620][T13488] ? trace_hardirqs_on_caller+0x74/0x80 [ 219.573156][T13488] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 219.578606][T13488] ? rcu_irq_exit+0x118/0x2b0 [ 219.583278][T13488] ? security_socket_recvmsg+0xa9/0xd0 [ 219.588728][T13488] ? aead_sendmsg+0x110/0x110 [ 219.593402][T13488] sock_recvmsg+0xe7/0x100 [ 219.597813][T13488] ___sys_recvmsg+0x28b/0x9c0 [ 219.602485][T13488] ? __sys_recvmsg+0x250/0x250 [ 219.607247][T13488] ? rcu_lock_release+0xd/0x30 [ 219.612005][T13488] ? rcu_lock_release+0x26/0x30 [ 219.616847][T13488] ? __fget+0x4fe/0x540 [ 219.621005][T13488] ? fget_many+0x30/0x30 [ 219.625244][T13488] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 219.630701][T13488] ? __fdget+0x17c/0x200 [ 219.634935][T13488] do_recvmmsg+0x33d/0x870 [ 219.639358][T13488] ? __sys_recvmmsg+0x220/0x220 [ 219.644246][T13488] ? kasan_check_write+0x14/0x20 [ 219.649708][T13488] ? __mutex_unlock_slowpath+0x18c/0x630 [ 219.655336][T13488] ? kasan_check_write+0x14/0x20 [ 219.660702][T13488] ? fput_many+0x47/0x1a0 [ 219.665022][T13488] ? check_preemption_disabled+0xb7/0x280 [ 219.670739][T13488] __x64_sys_recvmmsg+0x17c/0x220 [ 219.675758][T13488] ? do_recvmmsg+0x870/0x870 [ 219.680339][T13488] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 219.686049][T13488] ? do_syscall_64+0x1d/0x140 [ 219.690828][T13488] do_syscall_64+0xfe/0x140 [ 219.695349][T13488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.701228][T13488] RIP: 0033:0x459519 [ 219.705115][T13488] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 219.724714][T13488] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 219.733115][T13488] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 23:26:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x5}], 0x1}}], 0x1, 0x0, 0x0) 23:26:46 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}}], 0x1, 0x0, 0x0) [ 219.741164][T13488] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 219.749210][T13488] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 219.757178][T13488] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 219.765147][T13488] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:47 executing program 1 (fault-call:6 fault-nth:64): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}}], 0x1, 0x0, 0x0) 23:26:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x11000000], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:47 executing program 2: 23:26:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x6}], 0x1}}], 0x1, 0x0, 0x0) [ 219.941458][T13511] FAULT_INJECTION: forcing a failure. [ 219.941458][T13511] name failslab, interval 1, probability 0, space 0, times 0 [ 219.964098][T13511] CPU: 0 PID: 13511 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 219.972016][T13511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.982677][T13511] Call Trace: [ 219.982695][T13511] dump_stack+0x1d8/0x2f8 [ 219.982711][T13511] should_fail+0x608/0x860 [ 219.982723][T13511] ? setup_fault_attr+0x2b0/0x2b0 [ 219.982737][T13511] ? sock_kmalloc+0xac/0x120 [ 219.994835][T13511] __should_failslab+0x11a/0x160 [ 219.994851][T13511] ? sock_kmalloc+0xac/0x120 [ 219.994860][T13511] should_failslab+0x9/0x20 [ 219.994868][T13511] __kmalloc+0x7a/0x310 [ 219.994882][T13511] sock_kmalloc+0xac/0x120 [ 219.994895][T13511] af_alg_alloc_areq+0x28/0x180 [ 220.009401][T13511] aead_recvmsg+0x51e/0x1c50 [ 220.009432][T13511] ? aead_sendmsg+0x110/0x110 [ 220.009440][T13511] ? rcu_irq_exit+0x118/0x2b0 [ 220.009453][T13511] ? retint_kernel+0x2b/0x2b [ 220.022763][T13511] ? __might_fault+0xf9/0x160 [ 220.022785][T13511] ? kasan_check_write+0x14/0x20 [ 220.022794][T13511] ? _copy_from_user+0xe0/0x120 [ 220.022807][T13511] ? rw_copy_check_uvector+0x2e4/0x310 [ 220.036633][T13511] ? import_iovec+0x17e/0x340 [ 220.036643][T13511] ? __might_fault+0xf9/0x160 [ 220.036658][T13511] ? security_socket_recvmsg+0xa9/0xd0 [ 220.036669][T13511] ? aead_sendmsg+0x110/0x110 23:26:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x88000000], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x6558000000000000}}], 0x1, 0x0, 0x0) 23:26:47 executing program 2: [ 220.045985][T13511] sock_recvmsg+0xe7/0x100 [ 220.046000][T13511] ___sys_recvmsg+0x28b/0x9c0 [ 220.046017][T13511] ? __sys_recvmsg+0x250/0x250 [ 220.046034][T13511] ? rcu_lock_release+0xd/0x30 [ 220.046047][T13511] ? rcu_lock_release+0x26/0x30 [ 220.046055][T13511] ? __fget+0x4fe/0x540 [ 220.046070][T13511] ? fget_many+0x30/0x30 [ 220.055286][T13511] ? __mutex_lock_common+0x56b/0x2fc0 [ 220.055305][T13511] ? __fdget+0x17c/0x200 [ 220.055317][T13511] do_recvmmsg+0x33d/0x870 [ 220.055335][T13511] ? __sys_recvmmsg+0x220/0x220 23:26:47 executing program 5: syz_read_part_table(0x1f000000, 0x0, 0x0) 23:26:47 executing program 1 (fault-call:6 fault-nth:65): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:47 executing program 2: [ 220.055344][T13511] ? kasan_check_write+0x14/0x20 [ 220.055355][T13511] ? __mutex_unlock_slowpath+0x18c/0x630 [ 220.065749][T13511] ? kasan_check_write+0x14/0x20 [ 220.065764][T13511] ? fput_many+0x47/0x1a0 [ 220.065777][T13511] ? check_preemption_disabled+0xb7/0x280 [ 220.065793][T13511] __x64_sys_recvmmsg+0x17c/0x220 [ 220.065805][T13511] ? do_recvmmsg+0x870/0x870 [ 220.075927][T13511] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 220.075939][T13511] ? do_syscall_64+0x1d/0x140 [ 220.075954][T13511] do_syscall_64+0xfe/0x140 [ 220.075970][T13511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.075978][T13511] RIP: 0033:0x459519 [ 220.075989][T13511] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 220.086067][T13511] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 220.086077][T13511] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 23:26:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x7}], 0x1}}], 0x1, 0x0, 0x0) 23:26:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}}], 0x1, 0x0, 0x0) [ 220.086083][T13511] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 220.086089][T13511] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 220.086095][T13511] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 220.086099][T13511] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:47 executing program 2: 23:26:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x8}], 0x1}}], 0x1, 0x0, 0x0) 23:26:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x100000000000000], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 220.339030][T13528] FAULT_INJECTION: forcing a failure. [ 220.339030][T13528] name failslab, interval 1, probability 0, space 0, times 0 [ 220.382006][T13528] CPU: 0 PID: 13528 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 220.389929][T13528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.399977][T13528] Call Trace: [ 220.403350][T13528] dump_stack+0x1d8/0x2f8 [ 220.407672][T13528] should_fail+0x608/0x860 [ 220.412083][T13528] ? setup_fault_attr+0x2b0/0x2b0 [ 220.417096][T13528] ? sock_kmalloc+0xac/0x120 [ 220.421679][T13528] __should_failslab+0x11a/0x160 [ 220.426613][T13528] ? sock_kmalloc+0xac/0x120 [ 220.431207][T13528] should_failslab+0x9/0x20 [ 220.435703][T13528] __kmalloc+0x7a/0x310 [ 220.439852][T13528] sock_kmalloc+0xac/0x120 [ 220.444264][T13528] af_alg_alloc_areq+0x28/0x180 [ 220.449105][T13528] aead_recvmsg+0x51e/0x1c50 [ 220.453705][T13528] ? aead_sendmsg+0x110/0x110 [ 220.458376][T13528] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 220.463823][T13528] ? retint_kernel+0x2b/0x2b [ 220.468403][T13528] ? trace_hardirqs_on_caller+0x74/0x80 [ 220.473935][T13528] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 220.479384][T13528] ? rcu_irq_exit+0x118/0x2b0 [ 220.484048][T13528] ? retint_kernel+0x2b/0x2b [ 220.488630][T13528] ? rw_copy_check_uvector+0x17c/0x310 [ 220.494080][T13528] ? __sanitizer_cov_trace_const_cmp8+0x1b/0x80 [ 220.500310][T13528] ? rw_copy_check_uvector+0x2e4/0x310 [ 220.505768][T13528] ? import_iovec+0x17e/0x340 [ 220.510432][T13528] ? __might_fault+0xf9/0x160 [ 220.515105][T13528] ? security_socket_recvmsg+0xa9/0xd0 [ 220.520644][T13528] ? aead_sendmsg+0x110/0x110 [ 220.525312][T13528] sock_recvmsg+0xe7/0x100 [ 220.529738][T13528] ___sys_recvmsg+0x28b/0x9c0 [ 220.534412][T13528] ? __sys_recvmsg+0x250/0x250 [ 220.539175][T13528] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 220.544643][T13528] ? rcu_lock_release+0xd/0x30 [ 220.549412][T13528] ? rcu_lock_release+0x26/0x30 [ 220.554253][T13528] ? __fget+0x4fe/0x540 [ 220.558409][T13528] ? fget_many+0x30/0x30 [ 220.562995][T13528] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 220.568463][T13528] ? __fdget+0x17c/0x200 [ 220.572700][T13528] do_recvmmsg+0x33d/0x870 [ 220.577116][T13528] ? __sys_recvmmsg+0x220/0x220 [ 220.581958][T13528] ? kasan_check_write+0x14/0x20 [ 220.586888][T13528] ? __mutex_unlock_slowpath+0x18c/0x630 [ 220.592516][T13528] ? kasan_check_write+0x14/0x20 [ 220.597464][T13528] ? fput_many+0x47/0x1a0 [ 220.601798][T13528] ? check_preemption_disabled+0xb7/0x280 [ 220.607515][T13528] __x64_sys_recvmmsg+0x17c/0x220 [ 220.612531][T13528] ? do_recvmmsg+0x870/0x870 [ 220.617135][T13528] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 220.622846][T13528] ? do_syscall_64+0x1d/0x140 [ 220.627521][T13528] do_syscall_64+0xfe/0x140 [ 220.632029][T13528] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.637912][T13528] RIP: 0033:0x459519 [ 220.641801][T13528] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 220.661391][T13528] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 220.669788][T13528] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 23:26:47 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000}}], 0x1, 0x0, 0x0) [ 220.677750][T13528] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 220.685718][T13528] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 220.693688][T13528] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 220.701650][T13528] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:48 executing program 2: 23:26:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000}}], 0x1, 0x0, 0x0) 23:26:48 executing program 5: syz_read_part_table(0x20000000, 0x0, 0x0) 23:26:48 executing program 1 (fault-call:6 fault-nth:66): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x9}], 0x1}}], 0x1, 0x0, 0x0) 23:26:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x1100000000000000], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:48 executing program 2: 23:26:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x8800000000000000], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 220.987453][T13556] FAULT_INJECTION: forcing a failure. [ 220.987453][T13556] name failslab, interval 1, probability 0, space 0, times 0 [ 221.014465][T13556] CPU: 0 PID: 13556 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 221.022394][T13556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.032449][T13556] Call Trace: [ 221.035747][T13556] dump_stack+0x1d8/0x2f8 [ 221.040084][T13556] should_fail+0x608/0x860 [ 221.044513][T13556] ? setup_fault_attr+0x2b0/0x2b0 [ 221.049540][T13556] ? sock_kmalloc+0xac/0x120 [ 221.054149][T13556] __should_failslab+0x11a/0x160 [ 221.059088][T13556] ? sock_kmalloc+0xac/0x120 [ 221.063675][T13556] should_failslab+0x9/0x20 [ 221.068164][T13556] __kmalloc+0x7a/0x310 [ 221.072315][T13556] sock_kmalloc+0xac/0x120 [ 221.076727][T13556] af_alg_alloc_areq+0x28/0x180 [ 221.081573][T13556] aead_recvmsg+0x51e/0x1c50 [ 221.086177][T13556] ? aead_sendmsg+0x110/0x110 [ 221.090868][T13556] ? __might_fault+0xf9/0x160 [ 221.095546][T13556] ? kasan_check_write+0x14/0x20 [ 221.100478][T13556] ? _copy_from_user+0xe0/0x120 [ 221.106396][T13556] ? rw_copy_check_uvector+0x2e4/0x310 [ 221.111888][T13556] ? import_iovec+0x17e/0x340 [ 221.116596][T13556] ? __might_fault+0xf9/0x160 [ 221.121274][T13556] ? security_socket_recvmsg+0xa9/0xd0 [ 221.126730][T13556] ? aead_sendmsg+0x110/0x110 [ 221.131400][T13556] sock_recvmsg+0xe7/0x100 [ 221.135817][T13556] ___sys_recvmsg+0x28b/0x9c0 [ 221.140493][T13556] ? __sys_recvmsg+0x250/0x250 [ 221.145257][T13556] ? rcu_lock_release+0xd/0x30 [ 221.150018][T13556] ? rcu_lock_release+0x26/0x30 [ 221.154859][T13556] ? __fget+0x4fe/0x540 [ 221.159011][T13556] ? fget_many+0x30/0x30 [ 221.163244][T13556] ? __mutex_lock_common+0x56b/0x2fc0 [ 221.168614][T13556] ? __fdget+0x17c/0x200 [ 221.172855][T13556] do_recvmmsg+0x33d/0x870 [ 221.177282][T13556] ? __sys_recvmmsg+0x220/0x220 [ 221.182121][T13556] ? kasan_check_write+0x14/0x20 [ 221.187046][T13556] ? __mutex_unlock_slowpath+0x18c/0x630 [ 221.192677][T13556] ? kasan_check_write+0x14/0x20 [ 221.197603][T13556] ? fput_many+0x47/0x1a0 [ 221.201928][T13556] ? check_preemption_disabled+0xb7/0x280 [ 221.207654][T13556] __x64_sys_recvmmsg+0x17c/0x220 [ 221.212675][T13556] ? do_recvmmsg+0x870/0x870 [ 221.217341][T13556] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 221.223054][T13556] ? do_syscall_64+0x1d/0x140 [ 221.227729][T13556] do_syscall_64+0xfe/0x140 [ 221.232491][T13556] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.238460][T13556] RIP: 0033:0x459519 [ 221.242353][T13556] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 221.262038][T13556] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 221.270444][T13556] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 221.278407][T13556] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 23:26:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xa}], 0x1}}], 0x1, 0x0, 0x0) 23:26:48 executing program 2: [ 221.286380][T13556] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 221.294350][T13556] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 221.302326][T13556] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:48 executing program 1 (fault-call:6 fault-nth:67): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000}}], 0x1, 0x0, 0x0) 23:26:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000640)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00515) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {0x0, 0x2b3}, {0x0}, {0x0}, {&(0x7f00000024c0)=""/8, 0x8}], 0xd1}, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) readv(r2, &(0x7f0000000080)=[{&(0x7f0000000100)=""/201, 0xc9}], 0x1) shutdown(r5, 0x0) shutdown(r2, 0x0) 23:26:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0xffffffff00000000], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:48 executing program 5: syz_read_part_table(0x25000000, 0x0, 0x0) 23:26:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xb}], 0x1}}], 0x1, 0x0, 0x0) 23:26:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x0, 0x11], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 221.457597][T13571] FAULT_INJECTION: forcing a failure. [ 221.457597][T13571] name failslab, interval 1, probability 0, space 0, times 0 [ 221.490317][T13571] CPU: 1 PID: 13571 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 23:26:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xc}], 0x1}}], 0x1, 0x0, 0x0) [ 221.498252][T13571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.508319][T13571] Call Trace: [ 221.511623][T13571] dump_stack+0x1d8/0x2f8 [ 221.515959][T13571] should_fail+0x608/0x860 [ 221.521309][T13571] ? setup_fault_attr+0x2b0/0x2b0 [ 221.526360][T13571] ? sock_kmalloc+0xac/0x120 [ 221.530963][T13571] __should_failslab+0x11a/0x160 [ 221.535903][T13571] ? sock_kmalloc+0xac/0x120 [ 221.540499][T13571] should_failslab+0x9/0x20 [ 221.545007][T13571] __kmalloc+0x7a/0x310 [ 221.549161][T13571] sock_kmalloc+0xac/0x120 [ 221.553576][T13571] af_alg_alloc_areq+0x28/0x180 [ 221.558427][T13571] aead_recvmsg+0x51e/0x1c50 [ 221.563031][T13571] ? aead_sendmsg+0x110/0x110 [ 221.567714][T13571] ? __might_fault+0xf9/0x160 [ 221.572390][T13571] ? kasan_check_write+0x14/0x20 [ 221.577323][T13571] ? _copy_from_user+0xe0/0x120 [ 221.582172][T13571] ? rw_copy_check_uvector+0x2e4/0x310 [ 221.587625][T13571] ? import_iovec+0x17e/0x340 [ 221.592293][T13571] ? __might_fault+0xf9/0x160 [ 221.596965][T13571] ? security_socket_recvmsg+0xa9/0xd0 [ 221.602412][T13571] ? aead_sendmsg+0x110/0x110 [ 221.607085][T13571] sock_recvmsg+0xe7/0x100 [ 221.611498][T13571] ___sys_recvmsg+0x28b/0x9c0 [ 221.616450][T13571] ? __sys_recvmsg+0x250/0x250 [ 221.621213][T13571] ? rcu_lock_release+0xd/0x30 [ 221.625975][T13571] ? rcu_lock_release+0x26/0x30 [ 221.630818][T13571] ? __fget+0x4fe/0x540 [ 221.634973][T13571] ? fget_many+0x30/0x30 [ 221.639206][T13571] ? __mutex_lock_common+0x56b/0x2fc0 [ 221.644576][T13571] ? __fdget+0x17c/0x200 [ 221.648907][T13571] do_recvmmsg+0x33d/0x870 [ 221.653672][T13571] ? __sys_recvmmsg+0x220/0x220 [ 221.658516][T13571] ? kasan_check_write+0x14/0x20 [ 221.663442][T13571] ? __mutex_unlock_slowpath+0x18c/0x630 [ 221.669775][T13571] ? kasan_check_write+0x14/0x20 [ 221.674701][T13571] ? fput_many+0x47/0x1a0 [ 221.679022][T13571] ? check_preemption_disabled+0xb7/0x280 [ 221.684740][T13571] __x64_sys_recvmmsg+0x17c/0x220 [ 221.689845][T13571] ? do_recvmmsg+0x870/0x870 [ 221.694425][T13571] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 221.700135][T13571] ? do_syscall_64+0x1d/0x140 [ 221.704813][T13571] do_syscall_64+0xfe/0x140 [ 221.709312][T13571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.715192][T13571] RIP: 0033:0x459519 [ 221.719077][T13571] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 221.738672][T13571] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 221.747681][T13571] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 23:26:48 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000}}], 0x1, 0x0, 0x0) [ 221.755644][T13571] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 221.763606][T13571] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 221.771568][T13571] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 221.779532][T13571] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xd}], 0x1}}], 0x1, 0x0, 0x0) 23:26:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x0, 0x88], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:49 executing program 1 (fault-call:6 fault-nth:68): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc00e000000000000}}], 0x1, 0x0, 0x0) 23:26:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x0, 0x1100], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 221.962644][T13601] FAULT_INJECTION: forcing a failure. [ 221.962644][T13601] name failslab, interval 1, probability 0, space 0, times 0 [ 221.981414][T13601] CPU: 1 PID: 13601 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 221.989339][T13601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.999395][T13601] Call Trace: [ 222.002688][T13601] dump_stack+0x1d8/0x2f8 [ 222.007020][T13601] should_fail+0x608/0x860 [ 222.011436][T13601] ? setup_fault_attr+0x2b0/0x2b0 [ 222.016459][T13601] ? sock_kmalloc+0xac/0x120 [ 222.021054][T13601] __should_failslab+0x11a/0x160 [ 222.025987][T13601] ? sock_kmalloc+0xac/0x120 [ 222.030570][T13601] should_failslab+0x9/0x20 [ 222.035064][T13601] __kmalloc+0x7a/0x310 [ 222.039216][T13601] sock_kmalloc+0xac/0x120 [ 222.043637][T13601] af_alg_alloc_areq+0x28/0x180 [ 222.048484][T13601] aead_recvmsg+0x51e/0x1c50 [ 222.053091][T13601] ? aead_sendmsg+0x110/0x110 [ 222.057788][T13601] ? __might_fault+0xf9/0x160 [ 222.062460][T13601] ? kasan_check_write+0x14/0x20 [ 222.067388][T13601] ? _copy_from_user+0xe0/0x120 [ 222.072238][T13601] ? rw_copy_check_uvector+0x2e4/0x310 [ 222.077693][T13601] ? import_iovec+0x17e/0x340 [ 222.082362][T13601] ? __might_fault+0xf9/0x160 [ 222.087033][T13601] ? security_socket_recvmsg+0xa9/0xd0 [ 222.092489][T13601] ? aead_sendmsg+0x110/0x110 [ 222.097163][T13601] sock_recvmsg+0xe7/0x100 [ 222.101577][T13601] ___sys_recvmsg+0x28b/0x9c0 [ 222.106254][T13601] ? __sys_recvmsg+0x250/0x250 [ 222.111022][T13601] ? rcu_lock_release+0xd/0x30 [ 222.115782][T13601] ? rcu_lock_release+0x26/0x30 [ 222.120622][T13601] ? __fget+0x4fe/0x540 [ 222.124777][T13601] ? fget_many+0x30/0x30 [ 222.129013][T13601] ? __mutex_lock_common+0x56b/0x2fc0 [ 222.134382][T13601] ? __fdget+0x17c/0x200 [ 222.138620][T13601] do_recvmmsg+0x33d/0x870 [ 222.143038][T13601] ? __sys_recvmmsg+0x220/0x220 [ 222.147879][T13601] ? kasan_check_write+0x14/0x20 [ 222.152807][T13601] ? __mutex_unlock_slowpath+0x18c/0x630 [ 222.158436][T13601] ? kasan_check_write+0x14/0x20 [ 222.163365][T13601] ? fput_many+0x47/0x1a0 [ 222.167688][T13601] ? check_preemption_disabled+0xb7/0x280 [ 222.173404][T13601] __x64_sys_recvmmsg+0x17c/0x220 [ 222.178423][T13601] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 222.184043][T13601] ? do_recvmmsg+0x870/0x870 [ 222.188624][T13601] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 222.194345][T13601] ? do_syscall_64+0x1d/0x140 [ 222.199022][T13601] do_syscall_64+0xfe/0x140 [ 222.203521][T13601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.209415][T13601] RIP: 0033:0x459519 [ 222.213306][T13601] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 222.232898][T13601] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 222.241299][T13601] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 222.249262][T13601] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 222.257230][T13601] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 222.265194][T13601] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 222.274204][T13601] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/208, 0xd0}, {0x0}, {0x0}], 0x3) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000002c0)=""/194, 0xc2}, {0x0}], 0x2}, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) poll(0x0, 0x0, 0xe69) shutdown(r5, 0x0) shutdown(r2, 0x0) 23:26:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc07e000000000000}}], 0x1, 0x0, 0x0) 23:26:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xe}], 0x1}}], 0x1, 0x0, 0x0) 23:26:49 executing program 5: syz_read_part_table(0x260f0000, 0x0, 0x0) 23:26:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x0, 0x8800], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:49 executing program 1 (fault-call:6 fault-nth:69): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x0, 0x1000000], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xf}], 0x1}}], 0x1, 