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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:03:59 executing program 4 (fault-call:2 fault-nth:3): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:03:59 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) write$binfmt_elf32(r0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x9c1) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x22000, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f00000002c0), &(0x7f0000000340)=0x4) r2 = openat$cgroup_ro(r0, &(0x7f0000000300)='cpuset.eff\xb9\xcf\xdd\xc3\xf5,\xbc~\xaeect', 0x275a, 0x0) sendmsg$key(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x2, 0xf, 0xcd1, 0xf, 0xe, 0x0, 0x70bd2c, 0x25dfdbfd, [@sadb_ident={0x2, 0xa, 0xff, 0x0, 0x1}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}}, @sadb_x_filter={0x5, 0x1a, @in6=@mcast2, @in=@loopback, 0x9, 0x10, 0x4}]}, 0x70}}, 0x20000000) rseq(&(0x7f0000000200)={0x0, 0x0, 0x0, 0x7}, 0x2f0, 0xfffffffffffffffb, 0x0) ioctl$VIDIOC_S_PARM(r2, 0xc0cc5616, &(0x7f0000000080)={0x7, @capture={0x1000, 0x1, {0x3, 0xfffffffffffffc00}, 0x1000, 0x1}}) 17:03:59 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) mkdir(0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10020000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xb0, r1, 0x0, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x101}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7f}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x10}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x8800}, 0x4000) rmdir(0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x100, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000000040)={0x3, 0xffff}) fcntl$getownex(r2, 0x10, &(0x7f0000000080)) r3 = getpgrp(0xffffffffffffffff) perf_event_open(0x0, r3, 0x9, r2, 0x9) ioctl$RTC_EPOCH_SET(r2, 0x4004700e, 0xff) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:03:59 executing program 0 (fault-call:1 fault-nth:4): clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:03:59 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) sync() write$evdev(r1, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:03:59 executing program 2: mkdir(0x0, 0x20) rmdir(0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000000)={0x3, 0xfa, "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"}) [ 542.162367] FAULT_INJECTION: forcing a failure. [ 542.162367] name failslab, interval 1, probability 0, space 0, times 0 [ 542.184881] FAULT_INJECTION: forcing a failure. [ 542.184881] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 542.236299] CPU: 0 PID: 13247 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 542.243127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.252491] Call Trace: [ 542.255100] dump_stack+0x172/0x1f0 [ 542.258751] should_fail.cold+0xa/0x1b [ 542.262667] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 542.267873] ? ___might_sleep+0x163/0x280 [ 542.272039] should_fail_alloc_page+0x50/0x60 [ 542.276632] __alloc_pages_nodemask+0x1a1/0x710 [ 542.281327] ? __alloc_pages_slowpath+0x2900/0x2900 [ 542.286351] ? ___might_sleep+0x163/0x280 [ 542.290509] ? copyin+0xb5/0x100 [ 542.293887] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 542.299523] alloc_pages_current+0x107/0x210 [ 542.303953] pipe_write+0xa65/0xfb0 [ 542.307602] __vfs_write+0x613/0x8e0 [ 542.311324] ? kernel_read+0x120/0x120 [ 542.315226] ? common_file_perm+0x1d6/0x6f0 [ 542.319570] ? apparmor_file_permission+0x25/0x30 [ 542.324429] ? rw_verify_area+0x118/0x360 [ 542.328586] vfs_write+0x20c/0x580 [ 542.332148] ksys_write+0xea/0x1f0 [ 542.335702] ? __ia32_sys_read+0xb0/0xb0 [ 542.339863] ? do_fast_syscall_32+0xd1/0xc98 [ 542.344283] ? entry_SYSENTER_compat+0x70/0x7f [ 542.348878] ? do_fast_syscall_32+0xd1/0xc98 [ 542.353298] __ia32_sys_write+0x71/0xb0 [ 542.357291] do_fast_syscall_32+0x281/0xc98 [ 542.361624] entry_SYSENTER_compat+0x70/0x7f [ 542.366060] RIP: 0023:0xf7fdf869 [ 542.369433] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 542.388340] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 542.396054] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 542.403328] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 542.410603] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 542.417967] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 542.425246] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 542.432634] CPU: 1 PID: 13244 Comm: syz-executor.0 Not tainted 5.0.0 #4 [ 542.439424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.448790] Call Trace: [ 542.451394] dump_stack+0x172/0x1f0 [ 542.455037] should_fail.cold+0xa/0x1b [ 542.458937] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 542.464053] ? lock_downgrade+0x810/0x810 [ 542.468218] ? ___might_sleep+0x163/0x280 [ 542.472377] __should_failslab+0x121/0x190 [ 542.476634] should_failslab+0x9/0x14 [ 542.480803] __kmalloc_track_caller+0x2d8/0x740 [ 542.485478] ? key_alloc+0x428/0x1140 [ 542.489285] ? rcu_read_lock_sched_held+0x110/0x130 [ 542.494309] ? kmem_cache_alloc+0x32e/0x6f0 [ 542.498645] ? key_alloc+0x481/0x1140 [ 542.502462] kmemdup+0x27/0x60 [ 542.505668] key_alloc+0x481/0x1140 [ 542.509296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 542.514839] ? refcount_inc_not_zero_checked+0x147/0x200 [ 542.520305] ? key_user_put+0x70/0x70 [ 542.524109] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 542.529659] ? refcount_inc_checked+0x2b/0x70 [ 542.534181] keyring_alloc+0x4d/0xc0 [ 542.537907] install_process_keyring_to_cred.part.0+0x87/0x100 [ 542.543894] lookup_user_key+0xb79/0x1140 [ 542.548050] ? join_session_keyring+0x340/0x340 [ 542.552726] ? key_validate+0x100/0x100 [ 542.556709] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 542.562252] ? memdup_user+0x65/0xb0 [ 542.565969] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 542.571543] __ia32_sys_request_key+0x1f0/0x430 [ 542.576221] ? __x64_sys_request_key+0x430/0x430 [ 542.580978] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 542.585774] ? entry_SYSENTER_compat+0x70/0x7f [ 542.590360] ? lockdep_hardirqs_on+0x415/0x5d0 [ 542.594947] ? trace_hardirqs_on+0x67/0x230 [ 542.599293] do_fast_syscall_32+0x281/0xc98 [ 542.603629] entry_SYSENTER_compat+0x70/0x7f [ 542.608050] RIP: 0023:0xf7fe7869 [ 542.611420] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 542.630335] RSP: 002b:00000000f5de30cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f 17:03:59 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x400000, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000100)={0x10002, 0x0, &(0x7f0000ffe000/0x2000)=nil}) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) 17:03:59 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 542.638052] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000200007c0 [ 542.645368] RDX: 00000000200003c0 RSI: 00000000fffffffe RDI: 0000000000000000 [ 542.652650] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 542.659928] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 542.667201] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:03:59 executing program 2: mkdir(0x0, 0x23) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:03:59 executing program 4 (fault-call:2 fault-nth:4): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:03:59 executing program 0 (fault-call:1 fault-nth:5): clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:03:59 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x100, 0x14840) openat$cgroup_ro(r0, &(0x7f0000000000)=' \xe2\x97', 0x275a, 0x0) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) [ 542.841545] FAULT_INJECTION: forcing a failure. [ 542.841545] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 542.871591] CPU: 0 PID: 13285 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 542.878406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.888385] Call Trace: [ 542.890995] dump_stack+0x172/0x1f0 [ 542.894650] should_fail.cold+0xa/0x1b [ 542.898556] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 542.898800] FAULT_INJECTION: forcing a failure. [ 542.898800] name failslab, interval 1, probability 0, space 0, times 0 [ 542.903709] ? ___might_sleep+0x163/0x280 [ 542.903732] should_fail_alloc_page+0x50/0x60 [ 542.903747] __alloc_pages_nodemask+0x1a1/0x710 [ 542.903765] ? __alloc_pages_slowpath+0x2900/0x2900 [ 542.903780] ? ___might_sleep+0x163/0x280 [ 542.903797] ? copyin+0xb5/0x100 [ 542.940762] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 542.946317] alloc_pages_current+0x107/0x210 [ 542.950736] pipe_write+0xa65/0xfb0 [ 542.954383] __vfs_write+0x613/0x8e0 [ 542.958102] ? kernel_read+0x120/0x120 [ 542.961999] ? common_file_perm+0x1d6/0x6f0 [ 542.966330] ? apparmor_file_permission+0x25/0x30 [ 542.971185] ? rw_verify_area+0x118/0x360 [ 542.975354] vfs_write+0x20c/0x580 [ 542.978904] ksys_write+0xea/0x1f0 [ 542.982455] ? __ia32_sys_read+0xb0/0xb0 [ 542.986530] ? do_fast_syscall_32+0xd1/0xc98 [ 542.990973] ? entry_SYSENTER_compat+0x70/0x7f [ 542.995558] ? do_fast_syscall_32+0xd1/0xc98 [ 542.999976] __ia32_sys_write+0x71/0xb0 [ 543.003967] do_fast_syscall_32+0x281/0xc98 [ 543.008301] entry_SYSENTER_compat+0x70/0x7f [ 543.012707] RIP: 0023:0xf7fdf869 [ 543.016084] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 543.034994] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 543.042707] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 543.049977] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 543.057249] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 543.064521] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 543.071794] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 543.079089] CPU: 1 PID: 13290 Comm: syz-executor.0 Not tainted 5.0.0 #4 [ 543.085855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.095209] Call Trace: [ 543.097810] dump_stack+0x172/0x1f0 [ 543.101453] should_fail.cold+0xa/0x1b [ 543.105349] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 543.110469] ? lock_downgrade+0x810/0x810 [ 543.114627] ? ___might_sleep+0x163/0x280 [ 543.118803] __should_failslab+0x121/0x190 [ 543.123047] should_failslab+0x9/0x14 [ 543.126851] kmem_cache_alloc+0x2b2/0x6f0 [ 543.131005] ? kasan_check_read+0x11/0x20 [ 543.135157] ? do_raw_spin_unlock+0x57/0x270 [ 543.139573] key_alloc+0x428/0x1140 [ 543.143216] ? key_user_put+0x70/0x70 [ 543.147031] request_key_and_link+0x4ba/0x11b0 [ 543.151623] ? call_sbin_request_key+0xbe0/0xbe0 [ 543.156394] ? keyring_alloc+0xc0/0xc0 [ 543.160282] ? key_default_cmp+0x90/0x90 [ 543.164357] __ia32_sys_request_key+0x287/0x430 [ 543.169033] ? __x64_sys_request_key+0x430/0x430 [ 543.173791] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 543.178578] ? entry_SYSENTER_compat+0x70/0x7f [ 543.183163] ? lockdep_hardirqs_on+0x415/0x5d0 [ 543.187746] ? trace_hardirqs_on+0x67/0x230 [ 543.192077] do_fast_syscall_32+0x281/0xc98 [ 543.196415] entry_SYSENTER_compat+0x70/0x7f [ 543.200916] RIP: 0023:0xf7fe7869 [ 543.204283] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 543.223274] RSP: 002b:00000000f5de30cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f [ 543.230987] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000200007c0 [ 543.238267] RDX: 00000000200003c0 RSI: 00000000fffffffe RDI: 0000000000000000 [ 543.245559] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 543.252839] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 543.260123] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:02 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) sync() write$evdev(r1, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:02 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'ip_vti0\x00', @ifru_data=&(0x7f0000000040)="635e9537d475cf912822b8b3532ee1cf3be4469deb510465c9eb58cbd8641d57"}) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x22000, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000040)=0x5, 0x4) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000140)={0xd3, 0xda, "07f4652314f13673fc79c2c060c6d966b25a9012bb550509bed53dd498154e1eeaa6df35632de83dcaa85e9adf129184796ad3377f9610c798aafb69f1b442c53e033f6d7333918a9f78ca9acb0df38bad221488c87b38911e6e19556e617091227f73751511e410ea1795dc673a83c643b7cabeb9b160a54e5d01c7edef465806034027bc613b13c2d8bb8780394ce1c4944eb45fdf6000658ea309f1b037acfe35aedb4de133ecb3e13e71a49c888657f9fb00d06eab54f8c29b747e82d349a92d174ddf44cbabe201a0673ce71af3bcb8da7f525734841686"}) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:02 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./bup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @empty}}, 0x3, 0x9}, &(0x7f0000000140)=0x88) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x20, 0x0, 0x8000, 0x81, 0x4, 0x5583, 0x56, 0x34b3, r2}, &(0x7f00000001c0)=0x20) 17:04:02 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) 17:04:02 executing program 0 (fault-call:1 fault-nth:6): clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:02 executing program 4 (fault-call:2 fault-nth:5): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:02 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) init_module(&(0x7f0000000000)='asymmetric\x00', 0xb, &(0x7f0000000140)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85') request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 545.225159] FAULT_INJECTION: forcing a failure. [ 545.225159] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 545.240596] FAULT_INJECTION: forcing a failure. [ 545.240596] name failslab, interval 1, probability 0, space 0, times 0 [ 545.274920] CPU: 0 PID: 13305 Comm: syz-executor.0 Not tainted 5.0.0 #4 [ 545.281725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.291087] Call Trace: [ 545.294037] dump_stack+0x172/0x1f0 [ 545.297682] should_fail.cold+0xa/0x1b [ 545.301577] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 545.306689] ? lock_downgrade+0x810/0x810 [ 545.310843] ? ___might_sleep+0x163/0x280 [ 545.314999] __should_failslab+0x121/0x190 [ 545.319239] should_failslab+0x9/0x14 [ 545.323046] __kmalloc_track_caller+0x2d8/0x740 [ 545.327738] ? key_alloc+0x428/0x1140 [ 545.331546] ? rcu_read_lock_sched_held+0x110/0x130 [ 545.336568] ? kmem_cache_alloc+0x32e/0x6f0 [ 545.340898] ? key_alloc+0x481/0x1140 [ 545.344978] kmemdup+0x27/0x60 [ 545.348176] key_alloc+0x481/0x1140 [ 545.351818] ? key_user_put+0x70/0x70 [ 545.355634] request_key_and_link+0x4ba/0x11b0 [ 545.360234] ? call_sbin_request_key+0xbe0/0xbe0 [ 545.364995] ? keyring_alloc+0xc0/0xc0 [ 545.368886] ? key_default_cmp+0x90/0x90 [ 545.372962] __ia32_sys_request_key+0x287/0x430 [ 545.377636] ? __x64_sys_request_key+0x430/0x430 [ 545.382405] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 545.387174] ? entry_SYSENTER_compat+0x70/0x7f [ 545.391763] ? lockdep_hardirqs_on+0x415/0x5d0 [ 545.396348] ? trace_hardirqs_on+0x67/0x230 [ 545.400682] do_fast_syscall_32+0x281/0xc98 [ 545.405019] entry_SYSENTER_compat+0x70/0x7f [ 545.409426] RIP: 0023:0xf7fe7869 [ 545.412796] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 545.431703] RSP: 002b:00000000f5de30cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f [ 545.439416] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000200007c0 [ 545.447055] RDX: 00000000200003c0 RSI: 00000000fffffffe RDI: 0000000000000000 [ 545.454412] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 545.461680] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 545.468954] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 545.488843] CPU: 1 PID: 13302 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 545.496069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.505422] Call Trace: [ 545.508031] dump_stack+0x172/0x1f0 [ 545.511690] should_fail.cold+0xa/0x1b [ 545.515591] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 545.520704] ? ___might_sleep+0x163/0x280 [ 545.524867] should_fail_alloc_page+0x50/0x60 [ 545.529373] __alloc_pages_nodemask+0x1a1/0x710 [ 545.534055] ? __alloc_pages_slowpath+0x2900/0x2900 17:04:02 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 545.539081] ? ___might_sleep+0x163/0x280 [ 545.543250] ? copyin+0xb5/0x100 [ 545.546633] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 545.552194] alloc_pages_current+0x107/0x210 [ 545.556620] pipe_write+0xa65/0xfb0 [ 545.560278] __vfs_write+0x613/0x8e0 [ 545.563998] ? kernel_read+0x120/0x120 [ 545.564015] ? common_file_perm+0x1d6/0x6f0 [ 545.564037] ? apparmor_file_permission+0x25/0x30 [ 545.564058] ? rw_verify_area+0x118/0x360 [ 545.564075] vfs_write+0x20c/0x580 [ 545.572277] ksys_write+0xea/0x1f0 [ 545.588318] ? __ia32_sys_read+0xb0/0xb0 [ 545.592670] ? do_fast_syscall_32+0xd1/0xc98 [ 545.597090] ? entry_SYSENTER_compat+0x70/0x7f [ 545.601683] ? do_fast_syscall_32+0xd1/0xc98 [ 545.606105] __ia32_sys_write+0x71/0xb0 [ 545.610093] do_fast_syscall_32+0x281/0xc98 [ 545.614430] entry_SYSENTER_compat+0x70/0x7f [ 545.618850] RIP: 0023:0xf7fdf869 17:04:02 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) 17:04:02 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socketpair(0x4, 0x1, 0x200, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x100, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r2, 0x4) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) [ 545.622222] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 545.641134] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 545.648852] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 545.656128] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 545.663403] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 545.663415] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 545.677951] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:02 executing program 0 (fault-call:1 fault-nth:7): clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:02 executing program 2: mkdir(0x0, 0x2) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 545.829789] FAULT_INJECTION: forcing a failure. [ 545.829789] name failslab, interval 1, probability 0, space 0, times 0 [ 545.855046] CPU: 0 PID: 13345 Comm: syz-executor.0 Not tainted 5.0.0 #4 [ 545.861839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.871193] Call Trace: [ 545.873801] dump_stack+0x172/0x1f0 [ 545.877446] should_fail.cold+0xa/0x1b [ 545.881354] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 545.886466] ? lock_downgrade+0x810/0x810 [ 545.890844] ? ___might_sleep+0x163/0x280 [ 545.895002] __should_failslab+0x121/0x190 [ 545.899248] should_failslab+0x9/0x14 [ 545.903052] kmem_cache_alloc_trace+0x2d1/0x760 [ 545.907737] assoc_array_insert+0xef/0x2d90 [ 545.912082] ? __lock_is_held+0xb6/0x140 [ 545.916157] ? assoc_array_cancel_edit+0x90/0x90 [ 545.920921] ? lock_acquire+0x16f/0x3f0 [ 545.924907] ? __key_link_begin+0x9d/0x300 [ 545.929165] __key_link_begin+0x12d/0x300 [ 545.933581] request_key_and_link+0x51a/0x11b0 [ 545.938158] ? call_sbin_request_key+0xbe0/0xbe0 [ 545.942909] ? keyring_alloc+0xc0/0xc0 [ 545.946803] ? key_default_cmp+0x90/0x90 [ 545.950897] __ia32_sys_request_key+0x287/0x430 [ 545.955568] ? __x64_sys_request_key+0x430/0x430 [ 545.960320] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 545.965091] ? entry_SYSENTER_compat+0x70/0x7f [ 545.969673] ? lockdep_hardirqs_on+0x415/0x5d0 [ 545.974249] ? trace_hardirqs_on+0x67/0x230 [ 545.978569] do_fast_syscall_32+0x281/0xc98 [ 545.982887] entry_SYSENTER_compat+0x70/0x7f [ 545.987285] RIP: 0023:0xf7fe7869 [ 545.990667] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 546.009569] RSP: 002b:00000000f5de30cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f [ 546.017264] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000200007c0 [ 546.024814] RDX: 00000000200003c0 RSI: 00000000fffffffe RDI: 0000000000000000 [ 546.032075] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 546.039328] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 546.046592] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:05 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) sync() write$evdev(r1, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:05 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x20, 0x30}, &(0x7f0000000180)=0xc) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000001c0)=r2, 0x4) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) 17:04:05 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:05 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_getaffinity(r0, 0x8, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:05 executing program 0 (fault-call:1 fault-nth:8): clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:05 executing program 4 (fault-call:2 fault-nth:6): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:05 executing program 2: mkdir(0x0, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000300)={0x1}, 0x8) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ion\x00', 0x400080, 0x0) sendfile(r0, r1, &(0x7f0000000380), 0x7) rmdir(0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0x5, 0xad4}, &(0x7f0000000140)=0x88) r5 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x80000000, 0x10000) ioctl$EVIOCSFF(r5, 0x402c4580, &(0x7f00000002c0)={0x57, 0x40, 0xc7, {0x5, 0x8000}, {0xffff, 0x1}, @cond=[{0xd4, 0xb95, 0x2, 0x7, 0x28fd, 0x3}, {0x80000000, 0x6, 0x7, 0x7ff, 0x1, 0x40}]}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000180)={r4, @in6={{0xa, 0x4e24, 0x100000000, @mcast2, 0x6}}}, &(0x7f0000000240)=0x84) [ 548.282539] FAULT_INJECTION: forcing a failure. [ 548.282539] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 548.302032] FAULT_INJECTION: forcing a failure. [ 548.302032] name failslab, interval 1, probability 0, space 0, times 0 [ 548.354924] CPU: 1 PID: 13366 Comm: syz-executor.0 Not tainted 5.0.0 #4 [ 548.361731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.371097] Call Trace: [ 548.373700] dump_stack+0x172/0x1f0 [ 548.377354] should_fail.cold+0xa/0x1b [ 548.381263] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 548.386376] ? lock_downgrade+0x810/0x810 [ 548.390538] ? ___might_sleep+0x163/0x280 [ 548.394705] __should_failslab+0x121/0x190 [ 548.398950] should_failslab+0x9/0x14 [ 548.402764] kmem_cache_alloc_trace+0x2d1/0x760 [ 548.407452] assoc_array_insert+0x78c/0x2d90 [ 548.411872] ? __lock_is_held+0xb6/0x140 [ 548.415943] ? assoc_array_cancel_edit+0x90/0x90 [ 548.420706] ? lock_acquire+0x16f/0x3f0 [ 548.424689] ? __key_link_begin+0x9d/0x300 [ 548.428945] __key_link_begin+0x12d/0x300 [ 548.433118] request_key_and_link+0x51a/0x11b0 [ 548.437727] ? call_sbin_request_key+0xbe0/0xbe0 [ 548.442494] ? keyring_alloc+0xc0/0xc0 [ 548.446390] ? key_default_cmp+0x90/0x90 [ 548.450478] __ia32_sys_request_key+0x287/0x430 [ 548.455164] ? __x64_sys_request_key+0x430/0x430 [ 548.459928] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 548.464701] ? entry_SYSENTER_compat+0x70/0x7f [ 548.469296] ? lockdep_hardirqs_on+0x415/0x5d0 [ 548.473885] ? trace_hardirqs_on+0x67/0x230 [ 548.478226] do_fast_syscall_32+0x281/0xc98 [ 548.482562] entry_SYSENTER_compat+0x70/0x7f [ 548.486970] RIP: 0023:0xf7fe7869 [ 548.490339] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 548.509245] RSP: 002b:00000000f5de30cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f [ 548.516962] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000200007c0 [ 548.524238] RDX: 00000000200003c0 RSI: 00000000fffffffe RDI: 0000000000000000 [ 548.531518] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 548.538795] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 548.546077] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 548.553377] CPU: 0 PID: 13363 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 548.560152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.569507] Call Trace: [ 548.572109] dump_stack+0x172/0x1f0 [ 548.575767] should_fail.cold+0xa/0x1b [ 548.579667] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 548.584774] ? ___might_sleep+0x163/0x280 [ 548.588928] should_fail_alloc_page+0x50/0x60 [ 548.593439] __alloc_pages_nodemask+0x1a1/0x710 [ 548.598116] ? __alloc_pages_slowpath+0x2900/0x2900 [ 548.603132] ? ___might_sleep+0x163/0x280 [ 548.607286] ? copyin+0xb5/0x100 [ 548.610666] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 548.616214] alloc_pages_current+0x107/0x210 [ 548.620630] pipe_write+0xa65/0xfb0 [ 548.624366] __vfs_write+0x613/0x8e0 [ 548.628083] ? kernel_read+0x120/0x120 [ 548.631989] ? common_file_perm+0x1d6/0x6f0 [ 548.636322] ? apparmor_file_permission+0x25/0x30 [ 548.641171] ? rw_verify_area+0x118/0x360 [ 548.645324] vfs_write+0x20c/0x580 [ 548.648869] ksys_write+0xea/0x1f0 [ 548.652498] ? __ia32_sys_read+0xb0/0xb0 [ 548.656561] ? do_fast_syscall_32+0xd1/0xc98 [ 548.660988] ? entry_SYSENTER_compat+0x70/0x7f [ 548.665572] ? do_fast_syscall_32+0xd1/0xc98 [ 548.669987] __ia32_sys_write+0x71/0xb0 [ 548.673970] do_fast_syscall_32+0x281/0xc98 [ 548.678296] entry_SYSENTER_compat+0x70/0x7f [ 548.682712] RIP: 0023:0xf7fdf869 [ 548.686083] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 17:04:05 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f00000000c0)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa0000000000400003000001000000000000002560b700ff"]) ioctl$KVM_SET_MSRS(r4, 0xc008ae88, &(0x7f0000000040)={0x1, 0x0, [{0x48f}]}) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1c) [ 548.704992] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 548.712701] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 548.719969] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 548.727234] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 548.734498] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 548.741764] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:05 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0xe2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x200000000000000, 0xffffffff, 0x200, 0x60fcfb61, 0x1, 0x80, 0x401, 0x55e, r1}, &(0x7f0000000140)=0x20) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:05 executing program 0 (fault-call:1 fault-nth:9): clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:05 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:05 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x181000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="320d000097fe83d5783572ffd2c56d61ea540930c7ffad51badb2acfb4b7ca99a8e8c712ad8fd09add074980d58e8608370c77891556"], &(0x7f0000000300)=0x3a) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000340)={r1, 0xfe61, "a001402035614df40aa7b1a3521778d26e03366139ee8073e110e3166515a07418ff88d305ab1f1781d913210b24f9a9e3a3a7c09944ab38200a42965b5c240d26d9134d644884c2e0a587769c295ad4ab3368f781ecb76083db9c73317eca7c9a377d3501d3ae26db4375bb8e406cf7705f5be0"}, &(0x7f00000004c0)=0x7c) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r2, 0x5}, 0x8) r3 = syz_open_dev$dspn(&(0x7f0000000640)='/dev/dsp#\x00', 0x1, 0x0) bind$inet6(r3, &(0x7f0000000680)={0xa, 0x4e23, 0x9e, @loopback, 0x3}, 0x1c) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getuid() r6 = getuid() setresuid(r4, r5, r6) [ 548.903017] FAULT_INJECTION: forcing a failure. [ 548.903017] name failslab, interval 1, probability 0, space 0, times 0 [ 548.943526] CPU: 1 PID: 13403 Comm: syz-executor.0 Not tainted 5.0.0 #4 [ 548.950329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.959689] Call Trace: [ 548.962296] dump_stack+0x172/0x1f0 [ 548.965946] should_fail.cold+0xa/0x1b [ 548.969864] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 548.974984] ? lock_downgrade+0x810/0x810 [ 548.979147] ? ___might_sleep+0x163/0x280 [ 548.983310] __should_failslab+0x121/0x190 [ 548.987563] should_failslab+0x9/0x14 [ 548.991374] kmem_cache_alloc_trace+0x2d1/0x760 [ 548.996051] ? lock_downgrade+0x810/0x810 [ 549.000209] ? __key_link_end+0x9f/0x130 [ 549.004288] request_key_auth_new+0xf1/0x810 [ 549.008702] ? refcount_dec_checked+0x70/0x70 [ 549.008727] ? request_key_auth_revoke+0x130/0x130 [ 549.008744] ? wait_for_completion+0x440/0x440 [ 549.008762] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 549.018177] ? refcount_dec_and_lock+0x35/0x90 [ 549.018198] request_key_and_link+0xc9f/0x11b0 [ 549.018222] ? call_sbin_request_key+0xbe0/0xbe0 [ 549.018244] ? keyring_alloc+0xc0/0xc0 [ 549.018259] ? key_default_cmp+0x90/0x90 [ 549.018284] __ia32_sys_request_key+0x287/0x430 [ 549.054897] ? __x64_sys_request_key+0x430/0x430 [ 549.059678] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 549.064448] ? entry_SYSENTER_compat+0x70/0x7f [ 549.064466] ? lockdep_hardirqs_on+0x415/0x5d0 [ 549.064484] ? trace_hardirqs_on+0x67/0x230 [ 549.073639] do_fast_syscall_32+0x281/0xc98 [ 549.082369] entry_SYSENTER_compat+0x70/0x7f [ 549.086787] RIP: 0023:0xf7fe7869 [ 549.090166] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 549.109078] RSP: 002b:00000000f5de30cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f [ 549.116788] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000200007c0 [ 549.124045] RDX: 00000000200003c0 RSI: 00000000fffffffe RDI: 0000000000000000 [ 549.131341] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 549.138604] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 549.145856] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:08 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r2, &(0x7f0000000240), 0x1000) write$evdev(r1, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:08 executing program 4 (fault-call:2 fault-nth:7): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:08 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x34, r1, 0x0, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x34}}, 0x4000000) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:08 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) 17:04:08 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='cgroup.controllers\x00', 0x275a, 0x0) 17:04:08 executing program 0 (fault-call:1 fault-nth:10): clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 551.334443] FAULT_INJECTION: forcing a failure. [ 551.334443] name failslab, interval 1, probability 0, space 0, times 0 [ 551.354527] FAULT_INJECTION: forcing a failure. [ 551.354527] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 551.361630] CPU: 0 PID: 13427 Comm: syz-executor.0 Not tainted 5.0.0 #4 [ 551.373109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.382471] Call Trace: [ 551.385080] dump_stack+0x172/0x1f0 [ 551.388715] should_fail.cold+0xa/0x1b [ 551.392608] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 551.397759] ? lock_downgrade+0x810/0x810 [ 551.401916] ? ___might_sleep+0x163/0x280 [ 551.406083] __should_failslab+0x121/0x190 [ 551.410331] should_failslab+0x9/0x14 [ 551.414143] __kmalloc_track_caller+0x2d8/0x740 [ 551.418818] ? rcu_read_lock_sched_held+0x110/0x130 [ 551.423844] ? kmem_cache_alloc_trace+0x354/0x760 [ 551.428692] ? lock_downgrade+0x810/0x810 [ 551.432851] ? request_key_auth_new+0x116/0x810 [ 551.437539] kmemdup+0x27/0x60 [ 551.440767] request_key_auth_new+0x116/0x810 [ 551.445269] ? refcount_dec_checked+0x70/0x70 [ 551.449777] ? request_key_auth_revoke+0x130/0x130 [ 551.454713] ? wait_for_completion+0x440/0x440 [ 551.459313] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 551.464863] ? refcount_dec_and_lock+0x35/0x90 [ 551.469456] request_key_and_link+0xc9f/0x11b0 [ 551.474066] ? call_sbin_request_key+0xbe0/0xbe0 [ 551.478840] ? keyring_alloc+0xc0/0xc0 [ 551.482741] ? key_default_cmp+0x90/0x90 [ 551.486820] __ia32_sys_request_key+0x287/0x430 [ 551.491500] ? __x64_sys_request_key+0x430/0x430 [ 551.496269] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 551.501040] ? entry_SYSENTER_compat+0x70/0x7f [ 551.505632] ? lockdep_hardirqs_on+0x415/0x5d0 [ 551.510228] ? trace_hardirqs_on+0x67/0x230 [ 551.514559] do_fast_syscall_32+0x281/0xc98 [ 551.518886] entry_SYSENTER_compat+0x70/0x7f [ 551.523294] RIP: 0023:0xf7fe7869 [ 551.526678] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 551.545583] RSP: 002b:00000000f5de30cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f [ 551.553295] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000200007c0 [ 551.560566] RDX: 00000000200003c0 RSI: 00000000fffffffe RDI: 0000000000000000 [ 551.567833] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 551.575099] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 17:04:08 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000002c0)='cpu.stat\x00', 0x275a, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0xfffffffffffffffc) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000080)={0x1, 'rose0\x00', 0x1}, 0x18) recvfrom$rxrpc(r1, &(0x7f00000000c0)=""/121, 0x79, 0x0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e22, 0x3311, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}}, 0x24) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x6f) syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') ioctl$TCSBRKP(r1, 0x5425, 0x100000001) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000180)=""/213) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000000)=""/54, 0x36) 17:04:08 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40000, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x2c, &(0x7f0000000040)=""/180, &(0x7f0000000140)=0xb4) clone(0x1840000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 551.582363] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:08 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:08 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.controllers\x00I\xe1wf\xf2\xccQ\xc5[\xa09\xf3L\xb3\xfaC\x97\xa8\xc2X@Xk~\x93\x95\xbf\xed\x81>\xe85 \xbf\x9a\xfe\xf59V\xea\x113mI\xfeQVo\xd1\x19\xe9B\xa3\x14\xc2\xd1;\b\xf5-\x16\x1a\x96\x96\xd9\x03\xbfV-\x8c\x10\xb3\xb5\x18\xc6\xf9\x01\xa7\x90N\xd2\x8d\x91\'\xae\xd9{\xea\xf0|,\x04\xecw\xabu\x06\xdc\xb99\xdf\x88X1\xaf\xdb\xdf\xe2\x97\x1d\xa3\x1b{\xac\x94\ai\xfer\xc7\xe1\xd10\xd9\xder:\x1a\xb2\f \xa7C\x80\xe6Yz\xcf\xe4<\xe2\xf5\'\xf8A\xbb\xc6y\x8d\xcc?\xefyd\x82\x88_\xd1%\fZ\xb7\a\xf2\x036\xaa:-T\xf9\x89\xfd\xa6\xd9', 0x275a, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000000)) [ 551.721274] CPU: 0 PID: 13436 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 551.728081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.737453] Call Trace: [ 551.740064] dump_stack+0x172/0x1f0 [ 551.743703] should_fail.cold+0xa/0x1b [ 551.747597] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 551.752709] ? ___might_sleep+0x163/0x280 [ 551.756876] should_fail_alloc_page+0x50/0x60 [ 551.761382] __alloc_pages_nodemask+0x1a1/0x710 [ 551.766064] ? __alloc_pages_slowpath+0x2900/0x2900 [ 551.771087] ? ___might_sleep+0x163/0x280 [ 551.775241] ? copyin+0xb5/0x100 [ 551.778620] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 551.784190] alloc_pages_current+0x107/0x210 [ 551.788611] pipe_write+0xa65/0xfb0 [ 551.792267] __vfs_write+0x613/0x8e0 [ 551.795991] ? kernel_read+0x120/0x120 [ 551.799886] ? common_file_perm+0x1d6/0x6f0 [ 551.804224] ? apparmor_file_permission+0x25/0x30 [ 551.809081] ? rw_verify_area+0x118/0x360 [ 551.813239] vfs_write+0x20c/0x580 [ 551.816803] ksys_write+0xea/0x1f0 [ 551.820353] ? __ia32_sys_read+0xb0/0xb0 [ 551.824420] ? do_fast_syscall_32+0xd1/0xc98 [ 551.828840] ? entry_SYSENTER_compat+0x70/0x7f [ 551.833686] ? do_fast_syscall_32+0xd1/0xc98 [ 551.838110] __ia32_sys_write+0x71/0xb0 [ 551.842098] do_fast_syscall_32+0x281/0xc98 [ 551.846432] entry_SYSENTER_compat+0x70/0x7f [ 551.850845] RIP: 0023:0xf7fdf869 17:04:08 executing program 0 (fault-call:1 fault-nth:11): clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:08 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) fcntl$notify(r0, 0x402, 0x8000100a) [ 551.854219] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 551.873128] RSP: 002b:00000000f5dba0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 551.880849] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000340 [ 551.888322] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 551.895596] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 551.902871] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 551.910143] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 553.993694] IPVS: ftp: loaded support on port[0] = 21 [ 554.170418] chnl_net:caif_netlink_parms(): no params data found [ 554.309296] bridge0: port 1(bridge_slave_0) entered blocking state [ 554.315790] bridge0: port 1(bridge_slave_0) entered disabled state [ 554.322668] device bridge_slave_0 entered promiscuous mode [ 554.330117] bridge0: port 2(bridge_slave_1) entered blocking state [ 554.336797] bridge0: port 2(bridge_slave_1) entered disabled state [ 554.343694] device bridge_slave_1 entered promiscuous mode 17:04:11 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) read$FUSE(0xffffffffffffffff, &(0x7f0000000240), 0x1000) write$evdev(r1, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:11 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1000, 0x0}}}, 0x8, 0x9, 0x7fff, 0x47}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={r1, 0x8, 0x6, [0x4, 0x95, 0x3, 0x1, 0x7, 0x2]}, 0x14) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:11 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x480040, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x4e24, 0x3ff, @empty, 0x3}, {0xa, 0x4e22, 0xffff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}, 0x7, [0x5, 0x401, 0x3, 0xfffffffffffffff7, 0x400000000, 0x4, 0x5, 0x8]}, 0x5c) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f00000000c0)={0x9, 0x2, {0x1, 0x0, 0x4, 0x3, 0x9}}) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000240)={r4, 0xf}) 17:04:11 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:11 executing program 4 (fault-call:2 fault-nth:8): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 554.362810] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 554.371990] device bridge_slave_1 left promiscuous mode [ 554.378637] bridge0: port 2(bridge_slave_1) entered disabled state 17:04:11 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0185647, &(0x7f0000000100)={0x9a0000, 0x0, 0x7fffffff, [], &(0x7f00000000c0)={0x9d0904, 0x8, [], @string=&(0x7f0000000040)=0x9}}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000200)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000240)={r1}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={0x0, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e22, @loopback}, {0x2, 0x4e24, @broadcast}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, 0x40}) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f00000001c0)={{0x4, @name="0235dd464eb7d405f80227112ba3820858d957443da1a17db683d1312fc7d20a"}, 0x8, 0x6, 0x2}) [ 554.421819] FAULT_INJECTION: forcing a failure. [ 554.421819] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 554.434369] device bridge_slave_0 left promiscuous mode [ 554.439910] bridge0: port 1(bridge_slave_0) entered disabled state [ 554.532142] CPU: 0 PID: 13479 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 554.538957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.548318] Call Trace: [ 554.550932] dump_stack+0x172/0x1f0 [ 554.554586] should_fail.cold+0xa/0x1b [ 554.558520] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 554.563671] ? ___might_sleep+0x163/0x280 [ 554.567837] should_fail_alloc_page+0x50/0x60 [ 554.572339] __alloc_pages_nodemask+0x1a1/0x710 [ 554.577022] ? __alloc_pages_slowpath+0x2900/0x2900 [ 554.582050] ? ___might_sleep+0x163/0x280 [ 554.586210] ? copyin+0xb5/0x100 [ 554.589765] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 554.595326] alloc_pages_current+0x107/0x210 [ 554.599754] pipe_write+0xa65/0xfb0 [ 554.603425] __vfs_write+0x613/0x8e0 [ 554.607151] ? kernel_read+0x120/0x120 [ 554.611052] ? common_file_perm+0x1d6/0x6f0 [ 554.615390] ? apparmor_file_permission+0x25/0x30 [ 554.620255] ? rw_verify_area+0x118/0x360 [ 554.624413] vfs_write+0x20c/0x580 [ 554.627971] ksys_write+0xea/0x1f0 [ 554.631525] ? __ia32_sys_read+0xb0/0xb0 [ 554.635600] ? do_fast_syscall_32+0xd1/0xc98 [ 554.640024] ? entry_SYSENTER_compat+0x70/0x7f [ 554.644618] ? do_fast_syscall_32+0xd1/0xc98 [ 554.649138] __ia32_sys_write+0x71/0xb0 [ 554.653140] do_fast_syscall_32+0x281/0xc98 [ 554.657477] entry_SYSENTER_compat+0x70/0x7f [ 554.661887] RIP: 0023:0xf7fdf869 [ 554.665257] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 554.684165] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 554.691887] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 554.699166] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 554.706439] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 554.713715] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 554.720989] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:11 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2000003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x281, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x100, 0x0) 17:04:11 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) 17:04:11 executing program 4 (fault-call:2 fault-nth:9): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 554.922661] FAULT_INJECTION: forcing a failure. [ 554.922661] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 554.951972] CPU: 0 PID: 13510 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 554.958772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.968216] Call Trace: [ 554.970824] dump_stack+0x172/0x1f0 [ 554.974464] should_fail.cold+0xa/0x1b [ 554.978365] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 554.983481] ? ___might_sleep+0x163/0x280 [ 554.987664] should_fail_alloc_page+0x50/0x60 [ 554.992166] __alloc_pages_nodemask+0x1a1/0x710 [ 554.996847] ? __alloc_pages_slowpath+0x2900/0x2900 [ 555.001871] ? ___might_sleep+0x163/0x280 [ 555.006026] ? copyin+0xb5/0x100 [ 555.009401] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 555.014958] alloc_pages_current+0x107/0x210 [ 555.019377] pipe_write+0xa65/0xfb0 [ 555.023021] __vfs_write+0x613/0x8e0 [ 555.027106] ? kernel_read+0x120/0x120 [ 555.030999] ? common_file_perm+0x1d6/0x6f0 [ 555.035330] ? apparmor_file_permission+0x25/0x30 [ 555.040187] ? rw_verify_area+0x118/0x360 [ 555.044343] vfs_write+0x20c/0x580 [ 555.047891] ksys_write+0xea/0x1f0 [ 555.051433] ? __ia32_sys_read+0xb0/0xb0 [ 555.055506] ? do_fast_syscall_32+0xd1/0xc98 [ 555.059932] ? entry_SYSENTER_compat+0x70/0x7f [ 555.064521] ? do_fast_syscall_32+0xd1/0xc98 [ 555.068933] __ia32_sys_write+0x71/0xb0 [ 555.072918] do_fast_syscall_32+0x281/0xc98 [ 555.077262] entry_SYSENTER_compat+0x70/0x7f [ 555.081677] RIP: 0023:0xf7fdf869 [ 555.085045] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 555.104050] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 555.111765] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 17:04:12 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) [ 555.119036] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 555.126307] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 555.133582] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 555.140853] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 558.516394] bond1 (unregistering): Released all slaves [ 558.566214] device hsr_slave_1 left promiscuous mode [ 558.619319] device hsr_slave_0 left promiscuous mode [ 558.678979] team0 (unregistering): Port device team_slave_1 removed [ 558.689458] team0 (unregistering): Port device team_slave_0 removed [ 558.701390] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 558.740382] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 558.823108] bond0 (unregistering): Released all slaves [ 558.949344] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 558.975361] team0: Port device team_slave_0 added [ 558.981706] team0: Port device team_slave_1 added [ 559.056715] device hsr_slave_0 entered promiscuous mode [ 559.114194] device hsr_slave_1 entered promiscuous mode [ 559.224522] 8021q: adding VLAN 0 to HW filter on device bond0 [ 559.236310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 559.243232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 559.256277] 8021q: adding VLAN 0 to HW filter on device team0 [ 559.318073] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 559.325947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 559.333491] bridge0: port 1(bridge_slave_0) entered blocking state [ 559.339891] bridge0: port 1(bridge_slave_0) entered forwarding state [ 559.347569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 559.360506] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 559.369053] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 559.377126] bridge0: port 2(bridge_slave_1) entered blocking state [ 559.383480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 559.421090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 559.429224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 559.445634] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 