0x0, 0x0) [ 222.465974][T13615] FAULT_INJECTION: forcing a failure. [ 222.465974][T13615] name failslab, interval 1, probability 0, space 0, times 0 [ 222.506082][T13615] CPU: 0 PID: 13615 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 222.514010][T13615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.524070][T13615] Call Trace: [ 222.527364][T13615] dump_stack+0x1d8/0x2f8 [ 222.531707][T13615] should_fail+0x608/0x860 [ 222.536128][T13615] ? setup_fault_attr+0x2b0/0x2b0 [ 222.541150][T13615] ? sock_kmalloc+0xac/0x120 [ 222.545947][T13615] __should_failslab+0x11a/0x160 [ 222.550878][T13615] ? sock_kmalloc+0xac/0x120 [ 222.555477][T13615] should_failslab+0x9/0x20 [ 222.559976][T13615] __kmalloc+0x7a/0x310 [ 222.564136][T13615] sock_kmalloc+0xac/0x120 [ 222.568555][T13615] af_alg_alloc_areq+0x28/0x180 [ 222.573402][T13615] aead_recvmsg+0x51e/0x1c50 [ 222.578012][T13615] ? aead_sendmsg+0x110/0x110 [ 222.582699][T13615] ? __might_fault+0xf9/0x160 [ 222.587723][T13615] ? kasan_check_write+0x14/0x20 [ 222.592649][T13615] ? _copy_from_user+0xe0/0x120 [ 222.597492][T13615] ? rw_copy_check_uvector+0x2e4/0x310 [ 222.602950][T13615] ? import_iovec+0x17e/0x340 [ 222.607614][T13615] ? __might_fault+0xf9/0x160 [ 222.612550][T13615] ? security_socket_recvmsg+0xa9/0xd0 [ 222.618004][T13615] ? aead_sendmsg+0x110/0x110 [ 222.622673][T13615] sock_recvmsg+0xe7/0x100 [ 222.627096][T13615] ___sys_recvmsg+0x28b/0x9c0 [ 222.631892][T13615] ? __sys_recvmsg+0x250/0x250 [ 222.636658][T13615] ? rcu_lock_release+0xd/0x30 [ 222.641777][T13615] ? rcu_lock_release+0x26/0x30 [ 222.646624][T13615] ? __fget+0x4fe/0x540 [ 222.650796][T13615] ? fget_many+0x30/0x30 [ 222.655553][T13615] ? __mutex_lock_common+0x56b/0x2fc0 [ 222.660937][T13615] ? __fdget+0x17c/0x200 [ 222.665178][T13615] do_recvmmsg+0x33d/0x870 [ 222.669594][T13615] ? __sys_recvmmsg+0x220/0x220 [ 222.674452][T13615] ? kasan_check_write+0x14/0x20 [ 222.679383][T13615] ? __mutex_unlock_slowpath+0x18c/0x630 [ 222.685012][T13615] ? kasan_check_write+0x14/0x20 [ 222.689938][T13615] ? fput_many+0x47/0x1a0 [ 222.694261][T13615] ? check_preemption_disabled+0xb7/0x280 [ 222.699980][T13615] __x64_sys_recvmmsg+0x17c/0x220 [ 222.704996][T13615] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 222.710619][T13615] ? do_recvmmsg+0x870/0x870 [ 222.715209][T13615] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 222.720927][T13615] ? do_syscall_64+0x1d/0x140 [ 222.725618][T13615] do_syscall_64+0xfe/0x140 [ 222.730126][T13615] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.736016][T13615] RIP: 0033:0x459519 [ 222.739905][T13615] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:26:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xd002000000000000}}], 0x1, 0x0, 0x0) [ 222.759501][T13615] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 222.767907][T13615] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 222.775884][T13615] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 222.783851][T13615] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 222.791812][T13615] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 222.799862][T13615] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:50 executing program 1 (fault-call:6 fault-nth:70): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x0, 0x11000000], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}}], 0x1, 0x0, 0x0) [ 222.992698][T13638] FAULT_INJECTION: forcing a failure. [ 222.992698][T13638] name failslab, interval 1, probability 0, space 0, times 0 [ 223.017668][T13638] CPU: 1 PID: 13638 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 223.025850][T13638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.035912][T13638] Call Trace: [ 223.039209][T13638] dump_stack+0x1d8/0x2f8 [ 223.043552][T13638] should_fail+0x608/0x860 [ 223.047987][T13638] ? setup_fault_attr+0x2b0/0x2b0 [ 223.053008][T13638] ? sock_kmalloc+0xac/0x120 [ 223.053028][T13638] __should_failslab+0x11a/0x160 [ 223.053040][T13638] ? sock_kmalloc+0xac/0x120 [ 223.053049][T13638] should_failslab+0x9/0x20 [ 223.053058][T13638] __kmalloc+0x7a/0x310 [ 223.053073][T13638] sock_kmalloc+0xac/0x120 [ 223.062571][T13638] af_alg_alloc_areq+0x28/0x180 [ 223.062584][T13638] aead_recvmsg+0x51e/0x1c50 [ 223.062609][T13638] ? aead_sendmsg+0x110/0x110 [ 223.089589][T13638] ? __might_fault+0xf9/0x160 [ 223.089609][T13638] ? kasan_check_write+0x14/0x20 [ 223.089622][T13638] ? _copy_from_user+0xe0/0x120 [ 223.098936][T13638] ? rw_copy_check_uvector+0x2e4/0x310 [ 223.098954][T13638] ? import_iovec+0x17e/0x340 [ 223.098962][T13638] ? __might_fault+0xf9/0x160 [ 223.098976][T13638] ? security_socket_recvmsg+0xa9/0xd0 [ 223.098987][T13638] ? aead_sendmsg+0x110/0x110 [ 223.110230][T13638] sock_recvmsg+0xe7/0x100 [ 223.110246][T13638] ___sys_recvmsg+0x28b/0x9c0 [ 223.110261][T13638] ? __sys_recvmsg+0x250/0x250 [ 223.110279][T13638] ? rcu_lock_release+0xd/0x30 [ 223.120369][T13638] ? rcu_lock_release+0x26/0x30 [ 223.120379][T13638] ? __fget+0x4fe/0x540 [ 223.120395][T13638] ? fget_many+0x30/0x30 [ 223.120407][T13638] ? trace_hardirqs_on_caller+0x74/0x80 [ 223.172535][T13638] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 223.177993][T13638] ? __fdget+0x17c/0x200 [ 223.182233][T13638] do_recvmmsg+0x33d/0x870 [ 223.186656][T13638] ? __sys_recvmmsg+0x220/0x220 [ 223.191500][T13638] ? kasan_check_write+0x14/0x20 [ 223.196426][T13638] ? __mutex_unlock_slowpath+0x18c/0x630 [ 223.202057][T13638] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 223.207510][T13638] ? retint_kernel+0x2b/0x2b [ 223.212095][T13638] ? trace_hardirqs_on_caller+0x74/0x80 [ 223.217638][T13638] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 223.223096][T13638] __x64_sys_recvmmsg+0x17c/0x220 [ 223.228115][T13638] ? retint_kernel+0x2b/0x2b [ 223.232702][T13638] ? do_recvmmsg+0x870/0x870 [ 223.237283][T13638] ? do_syscall_64+0x90/0x140 [ 223.241950][T13638] ? do_syscall_64+0xac/0x140 [ 223.246711][T13638] do_syscall_64+0xfe/0x140 [ 223.251214][T13638] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 223.257094][T13638] RIP: 0033:0x459519 [ 223.260983][T13638] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 223.280581][T13638] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 223.288979][T13638] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 223.297035][T13638] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 223.304996][T13638] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 223.312959][T13638] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 223.320930][T13638] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000100)) ppoll(&(0x7f0000000000)=[{r0, 0x0, 0x6400}], 0x1, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 23:26:50 executing program 5: syz_read_part_table(0x3f000000, 0x0, 0x0) 23:26:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}], 0x1, 0x0, 0x0) 23:26:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x10}], 0x1}}], 0x1, 0x0, 0x0) 23:26:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x0, 0x88000000], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:50 executing program 1 (fault-call:6 fault-nth:71): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}], 0x1, 0x0, 0x0) 23:26:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x30}], 0x1}}], 0x1, 0x0, 0x0) [ 223.835215][T13652] FAULT_INJECTION: forcing a failure. [ 223.835215][T13652] name failslab, interval 1, probability 0, space 0, times 0 [ 223.891042][T13652] CPU: 1 PID: 13652 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 223.898989][T13652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.909218][T13652] Call Trace: [ 223.912507][T13652] dump_stack+0x1d8/0x2f8 [ 223.916835][T13652] should_fail+0x608/0x860 [ 223.921242][T13652] ? setup_fault_attr+0x2b0/0x2b0 [ 223.926259][T13652] ? sock_kmalloc+0xac/0x120 [ 223.930841][T13652] __should_failslab+0x11a/0x160 [ 223.935771][T13652] ? sock_kmalloc+0xac/0x120 [ 223.940360][T13652] should_failslab+0x9/0x20 [ 223.944854][T13652] __kmalloc+0x7a/0x310 [ 223.951209][T13652] sock_kmalloc+0xac/0x120 [ 223.959787][T13652] af_alg_alloc_areq+0x28/0x180 [ 223.964627][T13652] aead_recvmsg+0x51e/0x1c50 [ 223.969226][T13652] ? aead_sendmsg+0x110/0x110 [ 223.973906][T13652] ? __might_fault+0xf9/0x160 [ 223.978578][T13652] ? kasan_check_write+0x14/0x20 [ 223.983506][T13652] ? _copy_from_user+0xe0/0x120 [ 223.988352][T13652] ? rw_copy_check_uvector+0x2e4/0x310 [ 223.993813][T13652] ? import_iovec+0x17e/0x340 [ 223.998475][T13652] ? __might_fault+0xf9/0x160 [ 224.003147][T13652] ? security_socket_recvmsg+0xa9/0xd0 [ 224.008612][T13652] ? aead_sendmsg+0x110/0x110 [ 224.013284][T13652] sock_recvmsg+0xe7/0x100 [ 224.017698][T13652] ___sys_recvmsg+0x28b/0x9c0 [ 224.022728][T13652] ? __sys_recvmsg+0x250/0x250 [ 224.027492][T13652] ? rcu_lock_release+0xd/0x30 [ 224.032251][T13652] ? rcu_lock_release+0x26/0x30 [ 224.037091][T13652] ? __fget+0x4fe/0x540 [ 224.041240][T13652] ? fget_many+0x30/0x30 [ 224.045474][T13652] ? __mutex_lock_common+0x56b/0x2fc0 [ 224.050839][T13652] ? __fdget+0x17c/0x200 [ 224.055079][T13652] do_recvmmsg+0x33d/0x870 [ 224.059498][T13652] ? __sys_recvmmsg+0x220/0x220 [ 224.064336][T13652] ? kasan_check_write+0x14/0x20 [ 224.069260][T13652] ? __mutex_unlock_slowpath+0x18c/0x630 [ 224.074891][T13652] ? kasan_check_write+0x14/0x20 [ 224.079814][T13652] ? fput_many+0x47/0x1a0 [ 224.084136][T13652] ? check_preemption_disabled+0xb7/0x280 [ 224.089852][T13652] __x64_sys_recvmmsg+0x17c/0x220 [ 224.094866][T13652] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 224.100485][T13652] ? do_recvmmsg+0x870/0x870 [ 224.105068][T13652] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 224.110773][T13652] ? do_syscall_64+0x1d/0x140 [ 224.115444][T13652] do_syscall_64+0xfe/0x140 [ 224.119937][T13652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.125818][T13652] RIP: 0033:0x459519 [ 224.129704][T13652] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 224.149297][T13652] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 224.157698][T13652] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 224.165831][T13652] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 224.174151][T13652] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 224.182110][T13652] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 23:26:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x0, 0x100000000000000], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 224.190069][T13652] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x0, 0x1100000000000000], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:51 executing program 1 (fault-call:6 fault-nth:72): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:51 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}], 0x1, 0x0, 0x0) [ 224.420715][T13677] FAULT_INJECTION: forcing a failure. [ 224.420715][T13677] name failslab, interval 1, probability 0, space 0, times 0 [ 224.457472][T13677] CPU: 1 PID: 13677 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 224.465402][T13677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.475451][T13677] Call