559.461949] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 559.469992] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 559.484680] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 559.495835] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 559.513604] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 559.521566] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 559.536227] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 559.562017] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 559.628818] FAULT_INJECTION: forcing a failure. [ 559.628818] name failslab, interval 1, probability 0, space 0, times 0 [ 559.646762] CPU: 0 PID: 13526 Comm: syz-executor.0 Not tainted 5.0.0 #4 [ 559.653529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.662879] Call Trace: [ 559.665479] dump_stack+0x172/0x1f0 [ 559.669137] should_fail.cold+0xa/0x1b [ 559.673043] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 559.678162] ? lock_downgrade+0x810/0x810 [ 559.682315] ? ___might_sleep+0x163/0x280 [ 559.686474] __should_failslab+0x121/0x190 [ 559.690715] should_failslab+0x9/0x14 [ 559.694517] kmem_cache_alloc+0x2b2/0x6f0 [ 559.698689] key_alloc+0xae3/0x1140 [ 559.702341] ? key_user_put+0x70/0x70 [ 559.706155] request_key_auth_new+0x5ca/0x810 [ 559.710669] ? refcount_dec_checked+0x70/0x70 [ 559.715173] ? request_key_auth_revoke+0x130/0x130 [ 559.720122] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 559.726622] ? refcount_dec_and_lock+0x35/0x90 [ 559.731222] request_key_and_link+0xc9f/0x11b0 [ 559.735819] ? call_sbin_request_key+0xbe0/0xbe0 [ 559.740606] ? keyring_alloc+0xc0/0xc0 [ 559.744498] ? key_default_cmp+0x90/0x90 [ 559.748575] __ia32_sys_request_key+0x287/0x430 [ 559.753256] ? __x64_sys_request_key+0x430/0x430 [ 559.758015] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 559.762776] ? entry_SYSENTER_compat+0x70/0x7f [ 559.767361] ? lockdep_hardirqs_on+0x415/0x5d0 [ 559.771953] ? trace_hardirqs_on+0x67/0x230 [ 559.776282] do_fast_syscall_32+0x281/0xc98 [ 559.780608] entry_SYSENTER_compat+0x70/0x7f [ 559.785017] RIP: 0023:0xf7fcf869 [ 559.788389] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 559.807320] RSP: 002b:00000000f5dcb0cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f [ 559.815029] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000200007c0 [ 559.822296] RDX: 00000000200003c0 RSI: 00000000fffffffe RDI: 0000000000000000 17:04:16 executing program 0 (fault-call:1 fault-nth:12): clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:16 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x80000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80180}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r2, 0x418, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @link='syz0\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4010}, 0x40) r3 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000240)={0x0, 0x78, "addd7ca108c67a07f6f6a0cde828d28238ed296ec23837ba00f63350c417258a865b9490668dee1e91d6d956fa22a46934f46d4b7a58a64c37b701c2160421ffae8899464456c8d0a4ad4e3133dc4a4e1c5ad45fcbe889ed08227d892d04891eefb0fda4726af3ecaeb8ebac0107530b64934728bfbebccd"}, &(0x7f00000002c0)=0x80) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000300)={r4, @in6={{0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x28}, 0xffffffffffffffff}}, 0x1, 0x3, 0x2, 0xe0f, 0x86}, &(0x7f00000003c0)=0x98) 17:04:16 executing program 4 (fault-call:2 fault-nth:10): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:16 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) read$FUSE(0xffffffffffffffff, &(0x7f0000000240), 0x1000) write$evdev(r1, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:16 executing program 2: mkdir(0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x181000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0xb0, r1, 0xc00, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x90, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9cb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x800}, 0x0) rmdir(0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:16 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) [ 559.829661] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 559.836932] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 559.844204] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:17 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) userfaultfd(0x80800) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 559.915961] FAULT_INJECTION: forcing a failure. [ 559.915961] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 559.994802] FAULT_INJECTION: forcing a failure. [ 559.994802] name failslab, interval 1, probability 0, space 0, times 0 [ 559.998293] CPU: 0 PID: 13532 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 560.012784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.022369] Call Trace: [ 560.022392] dump_stack+0x172/0x1f0 [ 560.022410] should_fail.cold+0xa/0x1b [ 560.022428] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 560.022447] ? ___might_sleep+0x163/0x280 [ 560.041769] should_fail_alloc_page+0x50/0x60 [ 560.046277] __alloc_pages_nodemask+0x1a1/0x710 [ 560.050962] ? __alloc_pages_slowpath+0x2900/0x2900 [ 560.055988] ? ___might_sleep+0x163/0x280 [ 560.060148] ? copyin+0xb5/0x100 [ 560.063522] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 560.069073] alloc_pages_current+0x107/0x210 [ 560.073491] pipe_write+0xa65/0xfb0 [ 560.077137] __vfs_write+0x613/0x8e0 [ 560.080862] ? kernel_read+0x120/0x120 [ 560.084756] ? common_file_perm+0x1d6/0x6f0 [ 560.089095] ? apparmor_file_permission+0x25/0x30 17:04:17 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x141100, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0086426, &(0x7f0000000180)={0x5, &(0x7f0000000140)=[{0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_DMA(r0, 0xc0286429, &(0x7f00000002c0)={r1, 0x5, &(0x7f00000001c0)=[0x3, 0x4, 0x6, 0x100000001, 0x5], &(0x7f0000000200)=[0x9, 0x9e, 0x6, 0x541, 0x6, 0x9, 0x3], 0x20, 0x2, 0x3, &(0x7f0000000240)=[0x1, 0x3f], &(0x7f0000000280)=[0x3f, 0x5, 0x8, 0xfff, 0x401]}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup\x00', 0x200002, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$VIDIOC_QBUF(r3, 0xc044560f, &(0x7f00000000c0)={0x39e13ba5, 0xd, 0x4, 0x3, {0x0, 0x2710}, {0x7, 0xb, 0xff, 0x22ec, 0x2, 0x4, "771b3922"}, 0x6, 0x1, @userptr=0x6ebe, 0x4}) openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000300)='tunl0\x00') write(r3, &(0x7f0000000340)="1d2a30220710e7d7e62b294220d287af2d15332cb95ca374f66cb06c08746a86d39d2edbf8f4f364db624a1eb89e05e38a593bf4821d536353359db6b8c1bcc926a8b2b3d33d758aac17a5fbdc3fd7f4a8a16ca78221dfd6c707905114d04ff9854ce893d284cf138bf49207228d95a11d158c5506523eb102b543c9e73a1e99e56c1087c5f92094c0ce028e0e402064164acd96652120ca8a92fa0cb5ca2856baae79517a5c3ab929715f4d31dab34e7d79bec6ccffab177239612330", 0xbd) 17:04:17 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:17 executing program 0 (fault-call:1 fault-nth:13): clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:17 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 560.093959] ? rw_verify_area+0x118/0x360 [ 560.098116] vfs_write+0x20c/0x580 [ 560.101680] ksys_write+0xea/0x1f0 [ 560.106000] ? __ia32_sys_read+0xb0/0xb0 [ 560.106019] ? do_fast_syscall_32+0xd1/0xc98 [ 560.106034] ? entry_SYSENTER_compat+0x70/0x7f [ 560.106050] ? do_fast_syscall_32+0xd1/0xc98 17:04:17 executing program 0 (fault-call:1 fault-nth:14): clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 560.106069] __ia32_sys_write+0x71/0xb0 [ 560.106086] do_fast_syscall_32+0x281/0xc98 [ 560.106105] entry_SYSENTER_compat+0x70/0x7f 17:04:17 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 560.106116] RIP: 0023:0xf7fdf869 [ 560.106132] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 17:04:17 executing program 0 (fault-call:1 fault-nth:15): clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 560.106139] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 560.106153] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 560.106161] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 17:04:17 executing program 4 (fault-call:2 fault-nth:11): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:17 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 560.106169] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 560.106178] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 560.106185] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 560.112365] CPU: 1 PID: 13546 Comm: syz-executor.0 Not tainted 5.0.0 #4 [ 560.112375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.112380] Call Trace: [ 560.112400] dump_stack+0x172/0x1f0 [ 560.112430] should_fail.cold+0xa/0x1b [ 560.112454] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 560.112470] ? lock_downgrade+0x810/0x810 [ 560.112489] ? ___might_sleep+0x163/0x280 [ 560.112511] __should_failslab+0x121/0x190 [ 560.112529] should_failslab+0x9/0x14 [ 560.112544] __kmalloc_track_caller+0x2d8/0x740 [ 560.112558] ? key_alloc+0xae3/0x1140 [ 560.112574] ? rcu_read_lock_sched_held+0x110/0x130 [ 560.112589] ? kmem_cache_alloc+0x32e/0x6f0 [ 560.112602] ? key_alloc+0xb3c/0x1140 [ 560.112622] kmemdup+0x27/0x60 [ 560.112637] key_alloc+0xb3c/0x1140 [ 560.112676] ? key_user_put+0x70/0x70 [ 560.112703] request_key_auth_new+0x5ca/0x810 [ 560.112720] ? refcount_dec_checked+0x70/0x70 [ 560.112739] ? request_key_auth_revoke+0x130/0x130 [ 560.112759] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 560.112775] ? refcount_dec_and_lock+0x35/0x90 [ 560.112797] request_key_and_link+0xc9f/0x11b0 [ 560.112820] ? call_sbin_request_key+0xbe0/0xbe0 [ 560.112842] ? keyring_alloc+0xc0/0xc0 [ 560.112858] ? key_default_cmp+0x90/0x90 [ 560.112885] __ia32_sys_request_key+0x287/0x430 [ 560.112903] ? __x64_sys_request_key+0x430/0x430 [ 560.112918] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 560.112934] ? entry_SYSENTER_compat+0x70/0x7f [ 560.112949] ? lockdep_hardirqs_on+0x415/0x5d0 [ 560.112966] ? trace_hardirqs_on+0x67/0x230 [ 560.112986] do_fast_syscall_32+0x281/0xc98 [ 560.113006] entry_SYSENTER_compat+0x70/0x7f [ 560.113017] RIP: 0023:0xf7fcf869 [ 560.113032] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 560.113040] RSP: 002b:00000000f5dcb0cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f [ 560.113055] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000200007c0 [ 560.113064] RDX: 00000000200003c0 RSI: 00000000fffffffe RDI: 0000000000000000 [ 560.113073] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 560.113082] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 560.113091] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 560.184810] FAULT_INJECTION: forcing a failure. [ 560.184810] name failslab, interval 1, probability 0, space 0, times 0 [ 560.184830] CPU: 1 PID: 13562 Comm: syz-executor.0 Not tainted 5.0.0 #4 [ 560.184839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.184844] Call Trace: [ 560.184867] dump_stack+0x172/0x1f0 [ 560.184886] should_fail.cold+0xa/0x1b [ 560.184905] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 560.184923] ? lock_downgrade+0x810/0x810 [ 560.184943] ? ___might_sleep+0x163/0x280 [ 560.184969] __should_failslab+0x121/0x190 [ 560.184991] should_failslab+0x9/0x14 [ 560.185008] kmem_cache_alloc+0x2b2/0x6f0 [ 560.185028] ? kasan_check_read+0x11/0x20 [ 560.185045] ? do_raw_spin_unlock+0x57/0x270 [ 560.185065] key_alloc+0x428/0x1140 [ 560.185094] ? key_user_put+0x70/0x70 [ 560.185109] ? sprintf+0xc0/0x100 [ 560.185126] ? scnprintf+0x140/0x140 [ 560.185150] keyring_alloc+0x4d/0xc0 [ 560.185173] call_sbin_request_key+0x279/0xbe0 [ 560.185203] ? wait_for_key_construction+0x140/0x140 [ 560.185223] ? __key_instantiate_and_link+0x3b0/0x3b0 [ 560.185265] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.185291] ? request_key_auth_new+0x618/0x810 [ 560.185310] ? refcount_dec_checked+0x70/0x70 [ 560.185333] ? request_key_auth_revoke+0x130/0x130 [ 560.185355] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 560.185374] ? refcount_dec_and_lock+0x35/0x90 [ 560.185399] request_key_and_link+0xd4d/0x11b0 [ 560.185424] ? wait_for_key_construction+0x140/0x140 [ 560.185453] ? call_sbin_request_key+0xbe0/0xbe0 [ 560.185476] ? keyring_alloc+0xc0/0xc0 [ 560.185494] ? key_default_cmp+0x90/0x90 [ 560.185524] __ia32_sys_request_key+0x287/0x430 [ 560.185545] ? __x64_sys_request_key+0x430/0x430 [ 560.185563] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 560.185580] ? entry_SYSENTER_compat+0x70/0x7f [ 560.185597] ? lockdep_hardirqs_on+0x415/0x5d0 [ 560.185615] ? trace_hardirqs_on+0x67/0x230 [ 560.185637] do_fast_syscall_32+0x281/0xc98 [ 560.185676] entry_SYSENTER_compat+0x70/0x7f [ 560.185690] RIP: 0023:0xf7fcf869 [ 560.185707] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 560.185716] RSP: 002b:00000000f5dcb0cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f [ 560.185734] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000200007c0 [ 560.185744] RDX: 00000000200003c0 RSI: 00000000fffffffe RDI: 0000000000000000 [ 560.185754] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 560.185764] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 560.185773] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 560.357105] FAULT_INJECTION: forcing a failure. [ 560.357105] name failslab, interval 1, probability 0, space 0, times 0 [ 560.357124] CPU: 1 PID: 13574 Comm: syz-executor.0 Not tainted 5.0.0 #4 [ 560.357133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.357139] Call Trace: [ 560.357160] dump_stack+0x172/0x1f0 [ 560.357180] should_fail.cold+0xa/0x1b [ 560.357199] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 560.357216] ? lock_downgrade+0x810/0x810 [ 560.357236] ? ___might_sleep+0x163/0x280 [ 560.357260] __should_failslab+0x121/0x190 [ 560.357289] should_failslab+0x9/0x14 [ 560.357305] __kmalloc_track_caller+0x2d8/0x740 [ 560.357319] ? key_alloc+0x428/0x1140 [ 560.357336] ? rcu_read_lock_sched_held+0x110/0x130 [ 560.357353] ? kmem_cache_alloc+0x32e/0x6f0 [ 560.357367] ? key_alloc+0x481/0x1140 [ 560.357389] kmemdup+0x27/0x60 [ 560.357406] key_alloc+0x481/0x1140 [ 560.357435] ? key_user_put+0x70/0x70 [ 560.357459] ? sprintf+0xc0/0x100 [ 560.357477] ? scnprintf+0x140/0x140 [ 560.357500] keyring_alloc+0x4d/0xc0 [ 560.357525] call_sbin_request_key+0x279/0xbe0 [ 560.357553] ? wait_for_key_construction+0x140/0x140 [ 560.357570] ? __key_instantiate_and_link+0x3b0/0x3b0 [ 560.357608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.357624] ? request_key_auth_new+0x618/0x810 [ 560.357640] ? refcount_dec_checked+0x70/0x70 [ 560.357675] ? request_key_auth_revoke+0x130/0x130 [ 560.357696] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 560.357714] ? refcount_dec_and_lock+0x35/0x90 [ 560.357737] request_key_and_link+0xd4d/0x11b0 [ 560.357760] ? wait_for_key_construction+0x140/0x140 [ 560.357779] ? call_sbin_request_key+0xbe0/0xbe0 [ 560.357803] ? keyring_alloc+0xc0/0xc0 [ 560.357819] ? key_default_cmp+0x90/0x90 [ 560.357847] __ia32_sys_request_key+0x287/0x430 [ 560.357865] ? __x64_sys_request_key+0x430/0x430 [ 560.357881] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 560.357897] ? entry_SYSENTER_compat+0x70/0x7f [ 560.357914] ? lockdep_hardirqs_on+0x415/0x5d0 [ 560.357930] ? trace_hardirqs_on+0x67/0x230 [ 560.357950] do_fast_syscall_32+0x281/0xc98 [ 560.357971] entry_SYSENTER_compat+0x70/0x7f [ 560.357983] RIP: 0023:0xf7fcf869 [ 560.357998] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 560.358008] RSP: 002b:00000000f5dcb0cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f [ 560.358024] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000200007c0 [ 560.358035] RDX: 00000000200003c0 RSI: 00000000fffffffe RDI: 0000000000000000 [ 560.358044] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 560.358055] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 560.358064] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 560.509947] FAULT_INJECTION: forcing a failure. [ 560.509947] name failslab, interval 1, probability 0, space 0, times 0 [ 560.509978] CPU: 1 PID: 13582 Comm: syz-executor.0 Not tainted 5.0.0 #4 [ 560.509988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.509993] Call Trace: [ 560.510014] dump_stack+0x172/0x1f0 [ 560.510036] should_fail.cold+0xa/0x1b [ 560.510056] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 560.510073] ? lock_downgrade+0x810/0x810 [ 560.510099] ? ___might_sleep+0x163/0x280 [ 560.510125] __should_failslab+0x121/0x190 [ 560.510145] should_failslab+0x9/0x14 [ 560.510162] kmem_cache_alloc_trace+0x2d1/0x760 [ 560.510190] assoc_array_insert+0xef/0x2d90 [ 560.510207] ? wait_for_completion+0x440/0x440 [ 560.510229] ? __lock_is_held+0xb6/0x140 [ 560.510250] ? assoc_array_cancel_edit+0x90/0x90 [ 560.510266] ? lock_acquire+0x16f/0x3f0 [ 560.510281] ? __key_link_begin+0x9d/0x300 [ 560.510308] __key_link_begin+0x12d/0x300 [ 560.510326] key_link+0x8b/0x300 [ 560.510344] ? __key_link_end+0x130/0x130 [ 560.510361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.510375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.510391] ? selinux_is_enabled+0x43/0x60 [ 560.510404] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 560.510425] call_sbin_request_key+0x2f9/0xbe0 [ 560.510457] ? wait_for_key_construction+0x140/0x140 [ 560.510477] ? __key_instantiate_and_link+0x3b0/0x3b0 [ 560.510516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.510534] ? request_key_auth_new+0x618/0x810 [ 560.510551] ? refcount_dec_checked+0x70/0x70 [ 560.510572] ? request_key_auth_revoke+0x130/0x130 [ 560.510593] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 560.510611] ? refcount_dec_and_lock+0x35/0x90 [ 560.510634] request_key_and_link+0xd4d/0x11b0 [ 560.510668] ? wait_for_key_construction+0x140/0x140 [ 560.510687] ? call_sbin_request_key+0xbe0/0xbe0 [ 560.510711] ? keyring_alloc+0xc0/0xc0 [ 560.510728] ? key_default_cmp+0x90/0x90 [ 560.510759] __ia32_sys_request_key+0x287/0x430 [ 560.510780] ? __x64_sys_request_key+0x430/0x430 [ 560.510796] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 560.510812] ? entry_SYSENTER_compat+0x70/0x7f [ 560.510828] ? lockdep_hardirqs_on+0x415/0x5d0 [ 560.510844] ? trace_hardirqs_on+0x67/0x230 [ 560.510865] do_fast_syscall_32+0x281/0xc98 [ 560.510885] entry_SYSENTER_compat+0x70/0x7f [ 560.510897] RIP: 0023:0xf7fcf869 [ 560.510913] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 560.510921] RSP: 002b:00000000f5dcb0cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f [ 560.510936] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000200007c0 [ 560.510945] RDX: 00000000200003c0 RSI: 00000000fffffffe RDI: 0000000000000000 [ 560.510954] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 560.510963] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 560.510972] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 560.572144] FAULT_INJECTION: forcing a failure. [ 560.572144] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 560.572163] CPU: 1 PID: 13590 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 560.572172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.572177] Call Trace: [ 560.572198] dump_stack+0x172/0x1f0 [ 560.572219] should_fail.cold+0xa/0x1b [ 560.572238] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 560.572255] ? ___might_sleep+0x163/0x280 [ 560.572277] should_fail_alloc_page+0x50/0x60 [ 560.572293] __alloc_pages_nodemask+0x1a1/0x710 [ 560.572314] ? __alloc_pages_slowpath+0x2900/0x2900 [ 560.572330] ? ___might_sleep+0x163/0x280 [ 560.572347] ? copyin+0xb5/0x100 [ 560.572366] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 560.572390] alloc_pages_current+0x107/0x210 [ 560.572412] pipe_write+0xa65/0xfb0 [ 560.572450] __vfs_write+0x613/0x8e0 [ 560.572472] ? kernel_read+0x120/0x120 [ 560.572491] ? common_file_perm+0x1d6/0x6f0 [ 560.572515] ? apparmor_file_permission+0x25/0x30 [ 560.572543] ? rw_verify_area+0x118/0x360 [ 560.572564] vfs_write+0x20c/0x580 [ 560.572589] ksys_write+0xea/0x1f0 [ 560.572609] ? __ia32_sys_read+0xb0/0xb0 [ 560.572630] ? do_fast_syscall_32+0xd1/0xc98 [ 560.572657] ? entry_SYSENTER_compat+0x70/0x7f [ 560.572675] ? do_fast_syscall_32+0xd1/0xc98 [ 560.572698] __ia32_sys_write+0x71/0xb0 [ 560.572718] do_fast_syscall_32+0x281/0xc98 [ 560.572740] entry_SYSENTER_compat+0x70/0x7f [ 560.572752] RIP: 0023:0xf7fdf869 [ 560.572767] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 560.572775] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 560.572790] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 560.572799] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 560.572808] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 560.572817] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 560.572826] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:19 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) read$FUSE(0xffffffffffffffff, &(0x7f0000000240), 0x1000) write$evdev(r1, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:19 executing program 2: mkdir(0x0, 0x8) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:19 executing program 0 (fault-call:1 fault-nth:16): clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:19 executing program 4 (fault-call:2 fault-nth:12): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:19 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:19 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) fcntl$setownex(r1, 0xf, &(0x7f0000000140)={0x2, r2}) [ 562.927621] FAULT_INJECTION: forcing a failure. [ 562.927621] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 562.953724] FAULT_INJECTION: forcing a failure. [ 562.953724] name failslab, interval 1, probability 0, space 0, times 0 [ 563.000423] CPU: 1 PID: 13608 Comm: syz-executor.0 Not tainted 5.0.0 #4 [ 563.007225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 563.016583] Call Trace: [ 563.019185] dump_stack+0x172/0x1f0 [ 563.022830] should_fail.cold+0xa/0x1b [ 563.026731] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 563.031845] ? lock_downgrade+0x810/0x810 [ 563.036005] ? ___might_sleep+0x163/0x280 [ 563.040173] __should_failslab+0x121/0x190 [ 563.044420] should_failslab+0x9/0x14 [ 563.048231] kmem_cache_alloc_trace+0x2d1/0x760 [ 563.052920] assoc_array_insert+0x78c/0x2d90 [ 563.057903] ? wait_for_completion+0x440/0x440 [ 563.062499] ? __lock_is_held+0xb6/0x140 [ 563.066573] ? assoc_array_cancel_edit+0x90/0x90 [ 563.071334] ? lock_acquire+0x16f/0x3f0 [ 563.075404] ? __key_link_begin+0x9d/0x300 [ 563.079665] __key_link_begin+0x12d/0x300 [ 563.083832] key_link+0x8b/0x300 [ 563.087212] ? __key_link_end+0x130/0x130 [ 563.091368] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 563.096913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 563.102460] ? selinux_is_enabled+0x43/0x60 [ 563.106830] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 563.112422] call_sbin_request_key+0x2f9/0xbe0 [ 563.117029] ? wait_for_key_construction+0x140/0x140 [ 563.122143] ? __key_instantiate_and_link+0x3b0/0x3b0 [ 563.127417] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 563.132969] ? request_key_auth_new+0x618/0x810 [ 563.137658] ? refcount_dec_checked+0x70/0x70 [ 563.142169] ? request_key_auth_revoke+0x130/0x130 [ 563.147115] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 563.152670] ? refcount_dec_and_lock+0x35/0x90 [ 563.157269] request_key_and_link+0xd4d/0x11b0 [ 563.161865] ? wait_for_key_construction+0x140/0x140 [ 563.166979] ? call_sbin_request_key+0xbe0/0xbe0 [ 563.171747] ? keyring_alloc+0xc0/0xc0 [ 563.175643] ? key_default_cmp+0x90/0x90 [ 563.179752] __ia32_sys_request_key+0x287/0x430 [ 563.184435] ? __x64_sys_request_key+0x430/0x430 [ 563.189207] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 563.193976] ? entry_SYSENTER_compat+0x70/0x7f [ 563.198564] ? lockdep_hardirqs_on+0x415/0x5d0 [ 563.203151] ? trace_hardirqs_on+0x67/0x230 [ 563.207489] do_fast_syscall_32+0x281/0xc98 [ 563.211823] entry_SYSENTER_compat+0x70/0x7f [ 563.216230] RIP: 0023:0xf7fcf869 [ 563.219598] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 563.238510] RSP: 002b:00000000f5dcb0cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f [ 563.246231] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000200007c0 [ 563.253502] RDX: 00000000200003c0 RSI: 00000000fffffffe RDI: 0000000000000000 [ 563.260774] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 563.268047] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 563.275318] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 563.282619] CPU: 0 PID: 13601 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 563.289397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 563.298923] Call Trace: [ 563.301525] dump_stack+0x172/0x1f0 [ 563.305158] should_fail.cold+0xa/0x1b [ 563.309051] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 563.314162] ? ___might_sleep+0x163/0x280 [ 563.314184] should_fail_alloc_page+0x50/0x60 [ 563.314202] __alloc_pages_nodemask+0x1a1/0x710 [ 563.327505] ? __alloc_pages_slowpath+0x2900/0x2900 [ 563.332530] ? ___might_sleep+0x163/0x280 [ 563.336697] ? copyin+0xb5/0x100 [ 563.340074] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 563.345631] alloc_pages_current+0x107/0x210 [ 563.350069] pipe_write+0xa65/0xfb0 [ 563.353713] __vfs_write+0x613/0x8e0 [ 563.357435] ? kernel_read+0x120/0x120 [ 563.357452] ? common_file_perm+0x1d6/0x6f0 [ 563.357473] ? apparmor_file_permission+0x25/0x30 [ 563.357496] ? rw_verify_area+0x118/0x360 [ 563.370523] vfs_write+0x20c/0x580 [ 563.370544] ksys_write+0xea/0x1f0 [ 563.370562] ? __ia32_sys_read+0xb0/0xb0 [ 563.370580] ? do_fast_syscall_32+0xd1/0xc98 [ 563.390394] ? entry_SYSENTER_compat+0x70/0x7f [ 563.394998] ? do_fast_syscall_32+0xd1/0xc98 17:04:20 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}]}) 17:04:20 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x2100, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:20 executing program 0 (fault-call:1 fault-nth:17): clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 563.399425] __ia32_sys_write+0x71/0xb0 [ 563.403412] do_fast_syscall_32+0x281/0xc98 [ 563.407754] entry_SYSENTER_compat+0x70/0x7f [ 563.412167] RIP: 0023:0xf7fdf869 [ 563.415540] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 563.421689] FAULT_INJECTION: forcing a failure. [ 563.421689] name failslab, interval 1, probability 0, space 0, times 0 17:04:20 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:20 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x800000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:20 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='.?cgrou\x80\xb0]\xde9\x00x\xfe\xbeMr2l\xa7E\x00\x00\x00\x00\x00\x00\x87\x85\xf4\xfa\xf8\xa2r\xa0\x99\xe2\xccWL\x16fq', 0x200002, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x101000) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x31}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000140)=r2, 0x4) openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) [ 563.434448] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 563.434463] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 563.434471] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 563.434479] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 563.434487] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 563.434495] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 563.534845] CPU: 1 PID: 13627 Comm: syz-executor.0 Not tainted 5.0.0 #4 [ 563.541643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 563.551013] Call Trace: [ 563.553613] dump_stack+0x172/0x1f0 [ 563.557264] should_fail.cold+0xa/0x1b [ 563.561185] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 563.566297] ? lock_downgrade+0x810/0x810 [ 563.570465] ? ___might_sleep+0x163/0x280 [ 563.574667] __should_failslab+0x121/0x190 [ 563.578912] should_failslab+0x9/0x14 [ 563.582718] kmem_cache_alloc_trace+0x2d1/0x760 [ 563.587397] ? sprintf+0xc0/0x100 [ 563.590861] ? scnprintf+0x140/0x140 [ 563.594587] call_usermodehelper_setup+0x9b/0x320 [ 563.599439] ? complete_request_key+0xb0/0xb0 [ 563.603953] ? umh_keys_cleanup+0x50/0x50 [ 563.608112] call_sbin_request_key+0x743/0xbe0 [ 563.612712] ? wait_for_key_construction+0x140/0x140 [ 563.617821] ? __key_instantiate_and_link+0x3b0/0x3b0 [ 563.623043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 563.628585] ? request_key_auth_new+0x618/0x810 [ 563.633265] ? find_next_bit+0x60/0x130 [ 563.637248] ? request_key_auth_revoke+0x130/0x130 [ 563.642194] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 563.647745] ? refcount_dec_and_lock+0x35/0x90 [ 563.652353] request_key_and_link+0xd4d/0x11b0 [ 563.656954] ? wait_for_key_construction+0x140/0x140 [ 563.662072] ? call_sbin_request_key+0xbe0/0xbe0 [ 563.666844] ? keyring_alloc+0xc0/0xc0 [ 563.670743] ? key_default_cmp+0x90/0x90 [ 563.674826] __ia32_sys_request_key+0x287/0x430 [ 563.679508] ? __x64_sys_request_key+0x430/0x430 [ 563.684271] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 563.689040] ? entry_SYSENTER_compat+0x70/0x7f [ 563.693668] ? lockdep_hardirqs_on+0x415/0x5d0 [ 563.698260] ? trace_hardirqs_on+0x67/0x230 [ 563.702597] do_fast_syscall_32+0x281/0xc98 [ 563.706938] entry_SYSENTER_compat+0x70/0x7f [ 563.711437] RIP: 0023:0xf7fcf869 [ 563.714817] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 563.733727] RSP: 002b:00000000f5dcb0cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f [ 563.741446] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000200007c0 [ 563.748721] RDX: 00000000200003c0 RSI: 00000000fffffffe RDI: 0000000000000000 [ 563.755992] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 563.756000] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 563.756013] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:23 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(0xffffffffffffffff, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:23 executing program 4 (fault-call:2 fault-nth:13): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:23 executing program 3: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80000) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') ioctl(r0, 0x5, &(0x7f0000000180)="ec9a25f03acfaeeb42cc267f80796b820549513d5dd8feedaf75e639eaf5ee02555bf48eae86e5f6b96d92f6e43710b961f916e2430ae26055dcfa8699929864bdc5e3d1cf65f98084e1cc2da1539e77057902681724ff82653fa3254f") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) 17:04:23 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) 17:04:23 executing program 0 (fault-call:1 fault-nth:18): clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:23 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x3, &(0x7f0000000000)='e0z'}, 0x30) perf_event_open(0x0, r0, 0x2, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000780)='/dev/vcs#\x00', 0xf, 0x200) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000800)=""/208, &(0x7f0000000900)=0xd0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xfff, 0x441) recvmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000140)=""/158, 0x9e}, {&(0x7f0000000200)=""/240, 0xf0}, {&(0x7f00000000c0)=""/49, 0x31}, {&(0x7f0000000300)=""/49, 0x31}, {&(0x7f00000004c0)=""/238, 0xee}, {&(0x7f0000000340)=""/90, 0x5a}, {&(0x7f00000005c0)=""/183, 0xb7}], 0x7, &(0x7f00000006c0)=""/88, 0x58}, 0x20) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 566.014371] FAULT_INJECTION: forcing a failure. [ 566.014371] name failslab, interval 1, probability 0, space 0, times 0 [ 566.028244] FAULT_INJECTION: forcing a failure. [ 566.028244] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 566.030191] CPU: 1 PID: 13659 Comm: syz-executor.0 Not tainted 5.0.0 #4 [ 566.046800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.056150] Call Trace: [ 566.058746] dump_stack+0x172/0x1f0 [ 566.062386] should_fail.cold+0xa/0x1b [ 566.066285] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 566.071394] ? lock_downgrade+0x810/0x810 [ 566.075559] ? ___might_sleep+0x163/0x280 [ 566.079723] __should_failslab+0x121/0x190 [ 566.083969] should_failslab+0x9/0x14 [ 566.087775] kmem_cache_alloc_trace+0x2d1/0x760 [ 566.092456] ? sprintf+0xc0/0x100 [ 566.095919] ? scnprintf+0x140/0x140 [ 566.099663] call_usermodehelper_setup+0x9b/0x320 [ 566.104513] ? complete_request_key+0xb0/0xb0 [ 566.104526] ? umh_keys_cleanup+0x50/0x50 [ 566.104547] call_sbin_request_key+0x743/0xbe0 [ 566.104569] ? wait_for_key_construction+0x140/0x140 [ 566.104586] ? __key_instantiate_and_link+0x3b0/0x3b0 [ 566.104620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 566.133607] ? request_key_auth_new+0x618/0x810 [ 566.138284] ? find_next_bit+0x60/0x130 [ 566.142273] ? request_key_auth_revoke+0x130/0x130 [ 566.147216] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 566.152764] ? refcount_dec_and_lock+0x35/0x90 [ 566.157453] request_key_and_link+0xd4d/0x11b0 [ 566.162048] ? wait_for_key_construction+0x140/0x140 [ 566.167160] ? call_sbin_request_key+0xbe0/0xbe0 [ 566.171929] ? keyring_alloc+0xc0/0xc0 [ 566.175824] ? key_default_cmp+0x90/0x90 [ 566.179904] __ia32_sys_request_key+0x287/0x430 [ 566.184583] ? __x64_sys_request_key+0x430/0x430 [ 566.189346] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 566.194115] ? entry_SYSENTER_compat+0x70/0x7f [ 566.198706] ? lockdep_hardirqs_on+0x415/0x5d0 [ 566.203300] ? trace_hardirqs_on+0x67/0x230 [ 566.207641] do_fast_syscall_32+0x281/0xc98 17:04:23 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgrnup\x00', 0x200002, 0x0) fstatfs(r0, &(0x7f0000000140)=""/34) openat$cgroup_ro(r0, &(0x7f00000000c0)='pids.events\x00', 0x275a, 0x0) [ 566.211985] entry_SYSENTER_compat+0x70/0x7f [ 566.216394] RIP: 0023:0xf7fcf869 [ 566.219771] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 566.238687] RSP: 002b:00000000f5dcb0cc EFLAGS: 00000296 ORIG_RAX: 000000000000011f [ 566.246401] RAX: ffffffffffffffda RBX: 0000000020000100 RCX: 00000000200007c0 [ 566.253686] RDX: 00000000200003c0 RSI: 00000000fffffffe RDI: 0000000000000000 17:04:23 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 566.260962] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 566.268993] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 17:04:23 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='\xeekllers\x00', 0x275a, 0x0) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x9, 0x30000) write$P9_RLERROR(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="1200000007010009002e2f6767726f757000"], 0x12) 17:04:23 executing program 2: mkdir(0x0, 0x84) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', r0) timerfd_create(0x16, 0x800) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x480000, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f00000000c0)={0x22, 0x3, 0x0, {0x4, 0x1, 0x0, '%'}}, 0x22) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x4, 0x800) 17:04:23 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) [ 566.269003] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:23 executing program 4 (fault-call:2 fault-nth:14): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 566.279214] CPU: 0 PID: 13664 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 566.279224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.279228] Call Trace: [ 566.279249] dump_stack+0x172/0x1f0 [ 566.279270] should_fail.cold+0xa/0x1b [ 566.279288] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 566.279304] ? ___might_sleep+0x163/0x280 [ 566.279326] should_fail_alloc_page+0x50/0x60 [ 566.279341] __alloc_pages_nodemask+0x1a1/0x710 [ 566.279361] ? __alloc_pages_slowpath+0x2900/0x2900 [ 566.279376] ? ___might_sleep+0x163/0x280 [ 566.279393] ? copyin+0xb5/0x100 [ 566.279412] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 566.279433] alloc_pages_current+0x107/0x210 [ 566.279452] pipe_write+0xa65/0xfb0 [ 566.279479] __vfs_write+0x613/0x8e0 [ 566.279497] ? kernel_read+0x120/0x120 [ 566.279513] ? common_file_perm+0x1d6/0x6f0 [ 566.279534] ? apparmor_file_permission+0x25/0x30 [ 566.279556] ? rw_verify_area+0x118/0x360 [ 566.279574] vfs_write+0x20c/0x580 [ 566.279592] ksys_write+0xea/0x1f0 [ 566.279610] ? __ia32_sys_read+0xb0/0xb0 [ 566.279628] ? do_fast_syscall_32+0xd1/0xc98 [ 566.279642] ? entry_SYSENTER_compat+0x70/0x7f [ 566.279671] ? do_fast_syscall_32+0xd1/0xc98 [ 566.279692] __ia32_sys_write+0x71/0xb0 [ 566.279710] do_fast_syscall_32+0x281/0xc98 [ 566.279730] entry_SYSENTER_compat+0x70/0x7f [ 566.279743] RIP: 0023:0xf7fdf869 [ 566.279758] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 566.279766] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 566.279781] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 566.279790] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 566.279798] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 566.279807] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 566.279815] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 566.509711] FAULT_INJECTION: forcing a failure. [ 566.509711] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 566.509735] CPU: 1 PID: 13707 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 566.509744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.509749] Call Trace: [ 566.509771] dump_stack+0x172/0x1f0 [ 566.509791] should_fail.cold+0xa/0x1b [ 566.509809] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 566.509826] ? ___might_sleep+0x163/0x280 [ 566.509849] should_fail_alloc_page+0x50/0x60 [ 566.509864] __alloc_pages_nodemask+0x1a1/0x710 [ 566.509885] ? __alloc_pages_slowpath+0x2900/0x2900 [ 566.509902] ? ___might_sleep+0x163/0x280 [ 566.509919] ? copyin+0xb5/0x100 [ 566.509941] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 566.509966] alloc_pages_current+0x107/0x210 [ 566.509988] pipe_write+0xa65/0xfb0 [ 566.510020] __vfs_write+0x613/0x8e0 [ 566.510040] ? kernel_read+0x120/0x120 [ 566.510058] ? common_file_perm+0x1d6/0x6f0 [ 566.510080] ? apparmor_file_permission+0x25/0x30 [ 566.510103] ? rw_verify_area+0x118/0x360 [ 566.510124] vfs_write+0x20c/0x580 17:04:23 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(0xffffffffffffffff, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:23 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000000c0)={r1, r1, 0x7, 0x7, &(0x7f0000000080)="5702a7212c2eeb", 0xd8d, 0x1, 0x401, 0x1b1, 0x0, 0x1, 0x8, 'syz0\x00'}) 17:04:23 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x80) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:23 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) 17:04:23 executing program 4 (fault-call:2 fault-nth:15): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:23 executing program 0 (fault-call:1 fault-nth:19): clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 566.510148] ksys_write+0xea/0x1f0 [ 566.510168] ? __ia32_sys_read+0xb0/0xb0 [ 566.510189] ? do_fast_syscall_32+0xd1/0xc98 [ 566.510206] ? entry_SYSENTER_compat+0x70/0x7f [ 566.510224] ? do_fast_syscall_32+0xd1/0xc98 [ 566.510248] __ia32_sys_write+0x71/0xb0 17:04:24 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:24 executing program 4 (fault-call:2 fault-nth:16): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 566.510270] do_fast_syscall_32+0x281/0xc98 17:04:24 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='.symmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 566.510295] entry_SYSENTER_compat+0x70/0x7f [ 566.510310] RIP: 0023:0xf7fdf869 17:04:24 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x200000, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000000c0)=0xfffffffffffffffa, 0x4) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) 17:04:24 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 566.510330] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 17:04:24 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x401, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r2, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000004c0)=0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x5, 0x7, 0x40, 0xf60d, 0x0, 0x5, 0x800, 0x8c063d6c87856e80, 0x9, 0xffffffff, 0x9, 0x500d, 0x20, 0x7f, 0x0, 0x6, 0x3, 0x200000001, 0x5, 0x8, 0x742c, 0x166, 0x40, 0x3ff, 0xabd, 0xdf2, 0x5, 0x7, 0x52, 0x1f, 0x6, 0x5, 0x4, 0x792, 0x335c, 0x6, 0x0, 0xfffffffffffffff9, 0x1, @perf_bp={&(0x7f0000000140), 0xf}, 0x0, 0x9, 0x9, 0x9, 0x631, 0x5, 0xb8a2}, r3, 0x7, r0, 0xb) r4 = dup(r0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r4, 0x80845663, &(0x7f0000000300)={0x0, @reserved}) r5 = request_key(&(0x7f0000000480)='user\x00', &(0x7f0000000680)={'syz', 0x3}, &(0x7f00000006c0)='e0z', 0xfffffffffffffffa) request_key(&(0x7f0000000240)='.dead\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000580)=']\x0eH\xbe\xac\xd4\x01\x8c\n\xb4\xec\xd9\xd2\xafXf\xbd\xab\xb8{\x10\xb4d%\xa8:>T\x85 \xd5\xaaV\xf0\x80<\xe8l\xfc\xff\xab\xa1\x06\xc8\x02.\xb8\x14\xf5?!e\x8bQn\xdc!bi\xee\xe7\xd1\x0e\x0fI\\+\x80\xd1\xf4\xd6\xfa%\x87\xa8FG\xd1G\b\xad\x8d\xa7}\x14c\\\xc7-\xe8\x81\xf3j\xe2\xef\x9c\xb9\\\x9a4\xa2\x97~\xc9N\x9d\x96\xc2\xb6\xa6&\x85\x92\x15\xff\x1d)b\xe4\xae\xfa.\xe6\x8a/N\xaa\x8cT\x84\x17\x92\xa3\xe9w%\xbf\xd5\x88G\xb44/H\xa6\xc89*q\xbf\xd3\'=\x99&\x1c\xa5\x02\x1f\x01\xf7\xbefB\xc9\rlC\xa3M\x1e\xa4\xad\x118A\xc7\xf0\x94\n\x88\xc3\xa5\nI\x14U5?\x81\f\'\xa4\xd0\x8b\x14\x0f\x9f\xc42\xba\xcf\xdf\xff\xc2\xf0&n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', r5) r6 = request_key(&(0x7f0000000180)='trusted\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)='keyring\x00', 0xffffffffffffffff) r7 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r6) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000500)) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='\x00', r7) [ 566.510338] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 566.510355] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 566.510365] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 566.510374] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 566.510384] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 566.510394] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 566.924751] FAULT_INJECTION: forcing a failure. [ 566.924751] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 566.924770] CPU: 0 PID: 13724 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 566.924779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.924784] Call Trace: [ 566.924807] dump_stack+0x172/0x1f0 [ 566.924827] should_fail.cold+0xa/0x1b [ 566.924846] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 566.924864] ? ___might_sleep+0x163/0x280 [ 566.924887] should_fail_alloc_page+0x50/0x60 [ 566.924902] __alloc_pages_nodemask+0x1a1/0x710 [ 566.924923] ? __alloc_pages_slowpath+0x2900/0x2900 [ 566.924938] ? ___might_sleep+0x163/0x280 [ 566.924966] ? copyin+0xb5/0x100 [ 566.924986] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 566.925009] alloc_pages_current+0x107/0x210 [ 566.925031] pipe_write+0xa65/0xfb0 [ 566.925059] __vfs_write+0x613/0x8e0 [ 566.925078] ? kernel_read+0x120/0x120 [ 566.925094] ? common_file_perm+0x1d6/0x6f0 [ 566.925116] ? apparmor_file_permission+0x25/0x30 [ 566.925139] ? rw_verify_area+0x118/0x360 [ 566.925157] vfs_write+0x20c/0x580 [ 566.925177] ksys_write+0xea/0x1f0 [ 566.925196] ? __ia32_sys_read+0xb0/0xb0 [ 566.925215] ? do_fast_syscall_32+0xd1/0xc98 [ 566.925231] ? entry_SYSENTER_compat+0x70/0x7f [ 566.925247] ? do_fast_syscall_32+0xd1/0xc98 [ 566.925270] __ia32_sys_write+0x71/0xb0 [ 566.925291] do_fast_syscall_32+0x281/0xc98 [ 566.925313] entry_SYSENTER_compat+0x70/0x7f [ 566.925326] RIP: 0023:0xf7fdf869 [ 566.925344] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 566.925353] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 566.925371] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 566.925381] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 566.925390] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 566.925399] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 566.925409] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 567.129886] FAULT_INJECTION: forcing a failure. [ 567.129886] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 567.129908] CPU: 0 PID: 13746 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 567.129918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.129924] Call Trace: [ 567.129957] dump_stack+0x172/0x1f0 [ 567.129979] should_fail.cold+0xa/0x1b [ 567.129999] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 567.130017] ? ___might_sleep+0x163/0x280 [ 567.130040] should_fail_alloc_page+0x50/0x60 [ 567.130057] __alloc_pages_nodemask+0x1a1/0x710 [ 567.130078] ? __alloc_pages_slowpath+0x2900/0x2900 [ 567.130094] ? ___might_sleep+0x163/0x280 [ 567.130111] ? copyin+0xb5/0x100 [ 567.130129] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 567.130151] alloc_pages_current+0x107/0x210 [ 567.130172] pipe_write+0xa65/0xfb0 [ 567.130199] __vfs_write+0x613/0x8e0 [ 