Trace: [ 224.478742][T13677] dump_stack+0x1d8/0x2f8 [ 224.483070][T13677] should_fail+0x608/0x860 [ 224.487479][T13677] ? setup_fault_attr+0x2b0/0x2b0 [ 224.492496][T13677] ? sock_kmalloc+0xac/0x120 [ 224.497088][T13677] __should_failslab+0x11a/0x160 [ 224.502035][T13677] ? sock_kmalloc+0xac/0x120 [ 224.506616][T13677] should_failslab+0x9/0x20 [ 224.511118][T13677] __kmalloc+0x7a/0x310 [ 224.515272][T13677] sock_kmalloc+0xac/0x120 [ 224.519681][T13677] af_alg_alloc_areq+0x28/0x180 [ 224.524531][T13677] aead_recvmsg+0x51e/0x1c50 [ 224.529238][T13677] ? aead_sendmsg+0x110/0x110 [ 224.533912][T13677] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 224.539359][T13677] ? rcu_irq_exit+0x118/0x2b0 [ 224.544043][T13677] ? __might_fault+0xf9/0x160 [ 224.548716][T13677] ? kasan_check_write+0x14/0x20 [ 224.553640][T13677] ? _copy_from_user+0xe0/0x120 [ 224.558482][T13677] ? rw_copy_check_uvector+0x2e4/0x310 [ 224.563944][T13677] ? import_iovec+0x17e/0x340 [ 224.568608][T13677] ? __might_fault+0xf9/0x160 [ 224.573281][T13677] ? security_socket_recvmsg+0xa9/0xd0 [ 224.578727][T13677] ? aead_sendmsg+0x110/0x110 [ 224.583395][T13677] sock_recvmsg+0xe7/0x100 [ 224.587804][T13677] ___sys_recvmsg+0x28b/0x9c0 [ 224.592478][T13677] ? __sys_recvmsg+0x250/0x250 [ 224.597240][T13677] ? rcu_lock_release+0xd/0x30 [ 224.602002][T13677] ? rcu_lock_release+0x26/0x30 [ 224.606870][T13677] ? __fget+0x4fe/0x540 [ 224.611042][T13677] ? fget_many+0x30/0x30 [ 224.615281][T13677] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 224.620738][T13677] ? __fdget+0x17c/0x200 [ 224.624976][T13677] do_recvmmsg+0x33d/0x870 [ 224.629406][T13677] ? __sys_recvmmsg+0x220/0x220 [ 224.634248][T13677] ? kasan_check_write+0x14/0x20 [ 224.639175][T13677] ? __mutex_unlock_slowpath+0x18c/0x630 [ 224.644802][T13677] ? kasan_check_write+0x14/0x20 [ 224.649730][T13677] ? fput_many+0x47/0x1a0 [ 224.654053][T13677] ? check_preemption_disabled+0xb7/0x280 [ 224.659769][T13677] __x64_sys_recvmmsg+0x17c/0x220 [ 224.664786][T13677] ? do_recvmmsg+0x870/0x870 [ 224.669363][T13677] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 224.675071][T13677] ? do_syscall_64+0x1d/0x140 [ 224.679749][T13677] do_syscall_64+0xfe/0x140 [ 224.684248][T13677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.690128][T13677] RIP: 0033:0x459519 [ 224.694016][T13677] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 224.713609][T13677] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 224.722017][T13677] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 224.729980][T13677] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 224.738692][T13677] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 224.746662][T13677] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 224.754627][T13677] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/54, 0x36}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xffffff97, 0x0, 0x0, 0x800e00821) shutdown(r0, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x800000001}, {r1, 0x4}], 0x2, 0x0, 0x0, 0x0) shutdown(r1, 0x0) 23:26:52 executing program 5: syz_read_part_table(0x40000000, 0x0, 0x0) 23:26:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x50}], 0x1}}], 0x1, 0x0, 0x0) 23:26:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x0, 0x8800000000000000], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}], 0x1, 0x0, 0x0) 23:26:52 executing program 1 (fault-call:6 fault-nth:73): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160, 0x0, 0xffffffff00000000], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 224.976433][T13691] FAULT_INJECTION: forcing a failure. [ 224.976433][T13691] name failslab, interval 1, probability 0, space 0, times 0 [ 224.999022][T13691] CPU: 1 PID: 13691 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 225.006956][T13691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.017137][T13691] Call Trace: [ 225.020427][T13691] dump_stack+0x1d8/0x2f8 [ 225.024752][T13691] should_fail+0x608/0x860 [ 225.029157][T13691] ? setup_fault_attr+0x2b0/0x2b0 [ 225.034268][T13691] ? sock_kmalloc+0xac/0x120 [ 225.038852][T13691] __should_failslab+0x11a/0x160 [ 225.043787][T13691] ? sock_kmalloc+0xac/0x120 [ 225.048367][T13691] should_failslab+0x9/0x20 [ 225.052864][T13691] __kmalloc+0x7a/0x310 [ 225.057018][T13691] sock_kmalloc+0xac/0x120 [ 225.061427][T13691] af_alg_alloc_areq+0x28/0x180 [ 225.066272][T13691] aead_recvmsg+0x51e/0x1c50 [ 225.070882][T13691] ? aead_sendmsg+0x110/0x110 [ 225.075562][T13691] ? __might_fault+0xf9/0x160 [ 225.080238][T13691] ? kasan_check_write+0x14/0x20 [ 225.085251][T13691] ? _copy_from_user+0xe0/0x120 [ 225.090094][T13691] ? rw_copy_check_uvector+0x2e4/0x310 [ 225.095552][T13691] ? import_iovec+0x17e/0x340 [ 225.100214][T13691] ? __might_fault+0xf9/0x160 [ 225.106499][T13691] ? security_socket_recvmsg+0xa9/0xd0 [ 225.111951][T13691] ? aead_sendmsg+0x110/0x110 [ 225.116628][T13691] sock_recvmsg+0xe7/0x100 [ 225.121037][T13691] ___sys_recvmsg+0x28b/0x9c0 [ 225.125716][T13691] ? __sys_recvmsg+0x250/0x250 [ 225.130477][T13691] ? rcu_lock_release+0xd/0x30 [ 225.135254][T13691] ? rcu_lock_release+0x26/0x30 [ 225.140752][T13691] ? __fget+0x4fe/0x540 [ 225.144914][T13691] ? fget_many+0x30/0x30 [ 225.149150][T13691] ? __mutex_lock_common+0x56b/0x2fc0 [ 225.154520][T13691] ? __fdget+0x17c/0x200 [ 225.158754][T13691] do_recvmmsg+0x33d/0x870 [ 225.163169][T13691] ? __sys_recvmmsg+0x220/0x220 [ 225.168014][T13691] ? kasan_check_write+0x14/0x20 [ 225.172946][T13691] ? __mutex_unlock_slowpath+0x18c/0x630 [ 225.178575][T13691] ? kasan_check_write+0x14/0x20 [ 225.183503][T13691] ? fput_many+0x47/0x1a0 [ 225.187822][T13691] ? check_preemption_disabled+0xb7/0x280 [ 225.193540][T13691] __x64_sys_recvmmsg+0x17c/0x220 [ 225.198554][T13691] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 225.204171][T13691] ? do_recvmmsg+0x870/0x870 [ 225.208833][T13691] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 225.214541][T13691] ? do_syscall_64+0x1d/0x140 [ 225.219211][T13691] do_syscall_64+0xfe/0x140 [ 225.223711][T13691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 225.229594][T13691] RIP: 0033:0x459519 [ 225.233480][T13691] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 225.253255][T13691] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 225.261657][T13691] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 225.269624][T13691] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 23:26:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x60}], 0x1}}], 0x1, 0x0, 0x0) 23:26:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}], 0x1, 0x0, 0x0) [ 225.277588][T13691] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 225.285545][T13691] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 225.293502][T13691] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x70}], 0x1}}], 0x1, 0x0, 0x0) 23:26:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}}], 0x1, 0x0, 0x0) 23:26:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x11, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:52 executing program 2: r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280), 0xe803}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000340)=@in6={0xa, 0x4e20, 0x0, @loopback, 0x8}, 0x80, 0x0, 0x0, &(0x7f00000007c0)}, 0x0) 23:26:52 executing program 1 (fault-call:6 fault-nth:74): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:52 executing program 5: syz_read_part_table(0x48000000, 0x0, 0x0) 23:26:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x88, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x90}], 0x1}}], 0x1, 0x0, 0x0) 23:26:52 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}}], 0x1, 0x0, 0x0) 23:26:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x1100, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 225.586358][T13723] FAULT_INJECTION: forcing a failure. [ 225.586358][T13723] name failslab, interval 1, probability 0, space 0, times 0 23:26:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xa0}], 0x1}}], 0x1, 0x0, 0x0) [ 225.636238][T13723] CPU: 0 PID: 13723 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 225.644167][T13723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.654223][T13723] Call Trace: [ 225.657525][T13723] dump_stack+0x1d8/0x2f8 [ 225.661865][T13723] should_fail+0x608/0x860 [ 225.666289][T13723] ? setup_fault_attr+0x2b0/0x2b0 [ 225.671320][T13723] ? sock_kmalloc+0xac/0x120 [ 225.675920][T13723] __should_failslab+0x11a/0x160 [ 225.680857][T13723] ? sock_kmalloc+0xac/0x120 [ 225.685448][T13723] should_failslab+0x9/0x20 [ 225.689941][T13723] __kmalloc+0x7a/0x310 [ 225.694103][T13723] sock_kmalloc+0xac/0x120 [ 225.698516][T13723] af_alg_alloc_areq+0x28/0x180 [ 225.703363][T13723] aead_recvmsg+0x51e/0x1c50 [ 225.707970][T13723] ? aead_sendmsg+0x110/0x110 [ 225.712653][T13723] ? __might_fault+0xf9/0x160 [ 225.717335][T13723] ? kasan_check_write+0x14/0x20 [ 225.722261][T13723] ? _copy_from_user+0xe0/0x120 [ 225.727105][T13723] ? rw_copy_check_uvector+0x2e4/0x310 [ 225.732559][T13723] ? import_iovec+0x17e/0x340 [ 225.737233][T13723] ? __might_fault+0xf9/0x160 [ 225.741911][T13723] ? security_socket_recvmsg+0xa9/0xd0 [ 225.747533][T13723] ? aead_sendmsg+0x110/0x110 [ 225.752723][T13723] sock_recvmsg+0xe7/0x100 [ 225.757135][T13723] ___sys_recvmsg+0x28b/0x9c0 [ 225.761809][T13723] ? __sys_recvmsg+0x250/0x250 [ 225.766572][T13723] ? rcu_lock_release+0xd/0x30 [ 225.771336][T13723] ? rcu_lock_release+0x26/0x30 [ 225.776179][T13723] ? __fget+0x4fe/0x540 [ 225.780335][T13723] ? fget_many+0x30/0x30 [ 225.784567][T13723] ? rcu_irq_exit+0x118/0x2b0 [ 225.789245][T13723] ? __fdget+0x17c/0x200 [ 225.793481][T13723] do_recvmmsg+0x33d/0x870 [ 225.797897][T13723] ? __sys_recvmmsg+0x220/0x220 [ 225.802735][T13723] ? kasan_check_write+0x14/0x20 [ 225.807663][T13723] ? __mutex_unlock_slowpath+0x18c/0x630 [ 225.813290][T13723] ? kasan_check_write+0x14/0x20 [ 225.818304][T13723] ? fput_many+0x47/0x1a0 [ 225.822621][T13723] ? check_preemption_disabled+0xb7/0x280 [ 225.828335][T13723] __x64_sys_recvmmsg+0x17c/0x220 [ 225.833353][T13723] ? do_recvmmsg+0x870/0x870 [ 225.837930][T13723] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 225.843641][T13723] ? do_syscall_64+0x1d/0x140 [ 225.848314][T13723] do_syscall_64+0xfe/0x140 [ 225.852813][T13723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 225.858694][T13723] RIP: 0033:0x459519 [ 225.862580][T13723] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:26:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xf}], 0x1}}], 0x1, 0x0, 0x0) 23:26:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}}], 0x1, 0x0, 0x0) [ 225.882177][T13723] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 225.890575][T13723] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 [ 225.898538][T13723] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 225.906681][T13723] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 225.914641][T13723] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 