567.130217] ? kernel_read+0x120/0x120 [ 567.130234] ? common_file_perm+0x1d6/0x6f0 [ 567.130255] ? apparmor_file_permission+0x25/0x30 17:04:24 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(0xffffffffffffffff, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:24 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymm%tric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:24 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000080)={0x3, 0x5a, "b12fced3552782e79906aa553bf8a7ca46f257c97034702443746beade4e6a484f5b52eec65aab7040ca2ada1f166b14ad8a74fd2d540662365e22e79b88324593568bae1153057ca62e52e5d8e599e0e94a4ade9a6b156528e6"}) 17:04:24 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:24 executing program 4 (fault-call:2 fault-nth:17): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:24 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 567.130277] ? rw_verify_area+0x118/0x360 [ 567.130295] vfs_write+0x20c/0x580 [ 567.130315] ksys_write+0xea/0x1f0 [ 567.130332] ? __ia32_sys_read+0xb0/0xb0 [ 567.130350] ? do_fast_syscall_32+0xd1/0xc98 [ 567.130364] ? entry_SYSENTER_compat+0x70/0x7f [ 567.130379] ? do_fast_syscall_32+0xd1/0xc98 [ 567.130399] __ia32_sys_write+0x71/0xb0 [ 567.130417] do_fast_syscall_32+0x281/0xc98 [ 567.130437] entry_SYSENTER_compat+0x70/0x7f [ 567.130449] RIP: 0023:0xf7fdf869 [ 567.130468] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 567.130478] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 567.130494] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 567.130504] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 567.130514] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 17:04:24 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmitric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 567.130523] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 567.130533] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 567.670781] FAULT_INJECTION: forcing a failure. [ 567.670781] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 567.710981] CPU: 1 PID: 13867 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 567.717776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.727135] Call Trace: [ 567.729741] dump_stack+0x172/0x1f0 [ 567.733382] should_fail.cold+0xa/0x1b [ 567.737282] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 567.742391] ? ___might_sleep+0x163/0x280 [ 567.746554] should_fail_alloc_page+0x50/0x60 [ 567.751057] __alloc_pages_nodemask+0x1a1/0x710 [ 567.755742] ? __alloc_pages_slowpath+0x2900/0x2900 [ 567.760765] ? ___might_sleep+0x163/0x280 [ 567.764932] ? copyin+0xb5/0x100 [ 567.768304] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 567.773859] alloc_pages_current+0x107/0x210 [ 567.778283] pipe_write+0xa65/0xfb0 [ 567.781930] __vfs_write+0x613/0x8e0 [ 567.785664] ? kernel_read+0x120/0x120 [ 567.789561] ? common_file_perm+0x1d6/0x6f0 [ 567.793892] ? apparmor_file_permission+0x25/0x30 [ 567.798746] ? rw_verify_area+0x118/0x360 [ 567.802904] vfs_write+0x20c/0x580 [ 567.806463] ksys_write+0xea/0x1f0 [ 567.810013] ? __ia32_sys_read+0xb0/0xb0 [ 567.814078] ? do_fast_syscall_32+0xd1/0xc98 [ 567.818490] ? entry_SYSENTER_compat+0x70/0x7f [ 567.823077] ? do_fast_syscall_32+0xd1/0xc98 [ 567.827501] __ia32_sys_write+0x71/0xb0 [ 567.831486] do_fast_syscall_32+0x281/0xc98 [ 567.835819] entry_SYSENTER_compat+0x70/0x7f [ 567.840228] RIP: 0023:0xf7fdf869 17:04:24 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = dup2(r0, r1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000010}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="dc000000", @ANYRES16=r3, @ANYBLOB="000429bd7000fedbdf25020000002c000900080002000500000008000100000000000800020004000000080001000900000008000200060000009c0005000800010065746800540002000800010006000000080003000400000008000200380000ff03000008000400010000000800010006000000080004006f7d0000080001001100000008000200050000003c0002000800020008000000080003000400000008000100110000000800010003000000080001001c00000008000300050000000800030005000000"], 0xdc}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r4 = openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f0000000100)={'bond_slave_0\x00', {0x2, 0x4e22, @remote}}) 17:04:24 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmet%ic\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:24 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 567.843596] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 567.862494] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 567.870206] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 567.877476] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 567.884749] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 567.892019] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 567.899294] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:25 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x02', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:25 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2004020}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x108, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x76, 0x6, 0x20, 0x3f}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x840}, 0x1) fcntl$notify(r1, 0x402, 0x1) 17:04:25 executing program 1: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r2 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r2, &(0x7f0000000240), 0x1000) write$evdev(r1, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:25 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:25 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x03', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:25 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x80440, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, &(0x7f00000001c0)={@loopback, 0x0}, &(0x7f0000000200)=0x14) bind$xdp(r1, &(0x7f0000000240)={0x2c, 0x6, r2, 0x16}, 0x10) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) 17:04:25 executing program 4 (fault-call:2 fault-nth:18): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 568.374472] FAULT_INJECTION: forcing a failure. [ 568.374472] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 568.418022] CPU: 0 PID: 13916 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 568.424825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.434185] Call Trace: [ 568.436793] dump_stack+0x172/0x1f0 [ 568.440440] should_fail.cold+0xa/0x1b [ 568.444342] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 568.449540] ? ___might_sleep+0x163/0x280 [ 568.453704] should_fail_alloc_page+0x50/0x60 [ 568.458240] __alloc_pages_nodemask+0x1a1/0x710 [ 568.462916] ? __alloc_pages_slowpath+0x2900/0x2900 [ 568.467948] ? ___might_sleep+0x163/0x280 [ 568.472109] ? copyin+0xb5/0x100 [ 568.475478] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 568.481024] alloc_pages_current+0x107/0x210 [ 568.485439] pipe_write+0xa65/0xfb0 [ 568.489082] __vfs_write+0x613/0x8e0 [ 568.492800] ? kernel_read+0x120/0x120 [ 568.496693] ? common_file_perm+0x1d6/0x6f0 [ 568.501021] ? apparmor_file_permission+0x25/0x30 [ 568.505885] ? rw_verify_area+0x118/0x360 [ 568.510037] vfs_write+0x20c/0x580 [ 568.513596] ksys_write+0xea/0x1f0 [ 568.517141] ? __ia32_sys_read+0xb0/0xb0 [ 568.521206] ? do_fast_syscall_32+0xd1/0xc98 [ 568.525617] ? entry_SYSENTER_compat+0x70/0x7f [ 568.530206] ? do_fast_syscall_32+0xd1/0xc98 [ 568.534624] __ia32_sys_write+0x71/0xb0 [ 568.538615] do_fast_syscall_32+0x281/0xc98 [ 568.542951] entry_SYSENTER_compat+0x70/0x7f [ 568.547365] RIP: 0023:0xf7fdf869 [ 568.550730] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 568.569628] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 568.577346] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 568.584611] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 568.591881] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 568.599144] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 568.606413] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 569.014478] device bridge_slave_1 left promiscuous mode [ 569.020011] bridge0: port 2(bridge_slave_1) entered disabled state [ 569.084565] device bridge_slave_0 left promiscuous mode [ 569.090037] bridge0: port 1(bridge_slave_0) entered disabled state [ 569.286616] device hsr_slave_1 left promiscuous mode [ 569.359107] device hsr_slave_0 left promiscuous mode [ 569.419208] team0 (unregistering): Port device team_slave_1 removed [ 569.430340] team0 (unregistering): Port device team_slave_0 removed [ 569.442136] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 569.469046] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 569.562876] bond0 (unregistering): Released all slaves [ 570.140855] IPVS: ftp: loaded support on port[0] = 21 [ 570.276849] chnl_net:caif_netlink_parms(): no params data found [ 570.329632] bridge0: port 1(bridge_slave_0) entered blocking state [ 570.339117] bridge0: port 1(bridge_slave_0) entered disabled state [ 570.350146] device bridge_slave_0 entered promiscuous mode [ 570.360420] bridge0: port 2(bridge_slave_1) entered blocking state [ 570.370722] bridge0: port 2(bridge_slave_1) entered disabled state [ 570.380915] device bridge_slave_1 entered promiscuous mode [ 570.410306] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 570.425589] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 570.451338] team0: Port device team_slave_0 added [ 570.464631] team0: Port device team_slave_1 added [ 570.537717] device hsr_slave_0 entered promiscuous mode [ 570.604228] device hsr_slave_1 entered promiscuous mode [ 570.662726] bridge0: port 2(bridge_slave_1) entered blocking state [ 570.669183] bridge0: port 2(bridge_slave_1) entered forwarding state [ 570.675900] bridge0: port 1(bridge_slave_0) entered blocking state [ 570.682271] bridge0: port 1(bridge_slave_0) entered forwarding state [ 570.698195] bridge0: port 1(bridge_slave_0) entered disabled state [ 570.705567] bridge0: port 2(bridge_slave_1) entered disabled state [ 570.769694] 8021q: adding VLAN 0 to HW filter on device bond0 [ 570.791425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 570.801876] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 570.816097] 8021q: adding VLAN 0 to HW filter on device team0 [ 570.826063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 570.834481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 570.842140] bridge0: port 1(bridge_slave_0) entered blocking state [ 570.848561] bridge0: port 1(bridge_slave_0) entered forwarding state [ 570.868490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 570.876591] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 570.884638] bridge0: port 2(bridge_slave_1) entered blocking state [ 570.891007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 570.899395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 570.907370] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 570.915524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 570.923175] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 570.939537] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 570.946632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 570.955236] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 570.962825] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 570.970433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 570.981087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 570.992407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 571.006509] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 571.043676] 8021q: adding VLAN 0 to HW filter on device batadv0 17:04:28 executing program 2: mkdir(0x0, 0x4) r0 = socket$unix(0x1, 0x0, 0x0) unshare(0x2000000) sendmsg$unix(r0, &(0x7f0000000140)={&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000080)="b1958661f612ff0dbb7d93", 0xb}], 0x1, 0x0, 0x0, 0x40040}, 0x40) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:28 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x04', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:28 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:28 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='\xdd\xe7\x87\xd2\xa5\x10\xd2\x90\n\xcb\xc7\xb7\xae\xa8\x00@\x00\x00=:\xd2\x00\x00\x00\x00\v\xe58\x0f\x98', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) 17:04:28 executing program 4 (fault-call:2 fault-nth:19): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:28 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x05', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:28 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x0, 0x70bd2a, 0x25dfdbfe, {{}, 0x0, 0x4107, 0x0, {0x14, 0x18, {0xe2, @bearer=@udp='udp:syz2\x00'}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x40) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000001c0)=0x0) getsockopt$inet6_int(r1, 0x29, 0x5a, &(0x7f0000000280), &(0x7f00000002c0)=0x4) capget(&(0x7f0000000200)={0x20071026, r3}, &(0x7f0000000240)={0x931, 0x401, 0x800, 0x9, 0x818, 0x2b8}) ioctl$DRM_IOCTL_INFO_BUFS(r1, 0xc0086418, &(0x7f0000000300)={0x792, 0x1, 0x5f55, 0x936, 0x8, 0x88}) [ 571.211842] FAULT_INJECTION: forcing a failure. [ 571.211842] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 571.289060] CPU: 1 PID: 13947 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 571.295888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.305250] Call Trace: [ 571.307858] dump_stack+0x172/0x1f0 [ 571.311504] should_fail.cold+0xa/0x1b [ 571.315403] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 571.320517] ? ___might_sleep+0x163/0x280 [ 571.324686] should_fail_alloc_page+0x50/0x60 [ 571.329192] __alloc_pages_nodemask+0x1a1/0x710 [ 571.333873] ? __alloc_pages_slowpath+0x2900/0x2900 [ 571.338903] ? ___might_sleep+0x163/0x280 [ 571.343083] ? copyin+0xb5/0x100 [ 571.346464] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 571.352007] alloc_pages_current+0x107/0x210 [ 571.356426] pipe_write+0xa65/0xfb0 [ 571.360079] __vfs_write+0x613/0x8e0 [ 571.363796] ? kernel_read+0x120/0x120 [ 571.367686] ? common_file_perm+0x1d6/0x6f0 [ 571.372019] ? apparmor_file_permission+0x25/0x30 [ 571.376922] ? rw_verify_area+0x118/0x360 [ 571.381075] vfs_write+0x20c/0x580 [ 571.384625] ksys_write+0xea/0x1f0 [ 571.388178] ? __ia32_sys_read+0xb0/0xb0 [ 571.392253] ? do_fast_syscall_32+0xd1/0xc98 [ 571.396673] ? entry_SYSENTER_compat+0x70/0x7f [ 571.401273] ? do_fast_syscall_32+0xd1/0xc98 [ 571.405696] __ia32_sys_write+0x71/0xb0 [ 571.409685] do_fast_syscall_32+0x281/0xc98 [ 571.414022] entry_SYSENTER_compat+0x70/0x7f [ 571.418434] RIP: 0023:0xf7fdf869 [ 571.421811] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 571.440720] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 571.448435] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 571.455711] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 571.462983] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 571.470253] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 571.477523] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:28 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x20) r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:28 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:28 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x06', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:28 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x6000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:28 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000080)={0x10, 0x0, 0x1}, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f00000002c0)={@local, 0x0}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001580)={{{@in6=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001680)=0xe8) recvmsg(r1, &(0x7f0000001900)={&(0x7f00000016c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000001800)=[{&(0x7f0000001740)=""/184, 0xb8}], 0x1, &(0x7f0000001840)=""/150, 0x96}, 0x40000040) accept4$packet(r1, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001980)=0x14, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001a00)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000001b00)=0xe8) prctl$PR_SET_FPEMU(0xa, 0x3) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001b40)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@remote}}, &(0x7f0000001c40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001c80)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000001d80)=0xe8) getpeername$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0xae) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000001e40)={@rand_addr, 0x0}, &(0x7f0000001e80)=0x14) recvmmsg(r1, &(0x7f0000006b40)=[{{&(0x7f0000001ec0)=@nfc_llcp, 0x80, &(0x7f0000004100)=[{&(0x7f0000001f40)=""/208, 0xd0}, {&(0x7f0000002040)=""/20, 0x14}, {&(0x7f0000002080)=""/4096, 0x1000}, {&(0x7f0000003080)=""/16, 0x10}, {&(0x7f00000030c0)=""/4096, 0x1000}, {&(0x7f00000040c0)=""/55, 0x37}], 0x6, &(0x7f0000004140)=""/4096, 0x1000}, 0x3ff}, {{&(0x7f0000005140)=@pppol2tpv3in6, 0x80, &(0x7f0000005380)=[{&(0x7f00000051c0)=""/223, 0xdf}, {&(0x7f00000052c0)=""/44, 0x2c}, {&(0x7f0000005300)=""/83, 0x53}], 0x3, &(0x7f00000053c0)=""/66, 0x42}, 0xea}, {{&(0x7f0000005440)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000058c0)=[{&(0x7f00000054c0)=""/219, 0xdb}, {&(0x7f00000055c0)=""/89, 0x59}, {&(0x7f0000005640)=""/144, 0x90}, {&(0x7f0000005700)=""/244, 0xf4}, {&(0x7f0000005800)=""/129, 0x81}], 0x5}, 0x6}, {{&(0x7f0000005900)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x80, &(0x7f0000006a00)=[{&(0x7f0000005980)=""/12, 0xc}, {&(0x7f00000059c0)=""/41, 0x29}, {&(0x7f0000005a00)=""/4096, 0x1000}], 0x3, &(0x7f0000006a40)=""/203, 0xcb}, 0xfff}], 0x4, 0x40000001, &(0x7f0000006bc0)) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000007040)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20a00000}, 0xc, &(0x7f0000007000)={&(0x7f0000006c00)={0x3f0, r2, 0x10c, 0x70bd25, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x160, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}, {0x8, 0x6, r6}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x6, 0x6ee, 0x31, 0x6}, {0x8, 0x3f, 0x6d1, 0x10001}, {0x4, 0x5, 0x0, 0xea}, {0x4, 0x4, 0x6}]}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0xfffffffffffffffb, 0x8, 0x9, 0x8}, {0x5, 0x8, 0xf85, 0xdb}, {0x0, 0x80, 0x8, 0x1}]}}}]}}, {{0x8, 0x1, r7}, {0xf4, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9ae}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x200}}}]}}, {{0x8, 0x1, r10}, {0x170, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x8, 0x474f09e8, 0x1, 0x6}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}]}}]}, 0x3f0}, 0x1, 0x0, 0x0, 0x11}, 0x800) 17:04:28 executing program 4 (fault-call:2 fault-nth:20): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:28 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\a', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:28 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\n', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:28 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:28 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0xd16, @mcast2, 0x1}], 0x48) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) [ 571.752083] FAULT_INJECTION: forcing a failure. [ 571.752083] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 571.801872] CPU: 0 PID: 13991 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 571.808953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.818310] Call Trace: [ 571.820921] dump_stack+0x172/0x1f0 [ 571.824564] should_fail.cold+0xa/0x1b [ 571.828462] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 571.833580] ? ___might_sleep+0x163/0x280 [ 571.837748] should_fail_alloc_page+0x50/0x60 [ 571.842259] __alloc_pages_nodemask+0x1a1/0x710 [ 571.846948] ? __alloc_pages_slowpath+0x2900/0x2900 [ 571.851985] ? ___might_sleep+0x163/0x280 [ 571.856160] ? copyin+0xb5/0x100 [ 571.859535] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 571.865093] alloc_pages_current+0x107/0x210 [ 571.869516] pipe_write+0xa65/0xfb0 [ 571.873163] __vfs_write+0x613/0x8e0 [ 571.876890] ? kernel_read+0x120/0x120 [ 571.880792] ? common_file_perm+0x1d6/0x6f0 [ 571.885131] ? apparmor_file_permission+0x25/0x30 [ 571.890020] ? rw_verify_area+0x118/0x360 [ 571.894182] vfs_write+0x20c/0x580 [ 571.897734] ksys_write+0xea/0x1f0 [ 571.901284] ? __ia32_sys_read+0xb0/0xb0 [ 571.905357] ? do_fast_syscall_32+0xd1/0xc98 [ 571.909779] ? entry_SYSENTER_compat+0x70/0x7f [ 571.914370] ? do_fast_syscall_32+0xd1/0xc98 [ 571.918794] __ia32_sys_write+0x71/0xb0 [ 571.922788] do_fast_syscall_32+0x281/0xc98 [ 571.927130] entry_SYSENTER_compat+0x70/0x7f [ 571.931545] RIP: 0023:0xf7fdf869 17:04:29 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x0f', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:29 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x80, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000200)={0x108000000000041}) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7, 0x200) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000180)={0xa1, 0x401, 0x3, 0xc7, 0x2}) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000080)=0x4) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) [ 571.934922] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 571.953839] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 571.961559] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 571.968839] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 571.976115] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 571.983396] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 571.990680] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:31 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:31 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetricH', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:31 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:31 executing program 4 (fault-call:2 fault-nth:21): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:31 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000080)={0x0, @local, @remote}, &(0x7f00000000c0)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'veth1_to_bridge\x00', r2}) 17:04:31 executing program 2: rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x81, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x4000, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:31 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetricL', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:31 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth0_to_hsr\x00', 0x5000}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:31 executing program 3: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x40}, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000100)=[@in6={0xa, 0x4e21, 0xa8, @local, 0xcb66}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e24, @rand_addr=0x2}], 0x3c) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) 17:04:31 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetrich', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 574.729043] FAULT_INJECTION: forcing a failure. [ 574.729043] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 574.789616] CPU: 1 PID: 14035 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 574.796421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 574.805800] Call Trace: [ 574.808405] dump_stack+0x172/0x1f0 [ 574.812045] should_fail.cold+0xa/0x1b [ 574.815946] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 574.821063] ? ___might_sleep+0x163/0x280 [ 574.825232] should_fail_alloc_page+0x50/0x60 [ 574.829737] __alloc_pages_nodemask+0x1a1/0x710 [ 574.834417] ? __alloc_pages_slowpath+0x2900/0x2900 17:04:31 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) [ 574.839452] ? ___might_sleep+0x163/0x280 [ 574.843645] ? copyin+0xb5/0x100 [ 574.847034] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 574.852595] alloc_pages_current+0x107/0x210 [ 574.857016] pipe_write+0xa65/0xfb0 [ 574.860674] __vfs_write+0x613/0x8e0 [ 574.864451] ? kernel_read+0x120/0x120 [ 574.868348] ? common_file_perm+0x1d6/0x6f0 [ 574.872693] ? apparmor_file_permission+0x25/0x30 [ 574.877556] ? rw_verify_area+0x118/0x360 [ 574.881719] vfs_write+0x20c/0x580 [ 574.885272] ksys_write+0xea/0x1f0 17:04:31 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) setsockopt$packet_int(r1, 0x107, 0x13, &(0x7f0000000080)=0x8, 0x4) [ 574.889112] ? __ia32_sys_read+0xb0/0xb0 [ 574.893184] ? do_fast_syscall_32+0xd1/0xc98 [ 574.897604] ? entry_SYSENTER_compat+0x70/0x7f [ 574.902216] ? do_fast_syscall_32+0xd1/0xc98 [ 574.906643] __ia32_sys_write+0x71/0xb0 [ 574.910644] do_fast_syscall_32+0x281/0xc98 [ 574.914993] entry_SYSENTER_compat+0x70/0x7f [ 574.919403] RIP: 0023:0xf7fdf869 [ 574.922773] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 574.941693] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 574.949413] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 574.956695] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 574.963971] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 574.971247] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 574.978524] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:34 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000080)={0x0, 0xff, 0x9, 0x8000, 0x40, 0x0, 0x2, 0xd339, {0x0, @in6={{0xa, 0x4e20, 0x2, @mcast2, 0xb1ee}}, 0x4, 0x463, 0xfff, 0x8, 0x100000000}}, &(0x7f0000000140)=0xb0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000180)={r2, 0x80000000, 0x311, [0x9, 0x30]}, 0x7e) signalfd4(r1, &(0x7f0000000240)={0x8}, 0x8, 0x800) ioctl$TIOCSTI(r1, 0x5412, 0x3) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000200)=@sha1={0x1, "74c25ca81caa93e5e442466715404fa71f9ba89a"}, 0x15, 0x2) 17:04:34 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'e0z'}, &(0x7f0000000080)='e0z', 0x3, 0x2) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:34 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetricl', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:34 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x529, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:34 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:34 executing program 4 (fault-call:2 fault-nth:22): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:34 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='a\xfa\xeeD\x01\r\xd9*\xb6c\x00', &(0x7f0000000140)={'e0z', 0x1}, &(0x7f0000000000)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56z`\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:34 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetrict', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:34 executing program 2: mkdir(0x0, 0x25) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x5, 0x4) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:34 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8) [ 577.792812] FAULT_INJECTION: forcing a failure. [ 577.792812] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 577.873670] CPU: 0 PID: 14092 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 577.880474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 577.890047] Call Trace: [ 577.892664] dump_stack+0x172/0x1f0 [ 577.896308] should_fail.cold+0xa/0x1b [ 577.900211] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 577.905327] ? ___might_sleep+0x163/0x280 [ 577.909494] should_fail_alloc_page+0x50/0x60 [ 577.913998] __alloc_pages_nodemask+0x1a1/0x710 [ 577.918694] ? __alloc_pages_slowpath+0x2900/0x2900 [ 577.923728] ? ___might_sleep+0x163/0x280 [ 577.927884] ? copyin+0xb5/0x100 [ 577.931349] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 577.936908] alloc_pages_current+0x107/0x210 [ 577.941328] pipe_write+0xa65/0xfb0 [ 577.941358] __vfs_write+0x613/0x8e0 [ 577.941376] ? kernel_read+0x120/0x120 [ 577.941394] ? common_file_perm+0x1d6/0x6f0 [ 577.948738] ? apparmor_file_permission+0x25/0x30 [ 577.948762] ? rw_verify_area+0x118/0x360 [ 577.948780] vfs_write+0x20c/0x580 [ 577.948799] ksys_write+0xea/0x1f0 [ 577.973028] ? __ia32_sys_read+0xb0/0xb0 [ 577.977103] ? do_fast_syscall_32+0xd1/0xc98 [ 577.981519] ? entry_SYSENTER_compat+0x70/0x7f [ 577.986108] ? do_fast_syscall_32+0xd1/0xc98 [ 577.990534] __ia32_sys_write+0x71/0xb0 [ 577.994522] do_fast_syscall_32+0x281/0xc98 [ 577.998856] entry_SYSENTER_compat+0x70/0x7f [ 578.003266] RIP: 0023:0xf7fdf869 17:04:35 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetricz', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:35 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x640c0, 0x0) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x6) openat$cgroup_ro(r0, &(0x7f0000000240)='cgroup.controllers\x00\xcdF\x11\x85\xd9\x1b\x97|\xa4\xd5\xf8\x88] \f\xb4*\x8b\xd0\xc1\xa0\x11G #C\xca\x89\xf9R\xc4\x9f\xbdnN*\xbe\x9e6\xc12In~\xfc\xd3\xa4\xde\xf7b\xba\x1f;\xfet\x88\xdf\x05\xec\x82c\xac\v\xf0\xc9\xfe=\b\xbc\xc5\xbcQ\b0\xd42V\x8b&\x9b}\x9b<\xa4j\xa8\xcd\xe4\xaa@\xbe\xb9\xae\xf5\x93j\x0e\xe3\xfd\xb9gp\x91[{~`\xe6\xb3\xdc\xb7\xc1|\x0e\x85\x16\r\x83\xeeBL#\xb0\x1d\x90\x02\x9f&G\xa9[z\x03\xb3\xe0\x1c3\x8a\xa4\xe9\xa6\t\xddKr\xcc\t\xceC\\\xf9\xc0\xc8\xb3\xe3*B\v-\x80h525\xe3\a\x0e4)\xf6w(23J\xa8\x93l\x8c\x86\x04\xfe\xc1\x9ci\xdf,%\xae\xb3\xf4\xa7\x1c-Wk\xa5i\xec\xad\xcd\xe69\xf7\x9a\\\xca\xf98\x18]\xff\xc5\x81<\xd8\a\x1fZ\xec*\x13\x13\x99\x89e\x1dZ\x9b>?]\xcc9^\xfe\xe2t\xa5\x8e\xd5\xb4z\xf0\xd11\x9e', 0x275a, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000000c0)="ec31f1538ac3b0689c78c0fd5f43403485f08f0e6b8e896dd701155dd204fa44e45f83594ba0e324fa0f768b6be800a6d01f4b236018dd732d7927434f96d179728f8a9ff9f46581599e3627946d7d710c914fe58c752ae4553617869061fd88ab68ecb082cb6e22097d7143ab3e34c92a30ba5048db7c130ba68ffa7fab45905bf48310f07ece3a1443ca1f688f27a1d7d3d65221910a87b3785adcbf6f159c0de7fcef550e38feecf2675a9736f5b837050df4d46da0a37634f753f186825d030d5c26eb3a011ff1e63ce7738b8e0f9388acbc8bbcd3b17e3e6dc533c5d0b63c037aa3aee02a762a55a16aa4383be48af8777ae83061a5da65e719c7a76b30") 17:04:35 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:35 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:35 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 578.006632] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 578.025825] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 578.033543] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 578.040822] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 578.048094] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 578.055366] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 578.062641] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:35 executing program 4 (fault-call:2 fault-nth:23): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 578.308582] FAULT_INJECTION: forcing a failure. [ 578.308582] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 578.320789] CPU: 1 PID: 14156 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 578.327544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 578.336887] Call Trace: [ 578.339487] dump_stack+0x172/0x1f0 [ 578.343125] should_fail.cold+0xa/0x1b [ 578.347023] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 578.352136] ? ___might_sleep+0x163/0x280 17:04:35 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x529, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:35 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:35 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000040)={0xa, 0x3, 0x8, 0x7fff}, 0xa) 17:04:35 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:35 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 578.356295] should_fail_alloc_page+0x50/0x60 [ 578.360793] __alloc_pages_nodemask+0x1a1/0x710 [ 578.365484] ? __alloc_pages_slowpath+0x2900/0x2900 [ 578.370540] ? ___might_sleep+0x163/0x280 [ 578.374701] ? copyin+0xb5/0x100 [ 578.378076] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 578.383626] alloc_pages_current+0x107/0x210 [ 578.388060] pipe_write+0xa65/0xfb0 [ 578.391713] __vfs_write+0x613/0x8e0 [ 578.395470] ? kernel_read+0x120/0x120 [ 578.399364] ? common_file_perm+0x1d6/0x6f0 [ 578.403705] ? apparmor_file_permission+0x25/0x30 [ 578.408566] ? rw_verify_area+0x118/0x360 [ 578.412727] vfs_write+0x20c/0x580 [ 578.416281] ksys_write+0xea/0x1f0 [ 578.419837] ? __ia32_sys_read+0xb0/0xb0 [ 578.423912] ? do_fast_syscall_32+0xd1/0xc98 [ 578.428330] ? entry_SYSENTER_compat+0x70/0x7f [ 578.433006] ? do_fast_syscall_32+0xd1/0xc98 [ 578.437429] __ia32_sys_write+0x71/0xb0 [ 578.441424] do_fast_syscall_32+0x281/0xc98 [ 578.445768] entry_SYSENTER_compat+0x70/0x7f [ 578.450181] RIP: 0023:0xf7fdf869 [ 578.453555] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 578.472470] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 578.480193] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 578.487477] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 578.494752] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 578.502022] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 17:04:35 executing program 3: syz_execute_func(&(0x7f00000002c0)="3666440f50f564ff0941c3c4e2c9975842794e2e3e420f3806d0450f74083e0f1110c442019dcc3e470f01d4") clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000100)=""/11, 0x3) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) mknod$loop(&(0x7f0000000200)='./file1\x00', 0x801, 0xffffffffffffffff) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x841, 0x0) clone(0x3102001ff3, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$PIO_CMAP(r2, 0x4b71, 0x0) 17:04:35 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000001880)=ANY=[@ANYBLOB="030103000001000110007617b3bdc803ddd53ca429d702607725e7cdf6ebdf7cd185bec035338b994023e4ad1045b22a68584ef0c82d32aac4119aa05891afdcdc412a8e85463a386a899935af105cc716c26aaa90a74490ad2fa95d92f002ec0efc8c3822f53ad0341cb1a0e512a61cb1a108f9eaea410f43bff2a45c3d9e444952604983ac8cefa501992d58fbe9642db868d886919f57697f03fe39d238cae6343b5ae757e35b802bbb13d988c588d326bd76f8f4911676641aed4e9886d585b0a299d899b92baf736d83e3082c018dd0ba89a65c26dedfb62fb7627d341154bfc3c8397072d3dc45946273335e146f7a36e754895491276698470ef795930768d27945604e2ae2579d5644b40b9df7b46c477a3ffe9884a4e1b0a1e691030feebd66805720eec2bbab3caf454f32a87f5902dd92bff8fb3f3279d0bdadcba85ae50f11dccd4fb2b6a09eb9580c3a57fdf10e3235089e1d8f4a690a296aaab3143ac8712e32a48d79c1d7c3b042fb237c3c9a4a11a8151ac2983465f67aea2e45a3375b1d83c587195b6e8bb94f0dfc90930f965a82a16701afef72b84f9c9aea5adff1fff7ce44113ad0e263295327f9b0b6315caf0034a82787bcda2b70d1c6ceeda919529caf600d12c860d47986448acab8061bdf135d396d9836c0a50e8719f443adc2e0b40bdd840dff6ecd5a955adb2c15cfd5da107fba8140da208f6ea0f462b7d9a8a2a64d4b23a36e4328396bd054470dd198ddf2a2f6121c42762e100e6dfde3a69686c22dacce7fd64d97ac991d49f6be32c8a3217608b7cebc7d9418e009912e5da2a01f5dcd3eb4a70fa037a2bd2bca08cc249d95d31d54813dbb6e3ab1bd1b8440e0bb172e9f815e71dc3ea6466ad7cd657c214ee8980ff20f5cb96bd0d0684b4d4e317488db28fb74f8ce9fb36b738eb44b06329c53f0668e3f6fecd7841126ae3ce859fc52854bab4622f5b469a25fec56cb7e110c87e617fb9cc52ee9e8232ae3f7bbd98ccb55e46dea9f4a214b869aa11d55875278d5c4e2cf140b676463c0ea28139ad0eefe09717e22fb159b6746ab34ee8d026c072dcd25c160502abd32f3da3aadfcedf9173429c889754fa1963863c188be5c92c0bf41560d73bd440561d6ab2313aa1331b7b76a94dbc25dc63d25abe1e0d3961160e50a901dd204c72b1654d41d2748f364e8a2359ab894f5e9ae17f261451d7a89e598f1e80d22a6236852a0701408ed8436ad384941bf66f081a2a932af6f1bd85d95c6352c9278a12b669e1a408e4c12394b2ac9cba77ec71eef22548482e08409aa6c021e2a2e53055e3fd6abed579d71a5f476a2a071174612c3a606998674b8502858f71b20c4197cc00d300422b246ad6d4403aabb5f48ee36c3ba11f91cc8082210a964e2082dd6a5954e0869d3782996acce6613af5ce162366bd859e9637d1aca5aada1178d9718e02966b7e4ff82716185d2e4b9b0b5651eceb3c804de421a2525b0aea801c3960145a11d8b784871ed871b7e73fa0d6cc921312d26fa642c7590cd3a4a4b2419af3a69f1ec8cfbda66f7e38381ad572ff5ac95e9e7c7a07cdd3c5fe2410c528636897e894add2da6c280eb1449197b6fe3e74319fcf23490dedfc882939d50217f7f471bb5f6a78c8568f4359918341e6dd7be2365f342dc59266d489d24ec2dd7fb93231826c7d6360beb4ecce8d87c9358e8a9c5d7226310fae2802d2e74b245047776c41bfebaff265d9741120214d0ff3f60db1d177dd68f51f8edd3d1ca5ebf2f09c7bb7b73959e5eb0e83bc92a95fbdc48d8bf50ada8d37ca3fb085934e782171f7bdf17e7bc2947036d969ea49fc7416253a92d6b5985afb6dc7589413174b320b2a3296466acbf52cbfe89160ed70983ec9f83afd6514705a68694dd5ac82ba2ab48f67ac8dcd7786f39d82686b6673717aeec4b04232ad75ebc5a541cefc4c912b05015cc7ed39746029411e2c94a3ecaa0eba16307864ceaf53d8e19f618fad0668710533ca506a73e7f30f51690a701bf86c45f892f1f4ceeed5145b5ca220b0728dd95ee1c57f6b4174d73f4751d08b018afe359b20eb71e8948909c466ddf730f6ca5d061d302cfd7a661b4204fd35ae234e6919ffec2a7b11c555f4c519a2748e0487d0d1917dcf5254ee19fb31271287e91bfccb1b5477aa0d5825279b97eb4c64f484593e90dccff3a81098cd7cb076fded8490b1de956abd4a3e9f3a80017726f04400effcbab4dfc426dcfe8bac5390eca8ec77fa2a31e651740dcfc1636307e3d64f66288e8cb48332114062862c0d5757eee060751b950ec6e4b36991f4ed1d708e38714227823d0b7c8a855cb763a7c2d7b980999965683e6d5b61312d8287e85f947f76107b04b243ff53493fca02076f052cb582e6a5e077d33fc99ecbc420db1cca41ee2feda9fb2e9ab83061af4d05d64493a4dd7f27ebffa3656db2fcf6dfb27328e6c2fd3b542601304ee4b6e52f47052f15726a8d0d5457be7679cdbc73817f7c61ef41382b144dc04a107b6c6ab3d030acc21e104b7dada485f897c0d989a8dc30ef9be2b1851dce2c4c132c973c25ec01204b1f7cda7d68506953c6f8a1e1ffe27ab1404c511c07eed01c1fc2ee2d0950a0c2b4c348a642e5bd76c7b770249cc3819425f199c4dc3de04fae060ffbbbcd04d60529cf31d101fe91c78eb84a4abf080914ec1f5640578d3818de459115553ecd6f06a6cd1b93122facef8792120a76d6007d37439c3e82970842c7fdbd5bccfdbeecf87ebaf5bd87799e5292bf1dee5d2951f2b20489d10e61a6b6d27f93ad2c2a4b2623ac14f84ed8c1760f95a1d1621304960e6d7bae2b61c58f165c1a76348ce85a8e723572af174f933f082e66db750d294cc3f46f0cbfa142705480bd4be368eb86dba9a90230ebc6054517ec196ff0d68f2892bb83c8ac5b723d654aa3f2b0b8c604987942205cb439a0521c72401cb28890a6b98343b3232d03c5486f7669eed59a0c76b0fda140bd8f6e3ecabde5fa6b2e3bf1aa31e30be7deaa1bb6cbc1997501313274a8dca6eccbbf65257ec2a67fb8deef7322896d5db5080946a84f7c20cd6757c148f8caf055e52965aa6d924320ac8fcb1c24e9b1d4085bfad3d04e9ab6a41258e67e7b468a71eeff0f0f4f8eaab84d056669fec7be441cb531eccb84a6e197418caa27f8fa01c0a898b4c072db1fbcbb1692521f98fb1a1fdf7e65c72be003868af634f526c71f38788c4ba3ce4c478a1e2c6c48c1eed45753483ce2eb9fb89fd7dc7b945e847e5737020393c73d48e618172069ba228704056f944becdb9fa2537b2f7459005285f818b1e904f94f6e617761e34f12bca97fa47460ff0a646606d5229f8ee306708a8ab7af2fba87d31ba181815a518c5f163b839ee116d3c283cb8bd818be360e7840df67a14d546f0bd50282edec0a84a259300ec02222b67bd47b6d402fb94983096b741f9d8367942725d440f6a7ee38e313e538de1347728c598675559c81fc6d951ad896e3b06ee67a27039f57e428ce411080994a14942ea44986c65d319151431bec3429a01fd23b3d5e38cf3fbf3f71dc15fd3f69aaae34641a1fc11a9d06b20205be871bd942f3f250f3c4de1570faf0098bc3c11860bf1b66a03c0db945fa417cccae2a368eaefb280ba098a25d25afa8bf7c21b78e26b60b9b84aa089b6e01c79b06f167e2918b8edf34ef6e52a7342e879866adf4b66a11b5fe31a698f148656e072417595577204c2ef9e976118358c8ccc8bee1b6c699367aec4ffccabc31acaa9c7edf3dc93d536228bf2106d3f02a9f74bbc00ea2e4fa5e5aa164d1c0b589b57669af017f32888f3fb361def580864e7118d4d4b5428fc165d4235e42113a88553a7e642820911c684395e2964c1b0b8c9d05c345e678b4c6a6cf4df9ef701c7cae017c6941801cf5811d72007333f562a8eac2811287ae699d4182a28895b85b8e9450087c761aa4eadba178a618176d8a44897e643fe2c3dd54ffa5bee6813a2b17387d6f83656dfa84daa133140e2ac45e87a8fce8b4394d72d000bf657a92c4099dbfa115ab64187e6299e1db1181f7ace7c842ae07bd6ba9f675706601b6831a4d7858f61d5179e38bdcd82dfdeef092edb3fb9e9365fbed09d8c0a1bed4dfef4b60f9204a704be438a797d15efe179e5386c99fd95a41711a1bcd4f88f0ec2da35dc5a1a3ddff15d5d0db19efbc5b9c4e9052490919ca6b110eb018596a229a563f06ceded79157b23f68f4fd0c10b6568ce6669f84a9130d93e3907a17619f88a121e0fd671fd6ce0e2c12268851196ecc890ad99ffeec9191ae06ab9989debf1387ba65d75cb136bb709bed2ad7d81ad56e08f807127fe68a0f99c87654047b9d1dcc140b922e75704f090b2568df60bf33bcb506bf3d90c6d55cb42e0cff8be5d1cc186378cf5ef60dfecf1540f87da7cf7220487ada70684878e6fac4eb9f38bc177c1d2e66a09ff144272a174235a42884f3d6a7742508997648347daf8e05bf9c3745c3219cb2984cc36652f69546fc8dda431bb9e600429ec2b6d0a919e2560e8f47acf8b5389365b636f5a297b503c3d34a76e05e3b3ee24e0705b1036edc8132e28fdbfe79c77cd1184bd960ff7571ab2ed45c13f3dc03817beb5e8f93e0489f4ea5bff70dbe731525d760426dab803b9ecbf1a77387d19880375298a145183a8d01dde22217fc77c46e6e83f193491039faaaf357f608f117a94bf03b667a613bad051632951b26657c274a5205d282badad02864f05b75a926e538a24f40b24614313e140adabf6d08cf70ae6d8035b5b4fb61d78bb65a4da9a100ea2dea270b141c4326805fe6713f5e6a03689edb59722e1c5f86828e52415fbfa5378df2ee5b8215581ca7a10c92f5488aee63d584b893325c2802df976fe0b6365ca7e1e2c17e43d7db6410ca53b8616c806dbbfaf1a36e25aea51c3941331ae0bb21154d3df2cd36593cc14ea9e3650f0d7fe73ecf99b4bf1b7651b0f7873a5a1fbfe1e7030d03abc52b01990a3ee54933b9a2d0cfbfcbc45d3773f1538ace080f5f6e3ab491c2829d778df41c75e2faea4e21f4f822dca23a71569a5ec49d8ab07220b191bcea5c4cf31501de0fd8d691f5ff1a5eba98f9c30f228804f4d86c430339a29198ee447716e3c6c295a1b1ad18e0a122b5c2ec1ab664394bb7e2f858d3578266ebb6e27378e13225b4766ee315f1398b0a9652c058d63a75aaeb87cf7caa7d87f7ae5b5881a7e721a21ef351fc84b21bec48eaa4d0d5adfc2edb2a4706c74e541789304af728208fdd9885b88ce05ccd41e69c40b25ee5a5f2f11d740c7aea6192435f79d5cf338b86e74365aef7ccb152fb56bc91613eee27f924ab34b5ba505c5c4cfbeeeca4a79cce36d7ea02fd90f91d463a97e1e24224214b57c3015fc974f86f3a036e69a3eb4fc1cbd2a9d51b12dd0164eb8e93a52fe4cf7c2d20b1d0f69ca42f0b899273cfb4130c5b90f51da5a0b66fce6ef0606d93b92f214494ca45b8477cd83509f8476273fc8e920594491c66161fa71b295b36e6c9e7a5f28f14d7ead8927ad297cfb98641790d523d5a33aceb64908a7e15ffecd954519e3ea13d3b7df6be4251b00cf15a4237754da05c9eb6de3adedc5a445e440432a8f35a0043c5544dde7d7ccd48aa7cbc8c49c5ef14e6a534d1c190b7b66fdf980479107866fc27238e341ff659bc5f65fd187de1d9d2082810934b2c2ed1689d434ed6bb17fe5d9e042436b2e78870c97e4d92a8745fdb764c856dc32aeec9dcc98884b65f71d35ab956a766dbb9ed9403b3911c562134fbecae156bb7025c3f2cd997355a6a08623aaf1f17b6709000767e8a46fc91d2c87ea048d79af03a908ec3372a1c5ff493e4d91e2be4d3a5aaa50d747e1"], 0x100a, 0x1) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) r1 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x4, 0x2000) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000200)=0x1ff, 0x2) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x100, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000180)={@rand_addr=0x400, @remote, r3}, 0xc) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x40) 17:04:35 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 578.509295] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:35 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:35 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="dc7d76a8647ffaadc5109230f1f6338bfc26199392f97b5d666dcede4b6c94a5b89ff49b2a23e8e1b5", 0x29) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000080)={0x1, [0x8]}, &(0x7f00000000c0)=0x6) 17:04:35 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:35 executing program 4 (fault-call:2 fault-nth:24): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 578.818767] FAULT_INJECTION: forcing a failure. [ 578.818767] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 578.830780] CPU: 1 PID: 14219 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 578.837534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 578.846890] Call Trace: [ 578.849470] dump_stack+0x172/0x1f0 [ 578.853084] should_fail.cold+0xa/0x1b [ 578.856960] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 578.862051] ? ___might_sleep+0x163/0x280 [ 578.866192] should_fail_alloc_page+0x50/0x60 [ 578.870681] __alloc_pages_nodemask+0x1a1/0x710 [ 578.875351] ? __alloc_pages_slowpath+0x2900/0x2900 [ 578.880353] ? ___might_sleep+0x163/0x280 [ 578.884486] ? copyin+0xb5/0x100 [ 578.888087] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 578.893628] alloc_pages_current+0x107/0x210 [ 578.898047] pipe_write+0xa65/0xfb0 [ 578.901683] __vfs_write+0x613/0x8e0 [ 578.905387] ? kernel_read+0x120/0x120 [ 578.909276] ? common_file_perm+0x1d6/0x6f0 [ 578.913621] ? apparmor_file_permission+0x25/0x30 [ 578.918478] ? rw_verify_area+0x118/0x360 [ 578.922622] vfs_write+0x20c/0x580 [ 578.926150] ksys_write+0xea/0x1f0 [ 578.929684] ? __ia32_sys_read+0xb0/0xb0 [ 578.933734] ? do_fast_syscall_32+0xd1/0xc98 [ 578.938138] ? entry_SYSENTER_compat+0x70/0x7f [ 578.942707] ? do_fast_syscall_32+0xd1/0xc98 [ 578.947114] __ia32_sys_write+0x71/0xb0 [ 578.951076] do_fast_syscall_32+0x281/0xc98 [ 578.955386] entry_SYSENTER_compat+0x70/0x7f [ 578.959783] RIP: 0023:0xf7fdf869 [ 578.963132] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 578.982028] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 578.989740] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 578.997010] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 578.997022] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 