225.922690][T13723] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x8800, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}], 0x1, 0x0, 0x0) 23:26:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xb0}], 0x1}}], 0x1, 0x0, 0x0) 23:26:53 executing program 1 (fault-call:6 fault-nth:75): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}}], 0x1, 0x0, 0x0) 23:26:53 executing program 5: syz_read_part_table(0x4c000000, 0x0, 0x0) 23:26:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x1000000, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xc0}], 0x1}}], 0x1, 0x0, 0x0) 23:26:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xb}], 0x1}}], 0x1, 0x0, 0x0) 23:26:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}}], 0x1, 0x0, 0x0) [ 226.182508][T13759] FAULT_INJECTION: forcing a failure. [ 226.182508][T13759] name failslab, interval 1, probability 0, space 0, times 0 [ 226.209820][T13759] CPU: 1 PID: 13759 Comm: syz-executor.1 Not tainted 5.2.0-rc6+ #9 [ 226.217750][T13759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.227804][T13759] Call Trace: [ 226.231099][T13759] dump_stack+0x1d8/0x2f8 [ 226.235431][T13759] should_fail+0x608/0x860 [ 226.239850][T13759] ? setup_fault_attr+0x2b0/0x2b0 [ 226.244886][T13759] ? sock_kmalloc+0xac/0x120 [ 226.249480][T13759] __should_failslab+0x11a/0x160 [ 226.254503][T13759] ? sock_kmalloc+0xac/0x120 [ 226.259088][T13759] should_failslab+0x9/0x20 [ 226.263669][T13759] __kmalloc+0x7a/0x310 [ 226.267827][T13759] sock_kmalloc+0xac/0x120 [ 226.272236][T13759] af_alg_alloc_areq+0x28/0x180 [ 226.277079][T13759] aead_recvmsg+0x51e/0x1c50 [ 226.281679][T13759] ? aead_sendmsg+0x110/0x110 [ 226.286363][T13759] ? __might_fault+0xf9/0x160 [ 226.291040][T13759] ? kasan_check_write+0x14/0x20 [ 226.295973][T13759] ? _copy_from_user+0xe0/0x120 [ 226.300820][T13759] ? rw_copy_check_uvector+0x2e4/0x310 [ 226.306279][T13759] ? import_iovec+0x17e/0x340 [ 226.310955][T13759] ? __might_fault+0xf9/0x160 [ 226.315636][T13759] ? security_socket_recvmsg+0xa9/0xd0 [ 226.321085][T13759] ? aead_sendmsg+0x110/0x110 [ 226.325755][T13759] sock_recvmsg+0xe7/0x100 [ 226.330177][T13759] ___sys_recvmsg+0x28b/0x9c0 [ 226.334855][T13759] ? __sys_recvmsg+0x250/0x250 [ 226.339623][T13759] ? rcu_lock_release+0xd/0x30 [ 226.344388][T13759] ? rcu_lock_release+0x26/0x30 [ 226.349236][T13759] ? __fget+0x4fe/0x540 [ 226.353395][T13759] ? fget_many+0x30/0x30 [ 226.357632][T13759] ? __mutex_lock_common+0x56b/0x2fc0 [ 226.363092][T13759] ? __fdget+0x17c/0x200 [ 226.367327][T13759] do_recvmmsg+0x33d/0x870 [ 226.371743][T13759] ? __sys_recvmmsg+0x220/0x220 [ 226.376595][T13759] ? kasan_check_write+0x14/0x20 [ 226.381524][T13759] ? __mutex_unlock_slowpath+0x18c/0x630 [ 226.387939][T13759] ? kasan_check_write+0x14/0x20 [ 226.392880][T13759] ? fput_many+0x47/0x1a0 [ 226.397206][T13759] ? check_preemption_disabled+0xb7/0x280 [ 226.402924][T13759] __x64_sys_recvmmsg+0x17c/0x220 [ 226.407944][T13759] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 226.413565][T13759] ? do_recvmmsg+0x870/0x870 [ 226.418150][T13759] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 226.423872][T13759] ? do_syscall_64+0x1d/0x140 [ 226.428555][T13759] do_syscall_64+0xfe/0x140 [ 226.433065][T13759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.438946][T13759] RIP: 0033:0x459519 [ 226.442835][T13759] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 226.462451][T13759] RSP: 002b:00007f6eeea86c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 226.470877][T13759] RAX: ffffffffffffffda RBX: 00007f6eeea86c90 RCX: 0000000000459519 23:26:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xd0}], 0x1}}], 0x1, 0x0, 0x0) 23:26:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x9}], 0x1}}], 0x1, 0x0, 0x0) [ 226.478856][T13759] RDX: 0000000000000001 RSI: 0000000020007e00 RDI: 0000000000000005 [ 226.486833][T13759] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 226.494808][T13759] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6eeea876d4 [ 226.502778][T13759] R13: 00000000004c6860 R14: 00000000004db8b8 R15: 0000000000000006 23:26:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d0}}], 0x1, 0x0, 0x0) 23:26:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xe0}], 0x1}}], 0x1, 0x0, 0x0) 23:26:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xf0ffffff00000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:53 executing program 1 (fault-call:6 fault-nth:76): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}}], 0x1, 0x0, 0x0) 23:26:53 executing program 5: syz_read_part_table(0x5c000000, 0x0, 0x0) 23:26:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x11000000, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x8dffffff00000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0xf0}], 0x1}}], 0x1, 0x0, 0x0) 23:26:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}}], 0x1, 0x0, 0x0) 23:26:54 executing program 5: syz_read_part_table(0x68000000, 0x0, 0x0) 23:26:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x88000000, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}}], 0x1, 0x0, 0x0) 23:26:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x110}], 0x1}}], 0x1, 0x0, 0x0) 23:26:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x40000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x100000000000000, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}}], 0x1, 0x0, 0x0) 23:26:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x3, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x1100000000000000, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}}], 0x1, 0x0, 0x0) 23:26:54 executing program 5: syz_read_part_table(0x6c000000, 0x0, 0x0) 23:26:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x120}], 0x1}}], 0x1, 0x0, 0x0) 23:26:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x8800000000000000, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xec0}}], 0x1, 0x0, 0x0) 23:26:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x130}], 0x1}}], 0x1, 0x0, 0x0) 23:26:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x40000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x300, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0xffffffff00000000, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:54 executing program 5: syz_read_part_table(0x74000000, 0x0, 0x0) 23:26:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}}], 0x1, 0x0, 0x0) 23:26:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x140}], 0x1}}], 0x1, 0x0, 0x0) 23:26:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x4000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:54 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}}], 0x1, 0x0, 0x0) 23:26:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x150}], 0x1}}], 0x1, 0x0, 0x0) 23:26:55 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}}], 0x1, 0x0, 0x0) 23:26:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:55 executing program 5: syz_read_part_table(0x7a000000, 0x0, 0x0) 23:26:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x300, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}], 0x1, 0x0, 0x0) 23:26:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x1000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x160}], 0x1}}], 0x1, 0x0, 0x0) 23:26:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x170}], 0x1}}], 0x1, 0x0, 0x0) 23:26:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788}}], 0x1, 0x0, 0x0) 23:26:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x3000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x180}], 0x1}}], 0x1, 0x0, 0x0) 23:26:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888}}], 0x1, 0x0, 0x0) 23:26:55 executing program 5: syz_read_part_table(0xebffffff, 0x0, 0x0) 23:26:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x300, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x190}], 0x1}}], 0x1, 0x0, 0x0) 23:26:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x40000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5865}}], 0x1, 0x0, 0x0) 23:26:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1a0}], 0x1}}], 0x1, 0x0, 0x0) 23:26:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}}], 0x1, 0x0, 0x0) 23:26:55 executing program 5: syz_read_part_table(0xfdfdffff, 0x0, 0x0) 23:26:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x8dffffff, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x190}], 0x1}}], 0x1, 0x0, 0x0) 23:26:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6558}}], 0x1, 0x0, 0x0) 23:26:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1b0}], 0x1}}], 0x1, 0x0, 0x0) 23:26:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xf0ffffff, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1c0}], 0x1}}], 0x1, 0x0, 0x0) 23:26:55 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ec0}}], 0x1, 0x0, 0x0) 23:26:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:55 executing program 5: syz_read_part_table(0xfffffdfd, 0x0, 0x0) 23:26:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}}], 0x1, 0x0, 0x0) 23:26:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1d0}], 0x1}}], 0x1, 0x0, 0x0) 23:26:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="11e89c6a"]}, 0x7c) 23:26:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1e0}], 0x1}}], 0x1, 0x0, 0x0) 23:26:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xffffff8d, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847}}], 0x1, 0x0, 0x0) 23:26:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="88e89c6a"]}, 0x7c) 23:26:56 executing program 5: syz_read_part_table(0xffffffeb, 0x0, 0x0) 23:26:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848}}], 0x1, 0x0, 0x0) 23:26:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1f0}], 0x1}}], 0x1, 0x0, 0x0) 23:26:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xfffffff0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00e}}], 0x1, 0x0, 0x0) 23:26:56 executing program 5: syz_read_part_table(0x1000000000, 0x0, 0x0) 23:26:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x210}], 0x1}}], 0x1, 0x0, 0x0) 23:26:56 executing program 2 (fault-call:0 fault-nth:0): clone(0x41ffc, 0x0, &(0x7f0000000200), 0x0, 0x0) 23:26:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc07e}}], 0x1, 0x0, 0x0) 23:26:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) pipe2(&(0x7f0000000000), 0x84800) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) 23:26:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x220}], 0x1}}], 0x1, 0x0, 0x0) 23:26:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) accept4$ax25(r1, &(0x7f0000000040)={{}, [@rose, @null, @null, @null, @remote, @rose, @bcast, @rose]}, &(0x7f00000000c0)=0x48, 0x80800) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="07e89c6a"]}, 0x7c) 23:26:56 executing program 5: syz_read_part_table(0x80000000000, 0x0, 0x0) [ 229.514992][T14043] FAULT_INJECTION: forcing a failure. [ 229.514992][T14043] name failslab, interval 1, probability 0, space 0, times 0 23:26:56 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd002}}], 0x1, 0x0, 0x0) 23:26:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x100000000000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x230}], 0x1}}], 0x1, 0x0, 0x0) 23:26:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14, 0x800) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000140)={@dev={0xac, 0x14, 0x14, 0x11}, @loopback, r2}, 0xc) bind$bt_hci(r1, &(0x7f00000000c0)={0x1f, r2}, 0xc) [ 229.656881][T14043] CPU: 1 PID: 14043 Comm: syz-executor.2 Not tainted 5.2.0-rc6+ #9 [ 229.664820][T14043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.674876][T14043] Call Trace: [ 229.678172][T14043] dump_stack+0x1d8/0x2f8 [ 229.682512][T14043] should_fail+0x608/0x860 [ 229.686930][T14043] ? setup_fault_attr+0x2b0/0x2b0 [ 229.691962][T14043] __should_failslab+0x11a/0x160 [ 229.696900][T14043] should_failslab+0x9/0x20 [ 229.701397][T14043] kmem_cache_alloc_node+0x65/0x270 [ 229.706595][T14043] ? copy_process+0x59e/0x5c90 [ 229.711356][T14043] copy_process+0x59e/0x5c90 [ 229.715956][T14043] ? fsnotify+0x14b9/0x1580 [ 229.720459][T14043] ? fork_idle+0x1b0/0x1b0 [ 229.724881][T14043] ? kasan_check_write+0x14/0x20 [ 229.729817][T14043] ? __mutex_unlock_slowpath+0x18c/0x630 [ 229.735448][T14043] _do_fork+0x180/0x5f0 [ 229.739993][T14043] ? dup_mm+0x340/0x340 [ 229.744146][T14043] ? debug_smp_processor_id+0x1c/0x20 [ 229.749507][T14043] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 229.755567][T14043] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 229.761282][T14043] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 229.767078][T14043] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 229.772528][T14043] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 229.778331][T14043] __x64_sys_clone+0xc1/0xd0 [ 229.782913][T14043] do_syscall_64+0xfe/0x140 [ 229.787412][T14043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.793294][T14043] RIP: 0033:0x459519 [ 229.797178][T14043] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 229.816770][T14043] RSP: 002b:00007f5a8e4c3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 229.825177][T14043] RAX: ffffffffffffffda RBX: 00007f5a8e4c3c90 RCX: 0000000000459519 [ 229.833139][T14043] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000000041ffc [ 229.841102][T14043] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 229.849064][T14043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a8e4c46d4 23:26:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a000}}], 0x1, 0x0, 0x0) [ 229.857024][T14043] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000003 23:26:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x240}], 0x1}}], 0x1, 0x0, 0x0) 23:26:57 executing program 2 (fault-call:0 fault-nth:1): clone(0x41ffc, 0x0, &(0x7f0000000200), 0x0, 0x0) 23:26:57 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) 23:26:57 executing program 5: syz_read_part_table(0x100000000000000, 0x0, 0x0) 23:26:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000}}], 0x1, 0x0, 0x0) 23:26:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x250}], 0x1}}], 0x1, 0x0, 0x0) 23:26:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) getsockopt$rose(r1, 0x104, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e86603"]}, 0x7c) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}, &(0x7f0000000140)=0x10) 23:26:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x300000000000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 230.067978][T14077] FAULT_INJECTION: forcing a failure. [ 230.067978][T14077] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 230.136951][T14077] CPU: 1 PID: 14077 Comm: syz-executor.2 Not tainted 5.2.0-rc6+ #9 [ 230.144895][T14077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.154954][T14077] Call Trace: [ 230.158246][T14077] dump_stack+0x1d8/0x2f8 [ 230.162571][T14077] should_fail+0x608/0x860 [ 230.166982][T14077] ? setup_fault_attr+0x2b0/0x2b0 [ 230.172011][T14077] should_fail_alloc_page+0x55/0x60 [ 230.177207][T14077] prepare_alloc_pages+0x283/0x460 [ 230.182321][T14077] __alloc_pages_nodemask+0x11c/0x790 [ 230.187695][T14077] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 230.193241][T14077] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 230.198966][T14077] ? copy_process+0x59e/0x5c90 [ 230.203725][T14077] copy_process+0x625/0x5c90 [ 230.208324][T14077] ? fsnotify+0x14b9/0x1580 [ 230.212824][T14077] ? fork_idle+0x1b0/0x1b0 [ 230.217238][T14077] ? kasan_check_write+0x14/0x20 [ 230.222170][T14077] ? __mutex_unlock_slowpath+0x18c/0x630 [ 230.227889][T14077] _do_fork+0x180/0x5f0 [ 230.232045][T14077] ? dup_mm+0x340/0x340 [ 230.236202][T14077] ? debug_smp_processor_id+0x1c/0x20 [ 230.241572][T14077] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 230.247634][T14077] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 230.253344][T14077] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 230.258965][T14077] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 230.264425][T14077] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 230.270150][T14077] __x64_sys_clone+0xc1/0xd0 [ 230.274744][T14077] do_syscall_64+0xfe/0x140 [ 230.279246][T14077] entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:26:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0, 0x0) [ 230.285127][T14077] RIP: 0033:0x459519 [ 230.285137][T14077] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.285142][T14077] RSP: 002b:00007f5a8e4c3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 230.285151][T14077] RAX: ffffffffffffffda RBX: 00007f5a8e4c3c90 RCX: 0000000000459519 [ 230.285157][T14077] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000000041ffc 23:26:57 executing program 2 (fault-call:0 fault-nth:2): clone(0x41ffc, 0x0, &(0x7f0000000200), 0x0, 0x0) 23:26:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x260}], 0x1}}], 0x1, 0x0, 0x0) 23:26:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) r1 = dup3(r0, r0, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000000)=0x2) [ 230.285163][T14077] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 230.285169][T14077] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a8e4c46d4 [ 230.285175][T14077] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000003 23:26:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x4000000000000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:57 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300}}], 0x1, 0x0, 0x0) [ 230.451931][T14102] FAULT_INJECTION: forcing a failure. [ 230.451931][T14102] name failslab, interval 1, probability 0, space 0, times 0 [ 230.483718][T14102] CPU: 0 PID: 14102 Comm: syz-executor.2 Not tainted 5.2.0-rc6+ #9 [ 230.491643][T14102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:26:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) getsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000000)={@remote, @broadcast}, &(0x7f0000000040)=0xffffffffffffffdb) [ 230.501698][T14102] Call Trace: [ 230.505004][T14102] dump_stack+0x1d8/0x2f8 [ 230.509337][T14102] should_fail+0x608/0x860 [ 230.513748][T14102] ? setup_fault_attr+0x2b0/0x2b0 [ 230.518761][T14102] __should_failslab+0x11a/0x160 [ 230.523690][T14102] ? prepare_creds+0x3e/0x370 [ 230.528365][T14102] should_failslab+0x9/0x20 [ 230.532950][T14102] kmem_cache_alloc+0x56/0x2b0 [ 230.537709][T14102] prepare_creds+0x3e/0x370 [ 230.542203][T14102] copy_creds+0xf3/0x600 [ 230.546449][T14102] copy_process+0xdb7/0x5c90 [ 230.551071][T14102] ? _raw_spin_unlock_irq+0x27/0x80 [ 230.556266][T14102] ? fork_idle+0x1b0/0x1b0 [ 230.560671][T14102] ? finish_lock_switch+0x31/0x40 [ 230.565774][T14102] ? check_preemption_disabled+0x47/0x280 [ 230.571491][T14102] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 230.577208][T14102] _do_fork+0x180/0x5f0 [ 230.581359][T14102] ? dup_mm+0x340/0x340 [ 230.585506][T14102] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 230.591224][T14102] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 230.596935][T14102] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 230.602382][T14102] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 230.608093][T14102] __x64_sys_clone+0xc1/0xd0 [ 230.612676][T14102] do_syscall_64+0xfe/0x140 [ 230.617174][T14102] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.623062][T14102] RIP: 0033:0x459519 [ 230.626946][T14102] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.646552][T14102] RSP: 002b:00007f5a8e4c3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 230.654955][T14102] RAX: ffffffffffffffda RBX: 00007f5a8e4c3c90 RCX: 0000000000459519 [ 230.662918][T14102] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000000041ffc [ 230.670880][T14102] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 230.679101][T14102] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a8e4c46d4 [ 230.687069][T14102] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000003 23:26:57 executing program 5: syz_read_part_table(0x200000000000000, 0x0, 0x0) 23:26:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x270}], 0x1}}], 0x1, 0x0, 0x0) 23:26:57 executing program 2 (fault-call:0 fault-nth:3): clone(0x41ffc, 0x0, &(0x7f0000000200), 0x0, 0x0) 23:26:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) [ 230.774523][T14114] FAULT_INJECTION: forcing a failure. [ 230.774523][T14114] name failslab, interval 1, probability 0, space 0, times 0 23:26:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00100}}], 0x1, 0x0, 0x0) [ 230.876623][T14114] CPU: 0 PID: 14114 Comm: syz-executor.2 Not tainted 5.2.0-rc6+ #9 [ 230.884559][T14114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.894618][T14114] Call Trace: [ 230.897913][T14114] dump_stack+0x1d8/0x2f8 [ 230.902241][T14114] should_fail+0x608/0x860 [ 230.906655][T14114] ? setup_fault_attr+0x2b0/0x2b0 [ 230.911679][T14114] ? kzalloc+0x26/0x40 [ 230.915746][T14114] __should_failslab+0x11a/0x160 [ 230.920677][T14114] ? kzalloc+0x26/0x40 [ 230.924741][T14114] should_failslab+0x9/0x20 [ 230.929237][T14114] __kmalloc+0x7a/0x310 [ 230.933385][T14114] ? refcount_add_checked+0x60/0x60 [ 230.940111][T14114] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 230.945828][T14114] kzalloc+0x26/0x40 [ 230.950072][T14114] security_prepare_creds+0x40/0x260 [ 230.956228][T14114] prepare_creds+0x29e/0x370 [ 230.960817][T14114] copy_creds+0xf3/0x600 [ 230.965057][T14114] copy_process+0xdb7/0x5c90 [ 230.969655][T14114] ? fsnotify+0x14b9/0x1580 [ 230.974159][T14114] ? fork_idle+0x1b0/0x1b0 [ 230.978577][T14114] ? kasan_check_write+0x14/0x20 [ 230.983624][T14114] ? __mutex_unlock_slowpath+0x18c/0x630 [ 230.989420][T14114] _do_fork+0x180/0x5f0 [ 230.993573][T14114] ? dup_mm+0x340/0x340 [ 230.997734][T14114] ? debug_smp_processor_id+0x1c/0x20 [ 231.003099][T14114] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 231.009162][T14114] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 231.014875][T14114] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 231.020500][T14114] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 231.026227][T14114] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 231.031941][T14114] __x64_sys_clone+0xc1/0xd0 [ 231.036533][T14114] do_syscall_64+0xfe/0x140 [ 231.041046][T14114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.046931][T14114] RIP: 0033:0x459519 [ 231.050820][T14114] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:26:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x280}], 0x1}}], 0x1, 0x0, 0x0) 23:26:58 executing program 2 (fault-call:0 fault-nth:4): clone(0x41ffc, 0x0, &(0x7f0000000200), 0x0, 0x0) [ 231.070416][T14114] RSP: 002b:00007f5a8e4c3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 231.078820][T14114] RAX: ffffffffffffffda RBX: 00007f5a8e4c3c90 RCX: 0000000000459519 [ 231.086789][T14114] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000000041ffc [ 231.094749][T14114] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 231.102713][T14114] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a8e4c46d4 [ 231.111668][T14114] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000003 23:26:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x8040, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000140)=""/253) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000080)={0x2, 0xffffffffffff3961, [0x4, 0x8, 0x8, 0x4, 0x3]}) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x6, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x1d}}, &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0x2}, 0x4) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f00000002c0)={0xf5a, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x10}}}, 0x1, 0x1, [{{0x2, 0x4e22, @multicast1}}]}, 0x110) 23:26:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x8000000000000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}], 0x1, 0x0, 0x0) [ 231.208287][T14134] FAULT_INJECTION: forcing a failure. [ 231.208287][T14134] name failslab, interval 1, probability 0, space 0, times 0 23:26:58 executing program 5: syz_read_part_table(0x300000000000000, 0x0, 0x0) [ 231.253027][T14134] CPU: 0 PID: 14134 Comm: syz-executor.2 Not tainted 5.2.0-rc6+ #9 [ 231.260967][T14134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.271033][T14134] Call Trace: [ 231.274337][T14134] dump_stack+0x1d8/0x2f8 [ 231.278679][T14134] should_fail+0x608/0x860 [ 231.283105][T14134] ? setup_fault_attr+0x2b0/0x2b0 [ 231.288131][T14134] __should_failslab+0x11a/0x160 [ 231.288148][T14134] ? __delayacct_tsk_init+0x20/0x90 [ 231.288161][T14134] should_failslab+0x9/0x20 [ 231.298270][T14134] kmem_cache_alloc+0x56/0x2b0 [ 231.298281][T14134] ? kasan_check_write+0x14/0x20 [ 231.298300][T14134] __delayacct_tsk_init+0x20/0x90 [ 231.307533][T14134] copy_process+0xe53/0x5c90 [ 231.307565][T14134] ? fsnotify+0x14b9/0x1580 [ 231.317477][T14134] ? fork_idle+0x1b0/0x1b0 [ 231.317494][T14134] ? kasan_check_write+0x14/0x20 [ 231.317504][T14134] ? __mutex_unlock_slowpath+0x18c/0x630 [ 231.317518][T14134] _do_fork+0x180/0x5f0 [ 231.317532][T14134] ? dup_mm+0x340/0x340 [ 231.317544][T14134] ? debug_smp_processor_id+0x1c/0x20 [ 231.317556][T14134] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 231.326610][T14134] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 231.326622][T14134] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 231.326632][T14134] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 231.326641][T14134] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 231.326655][T14134] __x64_sys_clone+0xc1/0xd0 [ 231.335958][T14134] do_syscall_64+0xfe/0x140 [ 231.335974][T14134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.335983][T14134] RIP: 0033:0x459519 [ 231.335993][T14134] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 231.335998][T14134] RSP: 002b:00007f5a8e4c3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 231.336007][T14134] RAX: ffffffffffffffda RBX: 00007f5a8e4c3c90 RCX: 0000000000459519 [ 231.336012][T14134] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000000041ffc 23:26:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x290}], 0x1}}], 0x1, 0x0, 0x0) 23:26:58 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040)=0xfffffffffffffc01, 0x8) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB]}, 0x78) 23:26:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}], 0x1, 0x0, 0x0) 23:26:58 executing program 2 (fault-call:0 fault-nth:5): clone(0x41ffc, 0x0, &(0x7f0000000200), 0x0, 0x0) 23:26:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x8dffffff00000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 231.336020][T14134] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 231.345785][T14134] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a8e4c46d4 [ 231.345791][T14134] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000003 23:26:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x2a0}], 0x1}}], 0x1, 0x0, 0x0) 23:26:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}}], 0x1, 0x0, 0x0) [ 231.591940][T14162] FAULT_INJECTION: forcing a failure. [ 231.591940][T14162] name failslab, interval 1, probability 0, space 0, times 0 23:26:58 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x2e, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESDEC=0x0, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="3007ef574a231a35ba61604efd8ebdf07c2ddd16ad11abbf0fe3bf72622d533895033a33ae76cb3d629e0b441fe5c53be87da23baf0c299adffb1f030a3aed717fe926cf2b20e7a53ca132fac94e41603ad24bbdd246cbd3246a360631dba4a8890368acecd5f1af66f1821bc1531c40d2daea25bde6f21554190f172efbe20ec16f2e5b3430fb3fd49655736a227357e4a12e14c0d006a6c1ff0f77cffd0dae93afcccbfa03b118", @ANYRES64=r0, @ANYRES64=r0], @ANYRESHEX=r0]}, 0xa6) [ 231.675736][T14162] CPU: 0 PID: 14162 Comm: syz-executor.2 Not tainted 5.2.0-rc6+ #9 [ 231.683669][T14162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.693727][T14162] Call Trace: [ 231.697025][T14162] dump_stack+0x1d8/0x2f8 [ 231.701361][T14162] should_fail+0x608/0x860 [ 231.705777][T14162] ? setup_fault_attr+0x2b0/0x2b0 [ 231.710800][T14162] ? kzalloc+0x26/0x40 [ 231.714870][T14162] __should_failslab+0x11a/0x160 [ 231.719805][T14162] ? kzalloc+0x26/0x40 [ 231.723868][T14162] should_failslab+0x9/0x20 [ 231.728366][T14162] __kmalloc+0x7a/0x310 [ 231.732517][T14162] ? memset+0x31/0x40 [ 231.736494][T14162] kzalloc+0x26/0x40 [ 231.740383][T14162] security_task_alloc+0x48/0x200 [ 231.745401][T14162] copy_process+0x18a9/0x5c90 [ 231.750092][T14162] ? fork_idle+0x1b0/0x1b0 [ 231.754507][T14162] ? kasan_check_write+0x14/0x20 [ 231.759432][T14162] ? __mutex_unlock_slowpath+0x18c/0x630 [ 231.765059][T14162] _do_fork+0x180/0x5f0 [ 231.769211][T14162] ? dup_mm+0x340/0x340 [ 231.773362][T14162] ? debug_smp_processor_id+0x1c/0x20 [ 231.778723][T14162] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 231.784783][T14162] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 231.790489][T14162] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 231.796111][T14162] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 231.801562][T14162] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 231.807277][T14162] __x64_sys_clone+0xc1/0xd0 [ 231.811861][T14162] do_syscall_64+0xfe/0x140 [ 231.816377][T14162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.822295][T14162] RIP: 0033:0x459519 [ 231.826195][T14162] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 231.845790][T14162] RSP: 002b:00007f5a8e4c3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 231.854192][T14162] RAX: ffffffffffffffda RBX: 00007f5a8e4c3c90 RCX: 0000000000459519 [ 231.862155][T14162] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000000041ffc 23:26:58 executing program 5: syz_read_part_table(0x400000000000000, 0x0, 0x0) 23:26:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xf0ffffff00000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x2b0}], 0x1}}], 0x1, 0x0, 0x0) [ 231.870116][T14162] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 231.878077][T14162] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a8e4c46d4 [ 231.886044][T14162] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000003 23:26:59 executing program 2 (fault-call:0 fault-nth:6): clone(0x41ffc, 0x0, &(0x7f0000000200), 0x0, 0x0) 23:26:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000040)=0x1) [ 231.984885][T14172] FAULT_INJECTION: forcing a failure. [ 231.984885][T14172] name failslab, interval 1, probability 0, space 0, times 0 [ 232.026450][T14172] CPU: 0 PID: 14172 Comm: syz-executor.2 Not tainted 5.2.0-rc6+ #9 [ 232.034387][T14172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.044438][T14172] Call Trace: [ 232.047726][T14172] dump_stack+0x1d8/0x2f8 [ 232.052054][T14172] should_fail+0x608/0x860 [ 232.056467][T14172] ? setup_fault_attr+0x2b0/0x2b0 [ 232.061501][T14172] __should_failslab+0x11a/0x160 [ 232.066439][T14172] ? copy_process+0x1d87/0x5c90 [ 232.071290][T14172] should_failslab+0x9/0x20 [ 232.075798][T14172] kmem_cache_alloc+0x56/0x2b0 [ 232.080573][T14172] copy_process+0x1d87/0x5c90 [ 232.085270][T14172] ? fork_idle+0x1b0/0x1b0 [ 232.089686][T14172] ? kasan_check_write+0x14/0x20 [ 232.094887][T14172] ? __mutex_unlock_slowpath+0x18c/0x630 [ 232.100516][T14172] _do_fork+0x180/0x5f0 [ 232.104679][T14172] ? dup_mm+0x340/0x340 [ 232.108921][T14172] ? debug_smp_processor_id+0x1c/0x20 [ 232.114293][T14172] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 232.120354][T14172] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 232.126065][T14172] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 232.131690][T14172] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 232.137259][T14172] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 232.142976][T14172] __x64_sys_clone+0xc1/0xd0 [ 232.147561][T14172] do_syscall_64+0xfe/0x140 [ 232.152063][T14172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.157954][T14172] RIP: 0033:0x459519 [ 232.161840][T14172] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 232.181437][T14172] RSP: 002b:00007f5a8e4c3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 232.189838][T14172] RAX: ffffffffffffffda RBX: 00007f5a8e4c3c90 RCX: 0000000000459519 [ 232.197809][T14172] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000000041ffc [ 232.205774][T14172] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 232.213739][T14172] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a8e4c46d4 23:26:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0xffffffff00000000, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}], 0x1, 0x0, 0x0) [ 232.221699][T14172] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000003 23:26:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x2c0}], 0x1}}], 0x1, 0x0, 0x0) 23:26:59 executing program 2 (fault-call:0 fault-nth:7): clone(0x41ffc, 0x0, &(0x7f0000000200), 0x0, 0x0) 23:26:59 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="20ca049a36930dd1cb4aae454e147d1d755ebbfa2642b60ff5e2e23053de6f9660d72cb669f836091a9eac6279b04d34fe594d8f21494eabdd91639cf14aa3a773db8ac8467109d83c587f5af457fd6678f7388e154e89a9c86012f11d8288019a14e34f237da350736d1672ec2dc32b3fc86b95a230434d26"]}, 0xf1) 23:26:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}}], 0x1, 0x0, 0x0) 23:26:59 executing program 5: syz_read_part_table(0x500000000000000, 0x0, 0x0) [ 232.367947][T14197] FAULT_INJECTION: forcing a failure. [ 232.367947][T14197] name failslab, interval 1, probability 0, space 0, times 0 [ 232.420853][T14197] CPU: 1 PID: 14197 Comm: syz-executor.2 Not tainted 5.2.0-rc6+ #9 [ 232.428779][T14197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.438818][T14197] Call Trace: [ 232.438837][T14197] dump_stack+0x1d8/0x2f8 [ 232.438852][T14197] should_fail+0x608/0x860 [ 232.438863][T14197] ? setup_fault_attr+0x2b0/0x2b0 [ 232.438881][T14197] __should_failslab+0x11a/0x160 [ 232.438889][T14197] ? alloc_pid+0x4b/0x860 [ 232.438899][T14197] should_failslab+0x9/0x20 [ 232.438906][T14197] kmem_cache_alloc+0x56/0x2b0 [ 232.438918][T14197] alloc_pid+0x4b/0x860 [ 232.478496][T14197] ? copy_thread_tls+0x2ff/0x600 [ 232.483440][T14197] copy_process+0x2a1f/0x5c90 [ 232.488125][T14197] ? fork_idle+0x1b0/0x1b0 [ 232.488141][T14197] ? kasan_check_write+0x14/0x20 [ 232.497465][T14197] ? __mutex_unlock_slowpath+0x18c/0x630 [ 232.503096][T14197] _do_fork+0x180/0x5f0 [ 232.507250][T14197] ? dup_mm+0x340/0x340 [ 232.511407][T14197] ? debug_smp_processor_id+0x1c/0x20 [ 232.516777][T14197] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 232.522842][T14197] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 232.528553][T14197] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 232.534176][T14197] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 232.539628][T14197] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 232.545343][T14197] __x64_sys_clone+0xc1/0xd0 [ 232.549925][T14197] do_syscall_64+0xfe/0x140 [ 232.554427][T14197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.560316][T14197] RIP: 0033:0x459519 [ 232.564205][T14197] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 232.584239][T14197] RSP: 002b:00007f5a8e4c3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 232.592641][T14197] RAX: ffffffffffffffda RBX: 00007f5a8e4c3c90 RCX: 0000000000459519 [ 232.600650][T14197] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000000041ffc [ 232.608611][T14197] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:26:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x2d0}], 0x1}}], 0x1, 0x0, 0x0) 23:26:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:26:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}}], 0x1, 0x0, 0x0) 23:26:59 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x200, 0x880) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000040)={0x0, 0x4, 0xffff, 0x8, 0x9, 0x7, 0xb5d, 0x491f, 0x7, 0x7}) socket$inet_udp(0x2, 0x2, 0x0) 23:26:59 executing program 2 (fault-call:0 fault-nth:8): clone(0x41ffc, 0x0, &(0x7f0000000200), 0x0, 0x0) [ 232.616572][T14197] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a8e4c46d4 [ 232.624538][T14197] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000003 23:26:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}}], 0x1, 0x0, 0x0) 23:26:59 executing program 4: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00e89c6a"]}, 0x7c) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000180)={0x1ff, 0x0, 0x10001, 0x4}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x3, r1, 0x10001, 0x2}) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000140)={0xf, {0x3, 0x101, 0x2, 0x2}}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000080)={r2, 0xcda}) r3 = fcntl$getown(r0, 0x9) capset(&(0x7f0000000040)={0x39980732, r3}, &(0x7f00000001c0)={0x80000000, 0x3, 0x2, 0x7302ecc0, 0x1000, 0x1}) 23:27:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x2e0}], 0x1}}], 0x1, 0x0, 0x0) 23:27:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) 23:27:00 executing program 5: syz_read_part_table(0x600000000000000, 0x0, 0x0) [ 232.893972][T14230] FAULT_INJECTION: forcing a failure. [ 232.893972][T14230] name failslab, interval 1, probability 0, space 0, times 0 [ 232.923951][T14230] CPU: 0 PID: 14230 Comm: syz-executor.2 Not tainted 5.2.0-rc6+ #9 [ 232.931881][T14230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.943620][T14230] Call Trace: [ 232.946911][T14230] dump_stack+0x1d8/0x2f8 [ 232.951234][T14230] should_fail+0x608/0x860 [ 232.958033][T14230] ? setup_fault_attr+0x2b0/0x2b0 [ 232.963416][T14230] __should_failslab+0x11a/0x160 [ 232.968346][T14230] ? __d_alloc+0x2d/0x6e0 [ 232.972662][T14230] should_failslab+0x9/0x20 [ 232.977154][T14230] kmem_cache_alloc+0x56/0x2b0 [ 232.981912][T14230] __d_alloc+0x2d/0x6e0 [ 232.986730][T14230] d_alloc_pseudo+0x1d/0x70 [ 232.991241][T14230] alloc_file_pseudo+0x128/0x310 [ 232.996175][T14230] ? alloc_empty_file_noaccount+0x80/0x80 [ 233.001881][T14230] ? __alloc_fd+0x523/0x5d0 [ 233.006716][T14230] anon_inode_getfile+0xad/0x180 [ 233.011651][T14230] copy_process+0x2a95/0x5c90 [ 233.016342][T14230] ? fork_idle+0x1b0/0x1b0 [ 233.020763][T14230] ? kasan_check_write+0x14/0x20 [ 233.026185][T14230] ? __mutex_unlock_slowpath+0x18c/0x630 [ 233.031816][T14230] _do_fork+0x180/0x5f0 [ 233.035977][T14230] ? dup_mm+0x340/0x340 [ 233.040133][T14230] ? debug_smp_processor_id+0x1c/0x20 [ 233.045495][T14230] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 233.051556][T14230] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 233.057264][T14230] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 233.062889][T14230] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 233.068335][T14230] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 233.074050][T14230] __x64_sys_clone+0xc1/0xd0 [ 233.078632][T14230] do_syscall_64+0xfe/0x140 [ 233.083129][T14230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.089011][T14230] RIP: 0033:0x459519 [ 233.092899][T14230] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 233.113330][T14230] RSP: 002b:00007f5a8e4c3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 233.121818][T14230] RAX: ffffffffffffffda RBX: 00007f5a8e4c3c90 RCX: 0000000000459519 [ 233.129783][T14230] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000000041ffc 23:27:00 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x1, 0x4, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00609c6a"]}, 0x7c) 23:27:00 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000280)=@bridge_getlink={0x20, 0x12, 0xee7f76aa83caad71}, 0x20}}, 0x0) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}}], 0x1, 0x0, 0x0) 23:27:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x2f0}], 0x1}}], 0x1, 0x0, 0x0) [ 233.137746][T14230] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 233.145882][T14230] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a8e4c46d4 [ 233.153928][T14230] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000003 [ 233.170718][T14230] kasan: CONFIG_KASAN_INLINE enabled 23:27:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) [ 233.200031][T14230] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 233.213392][T14230] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 233.220786][T14230] CPU: 1 PID: 14230 Comm: syz-executor.2 Not tainted 5.2.0-rc6+ #9 [ 233.228671][T14230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.238903][T14230] RIP: 0010:get_task_pid+0xe1/0x210 [ 233.244088][T14230] Code: 89 ff e8 62 27 5f 00 49 8b 07 44 89 f1 4c 8d bc c8 90 01 00 00 eb 0c e8 0d fe 25 00 49 81 c7 38 05 00 00 4c 89 f8 48 c1 e8 03 <80> 3c 18 00 74 08 4c 89 ff e8 31 27 5f 00 4d 8b 37 e8 f9 47 12 00 [ 233.263677][T14230] RSP: 0018:ffff88805f6afd78 EFLAGS: 00010203 [ 233.269729][T14230] RAX: 00000000000000a7 RBX: dffffc0000000000 RCX: 0000000000040000 [ 233.277689][T14230] RDX: ffffc9000a213000 RSI: 000000000003ffff RDI: 0000000000040000 [ 233.285651][T14230] RBP: ffff88805f6afd90 R08: ffffffff814fb3a8 R09: ffffed1015d66bf8 [ 233.293607][T14230] R10: ffffed1015d66bf8 R11: 1ffff11015d66bf7 R12: 0000000000041ffc [ 233.301566][T14230] R13: 1ffff1100bed5fbc R14: 0000000000000000 R15: 000000000000053c [ 233.309527][T14230] FS: 00007f5a8e4c4700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 233.318440][T14230] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 233.325006][T14230] CR2: 00007f6eeea44db8 CR3: 000000009813c000 CR4: 00000000001406e0 [ 233.332966][T14230] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 233.340928][T14230] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 233.348883][T14230] Call Trace: [ 233.352170][T14230] _do_fork+0x1b9/0x5f0 [ 233.356319][T14230] ? dup_mm+0x340/0x340 [ 233.360467][T14230] ? debug_smp_processor_id+0x1c/0x20 [ 233.365829][T14230] ? fpregs_assert_state_consistent+0xaa/0xe0 [ 233.371881][T14230] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 233.377585][T14230] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 233.383208][T14230] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 233.388658][T14230] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 233.394366][T14230] __x64_sys_clone+0xc1/0xd0 [ 233.398947][T14230] do_syscall_64+0xfe/0x140 [ 233.403443][T14230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 233.409320][T14230] RIP: 0033:0x459519 [ 233.413448][T14230] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 233.433040][T14230] RSP: 002b:00007f5a8e4c3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 233.441442][T14230] RAX: ffffffffffffffda RBX: 00007f5a8e4c3c90 RCX: 0000000000459519 [ 233.449410][T14230] RDX: 0000000020000200 RSI: 0000000000000000 RDI: 0000000000041ffc [ 233.457366][T14230] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 233.465324][T14230] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5a8e4c46d4 [ 233.473280][T14230] R13: 00000000004bf97d R14: 00000000004d1358 R15: 0000000000000003 [ 233.481261][T14230] Modules linked in: [ 233.487578][T14230] ---[ end trace b6097bb5bb770e7f ]--- [ 233.493140][T14230] RIP: 0010:get_task_pid+0xe1/0x210 [ 233.498567][T14230] Code: 89 ff e8 62 27 5f 00 49 8b 07 44 89 f1 4c 8d bc c8 90 01 00 00 eb 0c e8 0d fe 25 00 49 81 c7 38 05 00 00 4c 89 f8 48 c1 e8 03 <80> 3c 18 00 74 08 4c 89 ff e8 31 27 5f 00 4d 8b 37 e8 f9 47 12 00 [ 233.520457][T14230] RSP: 0018:ffff88805f6afd78 EFLAGS: 00010203 [ 233.526638][T14230] RAX: 00000000000000a7 RBX: dffffc0000000000 RCX: 0000000000040000 [ 233.536824][T14230] RDX: ffffc9000a213000 RSI: 000000000003ffff RDI: 0000000000040000 [ 233.544870][T14230] RBP: ffff88805f6afd90 R08: ffffffff814fb3a8 R09: ffffed1015d66bf8 [ 233.555014][T14230] R10: ffffed1015d66bf8 R11: 1ffff11015d66bf7 R12: 0000000000041ffc [ 233.563269][T14230] R13: 1ffff1100bed5fbc R14: 0000000000000000 R15: 000000000000053c [ 233.571315][T14230] FS: 00007f5a8e4c4700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 233.582381][T14230] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 233.589309][T14230] CR2: 00007f6eeea44db8 CR3: 000000009813c000 CR4: 00000000001406e0 [ 233.599497][T14230] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 233.607639][T14230] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 233.617804][T14230] Kernel panic - not syncing: Fatal exception [ 233.625022][T14230] Kernel Offset: disabled [ 233.629337][T14230] Rebooting in 86400 seconds..