579.011560] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 17:04:36 executing program 1: r0 = syz_open_dev$adsp(0x0, 0x529, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:36 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x8000, 0x0) write$P9_RSTAT(r1, &(0x7f0000000180)={0x59, 0x7d, 0x2, {0x0, 0x52, 0xc8, 0x54, {0x10, 0x0, 0x5}, 0x40010000, 0x7fffffff, 0x7, 0x241d1a43, 0x1, '$', 0xb, '*%selinux$}', 0x8, 'keyring\x00', 0xb, 'asymmetric\x00'}}, 0x59) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) pkey_alloc(0x0, 0x3) keyctl$reject(0x13, r0, 0x7, 0x1ff, r2) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:36 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000780)='io\x00[\xfcW\x16\x9b\xab\xeeT\xed\x16\xe3\x9ez\x8f\xe4\xb9\x00\x16\xf2f\xe3\xf64\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:36 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:36 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:36 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200000, 0x0) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000040)={0x4, 0x100, 0x4, {0x8, 0x6, 0x2, 0x1}}) [ 579.011570] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:36 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:36 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x80) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r1, 0x400, 0x70bd25, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20000005) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:36 executing program 4 (fault-call:2 fault-nth:25): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:36 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:36 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 579.334119] FAULT_INJECTION: forcing a failure. [ 579.334119] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 579.353683] CPU: 0 PID: 14278 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 579.360462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.369820] Call Trace: [ 579.372422] dump_stack+0x172/0x1f0 [ 579.376072] should_fail.cold+0xa/0x1b [ 579.379976] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 579.385091] ? ___might_sleep+0x163/0x280 [ 579.389249] should_fail_alloc_page+0x50/0x60 [ 579.393753] __alloc_pages_nodemask+0x1a1/0x710 [ 579.398436] ? __alloc_pages_slowpath+0x2900/0x2900 [ 579.403459] ? ___might_sleep+0x163/0x280 [ 579.407615] ? copyin+0xb5/0x100 [ 579.411002] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 579.416558] alloc_pages_current+0x107/0x210 [ 579.420997] pipe_write+0xa65/0xfb0 [ 579.424661] __vfs_write+0x613/0x8e0 [ 579.428396] ? kernel_read+0x120/0x120 [ 579.432295] ? common_file_perm+0x1d6/0x6f0 [ 579.436635] ? apparmor_file_permission+0x25/0x30 [ 579.441503] ? rw_verify_area+0x118/0x360 [ 579.445673] vfs_write+0x20c/0x580 [ 579.449275] ksys_write+0xea/0x1f0 [ 579.452802] ? __ia32_sys_read+0xb0/0xb0 [ 579.456867] ? do_fast_syscall_32+0xd1/0xc98 [ 579.461260] ? entry_SYSENTER_compat+0x70/0x7f [ 579.465873] ? do_fast_syscall_32+0xd1/0xc98 [ 579.470271] __ia32_sys_write+0x71/0xb0 [ 579.474231] do_fast_syscall_32+0x281/0xc98 [ 579.478539] entry_SYSENTER_compat+0x70/0x7f [ 579.482927] RIP: 0023:0xf7fdf869 [ 579.486284] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 579.505177] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 579.512868] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 579.520119] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 579.527388] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 579.534644] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 579.541908] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:36 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x0, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:36 executing program 3: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', 'em1', 0x20, 0xdfc}, 0x18, 0xfffffffffffffffd) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 17:04:36 executing program 2: mkdir(0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) fremovexattr(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000d00)=ANY=[@ANYBLOB="06000040", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000dc0)={r2, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x7, 0x3}, 0x88) r3 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x0, 0xfffffffd}, 0xc, &(0x7f0000000140)={&(0x7f0000000e80)=ANY=[@ANYBLOB="4500b091e5fb02a45fcbf9c9c86a32e1286ec7ad5269a445251954d4895f2b460900006602899f17bf3243d03db2717aeb5719ee70dd179bc6dd3954c3031659eab8d6efefa19fbc9994b538b6dfbd04004a0ae36b231be666702002f91846b4c756915faf2b7b097d23b2529aa0f02f2a2dba77fb970044de7191c085dc05cf52d7335bf8410d79557dc5b3261599c74301d2e70a8ab828b8f3597fbc2c90fc2962b521e4ec66cf07826b6f46f5104c7ad9cca429a4000000000000000000000000002c52b5f40cb07010a3fac96863cb8717093206ed392afda81df62a2dd204f2a45c5defca2bd8ca49dffbb42977d07bf2df398b8d8d965f3128b8a6ebac0cbd55aa9d0fcaf16417"], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r3, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000c80)=ANY=[@ANYBLOB="00000000010400bfe3b9f7435306e5000000000000000000090000002857fcbe3ca0034aaa822ad733d60eaed047e26646c75b2fd4fb99b785b4f31d5e5ba1ebe9e9180200330f2c09"]) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000d40)={0x0, 0xfffffffffffffffc, 0x0, 0x10001, @scatter={0x6, 0x0, &(0x7f0000000480)=[{&(0x7f00000005c0)=""/188, 0xbc}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000980)=""/215, 0xd7}, {&(0x7f0000000300)=""/25, 0x19}, {0x0}, {&(0x7f0000001600)=""/4096, 0x1000}]}, &(0x7f0000000b80), 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000003c0)=""/67) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000500), 0x4) openat$cgroup_procs(r4, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYPTR64=&(0x7f0000000fc0)=ANY=[@ANYBLOB="44fffd88f113d2d58c1bc67101bd85d2a535b2270331c0566a6ca05632f81a941fbd4370cacf3b7c69184894bec31f88fad05b48c5ab6811a9339e67f98efade0a098daebe9c9939f58c9840f49f1e602050f16afd3a05cf090045e3ad41c3bc39c9e4f44d3a085ebe248b"]], @ANYRES64=r0, @ANYRES32=r4], 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) ioctl$IMSETDEVNAME(r3, 0x80184947, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x800}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x400000000000000) rmdir(0x0) 17:04:36 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:36 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:36 executing program 4 (fault-call:2 fault-nth:26): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:36 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e000000220005000000c187185095cf0400b0eba0b4d65c0000000051894d5d1dac000000000000000000000000", 0x2e}], 0x1}, 0x0) 17:04:36 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:36 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 579.787845] FAULT_INJECTION: forcing a failure. [ 579.787845] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 579.804418] CPU: 1 PID: 14310 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 579.807733] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.3'. [ 579.811204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.811210] Call Trace: [ 579.811237] dump_stack+0x172/0x1f0 [ 579.811263] should_fail.cold+0xa/0x1b [ 579.839241] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 579.844366] ? ___might_sleep+0x163/0x280 [ 579.848526] should_fail_alloc_page+0x50/0x60 [ 579.853033] __alloc_pages_nodemask+0x1a1/0x710 [ 579.857708] ? __alloc_pages_slowpath+0x2900/0x2900 [ 579.857725] ? ___might_sleep+0x163/0x280 [ 579.857742] ? copyin+0xb5/0x100 [ 579.857760] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 579.857781] alloc_pages_current+0x107/0x210 [ 579.857801] pipe_write+0xa65/0xfb0 [ 579.857828] __vfs_write+0x613/0x8e0 [ 579.857847] ? kernel_read+0x120/0x120 [ 579.857867] ? common_file_perm+0x1d6/0x6f0 [ 579.887614] ? apparmor_file_permission+0x25/0x30 [ 579.887639] ? rw_verify_area+0x118/0x360 [ 579.887669] vfs_write+0x20c/0x580 [ 579.887689] ksys_write+0xea/0x1f0 [ 579.887706] ? __ia32_sys_read+0xb0/0xb0 [ 579.895903] ? do_fast_syscall_32+0xd1/0xc98 [ 579.895919] ? entry_SYSENTER_compat+0x70/0x7f [ 579.895935] ? do_fast_syscall_32+0xd1/0xc98 [ 579.895955] __ia32_sys_write+0x71/0xb0 [ 579.895974] do_fast_syscall_32+0x281/0xc98 [ 579.895992] entry_SYSENTER_compat+0x70/0x7f [ 579.912006] RIP: 0023:0xf7fdf869 [ 579.912022] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 579.912030] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 579.912045] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 579.912054] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 17:04:37 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:37 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 579.912063] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 579.912072] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 579.912080] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:37 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:37 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x0, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:37 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='pids.current\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) set_mempolicy(0x8003, &(0x7f0000000100)=0x5718fe8f, 0x5) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f0000000000)={{&(0x7f00005e3000/0x800000)=nil, 0x800000}, 0x200000}) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000400)}, 0x8040) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.capability\x00', 0x0, 0x0, 0x0) 17:04:37 executing program 2: mkdir(0x0, 0x0) rmdir(0x0) pivot_root(&(0x7f0000000000)='\x00', &(0x7f0000000040)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(0xffffffffffffffff, 0x81785501, 0x0) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000140)='e0z', 0xfffffffffffffffd) clone(0x300000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:37 executing program 4 (fault-call:2 fault-nth:27): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:37 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:37 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) 17:04:37 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\xff', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:37 executing program 2: open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) clone(0x1100002122001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x1f, 0x0, 0x0, 0xfffffffffffffffb}]}) 17:04:37 executing program 3: mkdir(0x0, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) fremovexattr(0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000d00)=ANY=[@ANYBLOB="06000040", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000dc0)={r2, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x7, 0x3}, 0x88) r3 = dup2(r1, r1) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x0, 0xfffffffd}, 0xc, &(0x7f0000000140)={&(0x7f0000000e80)=ANY=[@ANYBLOB="4500b091e5fb02a45fcbf9c9c86a32e1286ec7ad5269a445251954d4895f2b460900006602899f17bf3243d03db2717aeb5719ee70dd179bc6dd3954c3031659eab8d6efefa19fbc9994b538b6dfbd04004a0ae36b231be666702002f91846b4c756915faf2b7b097d23b2529aa0f02f2a2dba77fb970044de7191c085dc05cf52d7335bf8410d79557dc5b3261599c74301d2e70a8ab828b8f3597fbc2c90fc2962b521e4ec66cf07826b6f46f5104c7ad9cca429a4000000000000000000000000002c52b5f40cb07010a3fac96863cb8717093206ed392afda81df62a2dd204f2a45c5defca2bd8ca49dffbb42977d07bf2df398b8d8d965f3128b8a6ebac0cbd55aa9d0fcaf16417"], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r3, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[]}}, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r1, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000c80)=ANY=[@ANYBLOB="00000000010400bfe3b9f7435306e5000000000000000000090000002857fcbe3ca0034aaa822ad733d60eaed047e26646c75b2fd4fb99b785b4f31d5e5ba1ebe9e9180200330f2c09"]) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000d40)={0x0, 0xfffffffffffffffc, 0x0, 0x10001, @scatter={0x6, 0x0, &(0x7f0000000480)=[{&(0x7f00000005c0)=""/188, 0xbc}, {&(0x7f00000001c0)=""/32, 0x20}, {&(0x7f0000000980)=""/215, 0xd7}, {&(0x7f0000000300)=""/25, 0x19}, {0x0}, {&(0x7f0000001600)=""/4096, 0x1000}]}, &(0x7f0000000b80), 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000003c0)=""/67) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000500), 0x4) openat$cgroup_procs(r4, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYPTR64=&(0x7f0000000fc0)=ANY=[@ANYBLOB="44fffd88f113d2d58c1bc67101bd85d2a535b2270331c0566a6ca05632f81a941fbd4370cacf3b7c69184894bec31f88fad05b48c5ab6811a9339e67f98efade0a098daebe9c9939f58c9840f49f1e602050f16afd3a05cf090045e3ad41c3bc39c9e4f44d3a085ebe248b"]], @ANYRES64=r0, @ANYRES32=r4], 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) ioctl$IMSETDEVNAME(r3, 0x80184947, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x800}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x400000000000000) rmdir(0x0) [ 580.511854] FAULT_INJECTION: forcing a failure. [ 580.511854] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 580.549297] CPU: 1 PID: 14372 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 580.556096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.565462] Call Trace: [ 580.568074] dump_stack+0x172/0x1f0 [ 580.571724] should_fail.cold+0xa/0x1b [ 580.575671] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 580.580792] ? ___might_sleep+0x163/0x280 [ 580.584953] should_fail_alloc_page+0x50/0x60 [ 580.589469] __alloc_pages_nodemask+0x1a1/0x710 [ 580.594152] ? __alloc_pages_slowpath+0x2900/0x2900 [ 580.599179] ? ___might_sleep+0x163/0x280 [ 580.603341] ? copyin+0xb5/0x100 [ 580.606719] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 580.612270] alloc_pages_current+0x107/0x210 [ 580.616702] pipe_write+0xa65/0xfb0 [ 580.620358] __vfs_write+0x613/0x8e0 [ 580.624083] ? kernel_read+0x120/0x120 [ 580.627980] ? common_file_perm+0x1d6/0x6f0 [ 580.632317] ? apparmor_file_permission+0x25/0x30 [ 580.637168] ? rw_verify_area+0x118/0x360 [ 580.641329] vfs_write+0x20c/0x580 [ 580.644882] ksys_write+0xea/0x1f0 [ 580.648439] ? __ia32_sys_read+0xb0/0xb0 [ 580.652516] ? do_fast_syscall_32+0xd1/0xc98 [ 580.656937] ? entry_SYSENTER_compat+0x70/0x7f 17:04:37 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 580.661531] ? do_fast_syscall_32+0xd1/0xc98 [ 580.665960] __ia32_sys_write+0x71/0xb0 [ 580.669945] do_fast_syscall_32+0x281/0xc98 [ 580.674280] entry_SYSENTER_compat+0x70/0x7f [ 580.678690] RIP: 0023:0xf7fdf869 [ 580.682059] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 580.701052] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 17:04:37 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:37 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 580.701067] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 580.701076] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 580.701084] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 580.701093] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 580.701101] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:38 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x0, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:38 executing program 2: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:38 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:38 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:38 executing program 4 (fault-call:2 fault-nth:28): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:38 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:38 executing program 3: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:38 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:38 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:38 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:38 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0xd16, @mcast2, 0x1}], 0x48) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) 17:04:38 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 581.272848] FAULT_INJECTION: forcing a failure. [ 581.272848] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 581.291491] CPU: 1 PID: 14445 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 581.298266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 581.307621] Call Trace: [ 581.310262] dump_stack+0x172/0x1f0 [ 581.313904] should_fail.cold+0xa/0x1b [ 581.317807] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 581.322926] ? ___might_sleep+0x163/0x280 [ 581.327091] should_fail_alloc_page+0x50/0x60 [ 581.331596] __alloc_pages_nodemask+0x1a1/0x710 [ 581.336285] ? __alloc_pages_slowpath+0x2900/0x2900 [ 581.341321] ? ___might_sleep+0x163/0x280 [ 581.345522] ? copyin+0xb5/0x100 [ 581.348907] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 581.354486] alloc_pages_current+0x107/0x210 [ 581.358914] pipe_write+0xa65/0xfb0 [ 581.362565] __vfs_write+0x613/0x8e0 [ 581.366289] ? kernel_read+0x120/0x120 [ 581.370182] ? common_file_perm+0x1d6/0x6f0 [ 581.374523] ? apparmor_file_permission+0x25/0x30 [ 581.379376] ? rw_verify_area+0x118/0x360 [ 581.383530] vfs_write+0x20c/0x580 [ 581.387083] ksys_write+0xea/0x1f0 [ 581.390635] ? __ia32_sys_read+0xb0/0xb0 [ 581.394709] ? do_fast_syscall_32+0xd1/0xc98 [ 581.399134] ? entry_SYSENTER_compat+0x70/0x7f [ 581.403725] ? do_fast_syscall_32+0xd1/0xc98 [ 581.408145] __ia32_sys_write+0x71/0xb0 [ 581.412210] do_fast_syscall_32+0x281/0xc98 [ 581.416534] entry_SYSENTER_compat+0x70/0x7f [ 581.420940] RIP: 0023:0xf7fdf869 [ 581.424308] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 581.443215] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 581.450925] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 581.458183] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 581.465434] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 581.472699] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 581.479965] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:38 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:38 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:38 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:38 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0xd16, @mcast2, 0x1}], 0x48) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) 17:04:38 executing program 4 (fault-call:2 fault-nth:29): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:38 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:38 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0xd16, @mcast2, 0x1}], 0x48) openat$cgroup_ro(r0, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) [ 581.685043] FAULT_INJECTION: forcing a failure. [ 581.685043] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 581.735591] CPU: 0 PID: 14479 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 581.742421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 581.751773] Call Trace: [ 581.751799] dump_stack+0x172/0x1f0 [ 581.751825] should_fail.cold+0xa/0x1b [ 581.758018] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 581.758036] ? ___might_sleep+0x163/0x280 [ 581.758063] should_fail_alloc_page+0x50/0x60 [ 581.775637] __alloc_pages_nodemask+0x1a1/0x710 [ 581.780328] ? __alloc_pages_slowpath+0x2900/0x2900 [ 581.785350] ? ___might_sleep+0x163/0x280 [ 581.789509] ? copyin+0xb5/0x100 [ 581.792889] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 581.798443] alloc_pages_current+0x107/0x210 [ 581.802861] pipe_write+0xa65/0xfb0 [ 581.806511] __vfs_write+0x613/0x8e0 [ 581.810235] ? kernel_read+0x120/0x120 [ 581.814130] ? common_file_perm+0x1d6/0x6f0 [ 581.818467] ? apparmor_file_permission+0x25/0x30 [ 581.823328] ? rw_verify_area+0x118/0x360 [ 581.827488] vfs_write+0x20c/0x580 [ 581.831046] ksys_write+0xea/0x1f0 17:04:38 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0xd16, @mcast2, 0x1}], 0x48) 17:04:38 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0xd16, @mcast2, 0x1}], 0x48) [ 581.834593] ? __ia32_sys_read+0xb0/0xb0 [ 581.838669] ? do_fast_syscall_32+0xd1/0xc98 [ 581.843084] ? entry_SYSENTER_compat+0x70/0x7f [ 581.847685] ? do_fast_syscall_32+0xd1/0xc98 [ 581.852110] __ia32_sys_write+0x71/0xb0 [ 581.856094] do_fast_syscall_32+0x281/0xc98 [ 581.860427] entry_SYSENTER_compat+0x70/0x7f [ 581.864833] RIP: 0023:0xf7fdf869 [ 581.868193] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 581.887081] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 581.894779] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 581.902032] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 581.909371] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 581.916641] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 581.923901] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:41 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:41 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0xd16, @mcast2, 0x1}], 0x48) 17:04:41 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:41 executing program 4 (fault-call:2 fault-nth:30): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:41 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:41 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:41 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:41 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0xd16, @mcast2, 0x1}], 0x48) [ 584.353936] FAULT_INJECTION: forcing a failure. [ 584.353936] name fail_page_alloc, interval 1, probability 0, space 0, times 0 17:04:41 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 584.414080] CPU: 1 PID: 14508 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 584.420883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.430241] Call Trace: [ 584.432840] dump_stack+0x172/0x1f0 [ 584.436490] should_fail.cold+0xa/0x1b [ 584.440396] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 584.445516] ? ___might_sleep+0x163/0x280 [ 584.449689] should_fail_alloc_page+0x50/0x60 [ 584.454194] __alloc_pages_nodemask+0x1a1/0x710 [ 584.458872] ? __alloc_pages_slowpath+0x2900/0x2900 [ 584.463905] ? ___might_sleep+0x163/0x280 [ 584.468068] ? copyin+0xb5/0x100 [ 584.471453] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 584.477004] alloc_pages_current+0x107/0x210 [ 584.481430] pipe_write+0xa65/0xfb0 [ 584.485079] __vfs_write+0x613/0x8e0 [ 584.488807] ? kernel_read+0x120/0x120 [ 584.492714] ? common_file_perm+0x1d6/0x6f0 [ 584.497054] ? apparmor_file_permission+0x25/0x30 [ 584.501910] ? rw_verify_area+0x118/0x360 [ 584.506067] vfs_write+0x20c/0x580 [ 584.509621] ksys_write+0xea/0x1f0 17:04:41 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 584.513176] ? __ia32_sys_read+0xb0/0xb0 [ 584.517249] ? do_fast_syscall_32+0xd1/0xc98 [ 584.521694] ? entry_SYSENTER_compat+0x70/0x7f [ 584.526283] ? do_fast_syscall_32+0xd1/0xc98 [ 584.530703] __ia32_sys_write+0x71/0xb0 [ 584.530723] do_fast_syscall_32+0x281/0xc98 [ 584.530744] entry_SYSENTER_compat+0x70/0x7f [ 584.530756] RIP: 0023:0xf7fdf869 17:04:41 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0xd16, @mcast2, 0x1}], 0x48) [ 584.530772] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 584.539046] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 584.539060] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 584.539069] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 584.539078] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 584.539086] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 584.539095] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:41 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:41 executing program 2: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) 17:04:41 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0xd16, @mcast2, 0x1}], 0x48) 17:04:41 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:41 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:41 executing program 4 (fault-call:2 fault-nth:31): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:41 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:42 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0xd16, @mcast2, 0x1}], 0x48) [ 584.993903] FAULT_INJECTION: forcing a failure. [ 584.993903] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 585.050630] CPU: 0 PID: 14558 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 585.057437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.066797] Call Trace: [ 585.069400] dump_stack+0x172/0x1f0 [ 585.073045] should_fail.cold+0xa/0x1b [ 585.076960] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 585.082083] ? ___might_sleep+0x163/0x280 [ 585.086277] should_fail_alloc_page+0x50/0x60 [ 585.090780] __alloc_pages_nodemask+0x1a1/0x710 [ 585.095475] ? __alloc_pages_slowpath+0x2900/0x2900 17:04:42 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x0, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:42 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) [ 585.095493] ? ___might_sleep+0x163/0x280 [ 585.104646] ? copyin+0xb5/0x100 [ 585.104674] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 585.104694] alloc_pages_current+0x107/0x210 [ 585.104714] pipe_write+0xa65/0xfb0 [ 585.104740] __vfs_write+0x613/0x8e0 [ 585.125359] ? kernel_read+0x120/0x120 [ 585.129259] ? common_file_perm+0x1d6/0x6f0 [ 585.133596] ? apparmor_file_permission+0x25/0x30 [ 585.138462] ? rw_verify_area+0x118/0x360 [ 585.138482] vfs_write+0x20c/0x580 [ 585.138503] ksys_write+0xea/0x1f0 [ 585.138521] ? __ia32_sys_read+0xb0/0xb0 [ 585.138539] ? do_fast_syscall_32+0xd1/0xc98 [ 585.158203] ? entry_SYSENTER_compat+0x70/0x7f [ 585.158221] ? do_fast_syscall_32+0xd1/0xc98 [ 585.158244] __ia32_sys_write+0x71/0xb0 [ 585.158262] do_fast_syscall_32+0x281/0xc98 [ 585.158281] entry_SYSENTER_compat+0x70/0x7f [ 585.179932] RIP: 0023:0xf7fdf869 17:04:42 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 585.183311] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 585.202228] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 585.209954] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 585.217225] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 585.224500] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 585.231777] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 585.239051] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:42 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:42 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0xd16, @mcast2, 0x1}], 0x48) 17:04:42 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:42 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:42 executing program 4 (fault-call:2 fault-nth:32): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:42 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r1 = syz_open_dev$audion(0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:42 executing program 3: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0xd16, @mcast2, 0x1}], 0x48) 17:04:42 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\xff', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 585.548662] FAULT_INJECTION: forcing a failure. [ 585.548662] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 585.600226] CPU: 0 PID: 14622 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 585.607033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.616393] Call Trace: [ 585.619000] dump_stack+0x172/0x1f0 [ 585.622643] should_fail.cold+0xa/0x1b [ 585.626559] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 585.631684] ? ___might_sleep+0x163/0x280 [ 585.635848] should_fail_alloc_page+0x50/0x60 [ 585.640353] __alloc_pages_nodemask+0x1a1/0x710 [ 585.645038] ? __alloc_pages_slowpath+0x2900/0x2900 [ 585.650059] ? ___might_sleep+0x163/0x280 [ 585.650077] ? copyin+0xb5/0x100 [ 585.650095] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 585.663122] alloc_pages_current+0x107/0x210 [ 585.663143] pipe_write+0xa65/0xfb0 [ 585.663169] __vfs_write+0x613/0x8e0 [ 585.674882] ? kernel_read+0x120/0x120 [ 585.678782] ? common_file_perm+0x1d6/0x6f0 [ 585.683118] ? apparmor_file_permission+0x25/0x30 [ 585.688013] ? rw_verify_area+0x118/0x360 [ 585.692178] vfs_write+0x20c/0x580 [ 585.695748] ksys_write+0xea/0x1f0 [ 585.699276] ? __ia32_sys_read+0xb0/0xb0 [ 585.703417] ? do_fast_syscall_32+0xd1/0xc98 [ 585.707815] ? entry_SYSENTER_compat+0x70/0x7f [ 585.712396] ? do_fast_syscall_32+0xd1/0xc98 [ 585.716800] __ia32_sys_write+0x71/0xb0 [ 585.720761] do_fast_syscall_32+0x281/0xc98 [ 585.725075] entry_SYSENTER_compat+0x70/0x7f [ 585.729468] RIP: 0023:0xf7fdf869 [ 585.732819] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 585.751809] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 585.759521] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 585.766788] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 585.774041] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 585.781294] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 585.788550] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:42 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(0xffffffffffffffff, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:42 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) 17:04:42 executing program 3: socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0xd16, @mcast2, 0x1}], 0x48) 17:04:42 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:42 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\xfe', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:42 executing program 4 (fault-call:2 fault-nth:33): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:42 executing program 3: socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0xd16, @mcast2, 0x1}], 0x48) 17:04:43 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:43 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) [ 586.017095] FAULT_INJECTION: forcing a failure. [ 586.017095] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 586.074204] CPU: 1 PID: 14662 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 586.081004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.090542] Call Trace: [ 586.093161] dump_stack+0x172/0x1f0 [ 586.096802] should_fail.cold+0xa/0x1b [ 586.100692] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 586.105792] ? ___might_sleep+0x163/0x280 [ 586.109985] should_fail_alloc_page+0x50/0x60 [ 586.114492] __alloc_pages_nodemask+0x1a1/0x710 [ 586.119149] ? __alloc_pages_slowpath+0x2900/0x2900 [ 586.124161] ? ___might_sleep+0x163/0x280 [ 586.128308] ? copyin+0xb5/0x100 [ 586.131684] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 586.137211] alloc_pages_current+0x107/0x210 [ 586.141608] pipe_write+0xa65/0xfb0 [ 586.145247] __vfs_write+0x613/0x8e0 [ 586.148963] ? kernel_read+0x120/0x120 [ 586.152841] ? common_file_perm+0x1d6/0x6f0 [ 586.157154] ? apparmor_file_permission+0x25/0x30 [ 586.162018] ? rw_verify_area+0x118/0x360 [ 586.166158] vfs_write+0x20c/0x580 [ 586.169701] ksys_write+0xea/0x1f0 [ 586.173234] ? __ia32_sys_read+0xb0/0xb0 [ 586.177286] ? do_fast_syscall_32+0xd1/0xc98 [ 586.181690] ? entry_SYSENTER_compat+0x70/0x7f [ 586.186257] ? do_fast_syscall_32+0xd1/0xc98 [ 586.190674] __ia32_sys_write+0x71/0xb0 [ 586.194681] do_fast_syscall_32+0x281/0xc98 [ 586.198995] entry_SYSENTER_compat+0x70/0x7f [ 586.203386] RIP: 0023:0xf7fdf869 [ 586.206738] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 586.225633] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 586.233364] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 586.240641] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 586.247927] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 586.255202] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 586.262484] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:45 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r1 = syz_open_dev$audion(0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:45 executing program 3: socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}, @in={0x2, 0x4e20, @local}, @in6={0xa, 0x4e21, 0xd16, @mcast2, 0x1}], 0x48) 17:04:45 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:45 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:45 executing program 4 (fault-call:2 fault-nth:34): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:45 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000080), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) read$FUSE(0xffffffffffffffff, &(0x7f0000000240), 0x1000) write$evdev(r1, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:45 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) [ 588.660936] FAULT_INJECTION: forcing a failure. [ 588.660936] name fail_page_alloc, interval 1, probability 0, space 0, times 0 17:04:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) [ 588.724208] CPU: 1 PID: 14683 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 588.731099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.740461] Call Trace: [ 588.743070] dump_stack+0x172/0x1f0 [ 588.746720] should_fail.cold+0xa/0x1b [ 588.750631] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 588.755752] ? ___might_sleep+0x163/0x280 [ 588.759936] should_fail_alloc_page+0x50/0x60 [ 588.764445] __alloc_pages_nodemask+0x1a1/0x710 [ 588.769140] ? __alloc_pages_slowpath+0x2900/0x2900 [ 588.774164] ? ___might_sleep+0x163/0x280 [ 588.774183] ? copyin+0xb5/0x100 [ 588.774202] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 588.774224] alloc_pages_current+0x107/0x210 [ 588.774242] pipe_write+0xa65/0xfb0 [ 588.774268] __vfs_write+0x613/0x8e0 [ 588.774285] ? kernel_read+0x120/0x120 [ 588.774300] ? common_file_perm+0x1d6/0x6f0 [ 588.774320] ? apparmor_file_permission+0x25/0x30 [ 588.781836] ? rw_verify_area+0x118/0x360 [ 588.781854] vfs_write+0x20c/0x580 [ 588.781874] ksys_write+0xea/0x1f0 [ 588.781892] ? __ia32_sys_read+0xb0/0xb0 [ 588.781915] ? do_fast_syscall_32+0xd1/0xc98 [ 588.831964] ? entry_SYSENTER_compat+0x70/0x7f [ 588.836555] ? do_fast_syscall_32+0xd1/0xc98 [ 588.840977] __ia32_sys_write+0x71/0xb0 [ 588.844979] do_fast_syscall_32+0x281/0xc98 [ 588.849312] entry_SYSENTER_compat+0x70/0x7f [ 588.853722] RIP: 0023:0xf7fdf869 [ 588.857090] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 588.875998] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 588.883822] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 588.891345] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 588.898612] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 588.905879] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 588.913165] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:46 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:46 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:46 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 17:04:48 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r1 = syz_open_dev$audion(0x0, 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:48 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:48 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}, @in={0x2, 0x4e20, @local}], 0x2c) 17:04:48 executing program 4 (fault-call:2 fault-nth:35): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:48 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:48 executing program 2: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:48 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:48 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) [ 591.748410] FAULT_INJECTION: forcing a failure. [ 591.748410] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 591.772479] CPU: 1 PID: 14741 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 591.779275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.788640] Call Trace: [ 591.791259] dump_stack+0x172/0x1f0 [ 591.794910] should_fail.cold+0xa/0x1b [ 591.798818] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 591.804013] ? ___might_sleep+0x163/0x280 [ 591.808178] should_fail_alloc_page+0x50/0x60 [ 591.812687] __alloc_pages_nodemask+0x1a1/0x710 [ 591.817376] ? __alloc_pages_slowpath+0x2900/0x2900 [ 591.822400] ? ___might_sleep+0x163/0x280 [ 591.826579] ? copyin+0xb5/0x100 [ 591.829959] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 591.835511] alloc_pages_current+0x107/0x210 [ 591.839943] pipe_write+0xa65/0xfb0 [ 591.843593] __vfs_write+0x613/0x8e0 [ 591.847318] ? kernel_read+0x120/0x120 [ 591.851219] ? common_file_perm+0x1d6/0x6f0 [ 591.855556] ? apparmor_file_permission+0x25/0x30 [ 591.860422] ? rw_verify_area+0x118/0x360 [ 591.864560] vfs_write+0x20c/0x580 [ 591.868089] ksys_write+0xea/0x1f0 [ 591.871665] ? __ia32_sys_read+0xb0/0xb0 [ 591.875891] ? do_fast_syscall_32+0xd1/0xc98 [ 591.880373] ? entry_SYSENTER_compat+0x70/0x7f [ 591.884944] ? do_fast_syscall_32+0xd1/0xc98 [ 591.889355] __ia32_sys_write+0x71/0xb0 [ 591.893322] do_fast_syscall_32+0x281/0xc98 [ 591.897635] entry_SYSENTER_compat+0x70/0x7f [ 591.902043] RIP: 0023:0xf7fdf869 [ 591.905516] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 591.924429] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 591.932134] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 591.939392] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 17:04:49 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:49 executing program 2: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) 17:04:49 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 591.946675] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 591.953934] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 591.961193] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:49 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 593.004993] device bridge_slave_1 left promiscuous mode [ 593.010542] bridge0: port 2(bridge_slave_1) entered disabled state [ 593.074699] device bridge_slave_0 left promiscuous mode [ 593.080211] bridge0: port 1(bridge_slave_0) entered disabled state [ 593.236304] device hsr_slave_1 left promiscuous mode [ 593.289366] device hsr_slave_0 left promiscuous mode [ 593.329877] team0 (unregistering): Port device team_slave_1 removed [ 593.341081] team0 (unregistering): Port device team_slave_0 removed [ 593.353086] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 593.389499] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 593.460030] bond0 (unregistering): Released all slaves [ 593.984331] IPVS: ftp: loaded support on port[0] = 21 [ 594.099507] chnl_net:caif_netlink_parms(): no params data found [ 594.160909] bridge0: port 1(bridge_slave_0) entered blocking state [ 594.170534] bridge0: port 1(bridge_slave_0) entered disabled state [ 594.181811] device bridge_slave_0 entered promiscuous mode [ 594.192308] bridge0: port 2(bridge_slave_1) entered blocking state [ 594.202847] bridge0: port 2(bridge_slave_1) entered disabled state [ 594.213112] device bridge_slave_1 entered promiscuous mode [ 594.247218] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 594.262739] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 594.293011] team0: Port device team_slave_0 added [ 594.303534] team0: Port device team_slave_1 added [ 594.366456] device hsr_slave_0 entered promiscuous mode [ 594.415326] device hsr_slave_1 entered promiscuous mode [ 594.510773] bridge0: port 2(bridge_slave_1) entered blocking state [ 594.517227] bridge0: port 2(bridge_slave_1) entered forwarding state [ 594.523915] bridge0: port 1(bridge_slave_0) entered blocking state [ 594.530294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 594.564865] bridge0: port 1(bridge_slave_0) entered disabled state [ 594.572088] bridge0: port 2(bridge_slave_1) entered disabled state [ 594.613131] 8021q: adding VLAN 0 to HW filter on device bond0 [ 594.632868] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 594.640319] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 594.660973] 8021q: adding VLAN 0 to HW filter on device team0 [ 594.678048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 594.692030] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 594.701206] bridge0: port 1(bridge_slave_0) entered blocking state [ 594.707620] bridge0: port 1(bridge_slave_0) entered forwarding state 17:04:51 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:51 executing program 2: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:51 executing program 4 (fault-call:2 fault-nth:36): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:51 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080), 0x0) 17:04:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080), 0x0) [ 594.803223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 594.820377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 594.839110] FAULT_INJECTION: forcing a failure. [ 594.839110] name fail_page_alloc, interval 1, probability 0, space 0, times 0 17:04:51 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080), 0x0) [ 594.867468] bridge0: port 2(bridge_slave_1) entered blocking state [ 594.873957] bridge0: port 2(bridge_slave_1) entered forwarding state [ 594.890350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 594.891095] CPU: 1 PID: 14782 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 594.901754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 594.904320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 594.904326] Call Trace: [ 594.904350] dump_stack+0x172/0x1f0 [ 594.904370] should_fail.cold+0xa/0x1b [ 594.904388] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 594.904405] ? ___might_sleep+0x163/0x280 [ 594.904427] should_fail_alloc_page+0x50/0x60 [ 594.904442] __alloc_pages_nodemask+0x1a1/0x710 [ 594.904469] ? __alloc_pages_slowpath+0x2900/0x2900 [ 594.931168] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 594.936170] ? ___might_sleep+0x163/0x280 [ 594.936190] ? copyin+0xb5/0x100 [ 594.936209] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 594.936230] alloc_pages_current+0x107/0x210 [ 594.936248] pipe_write+0xa65/0xfb0 [ 594.936276] __vfs_write+0x613/0x8e0 [ 594.936293] ? kernel_read+0x120/0x120 [ 594.936309] ? common_file_perm+0x1d6/0x6f0 [ 594.936328] ? apparmor_file_permission+0x25/0x30 [ 594.936347] ? rw_verify_area+0x118/0x360 [ 594.936366] vfs_write+0x20c/0x580 [ 594.936383] ksys_write+0xea/0x1f0 [ 594.936400] ? __ia32_sys_read+0xb0/0xb0 [ 594.936416] ? do_fast_syscall_32+0xd1/0xc98 [ 594.936431] ? entry_SYSENTER_compat+0x70/0x7f [ 594.936444] ? do_fast_syscall_32+0xd1/0xc98 [ 594.936487] __ia32_sys_write+0x71/0xb0 [ 594.940910] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 594.945194] do_fast_syscall_32+0x281/0xc98 [ 594.945216] entry_SYSENTER_compat+0x70/0x7f [ 594.945228] RIP: 0023:0xf7fdf869 [ 594.945243] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 594.945251] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 594.945265] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 594.945273] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 594.945281] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 594.945289] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 17:04:52 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) [ 594.945297] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 595.133377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 595.152973] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 595.177969] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 595.195745] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 595.203632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 595.217072] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 595.224852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 595.232327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 595.240348] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 595.247601] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 17:04:52 executing program 2: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 595.273097] 8021q: adding VLAN 0 to HW filter on device batadv0 17:04:52 executing program 4 (fault-call:2 fault-nth:37): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:52 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:52 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 595.497256] FAULT_INJECTION: forcing a failure. [ 595.497256] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 595.539993] CPU: 0 PID: 14824 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 595.546787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.556143] Call Trace: [ 595.558751] dump_stack+0x172/0x1f0 [ 595.562398] should_fail.cold+0xa/0x1b [ 595.566293] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 595.571410] ? ___might_sleep+0x163/0x280 [ 595.575577] should_fail_alloc_page+0x50/0x60 [ 595.580088] __alloc_pages_nodemask+0x1a1/0x710 [ 595.584777] ? __alloc_pages_slowpath+0x2900/0x2900 [ 595.589791] ? ___might_sleep+0x163/0x280 [ 595.593942] ? copyin+0xb5/0x100 [ 595.597306] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 595.602926] alloc_pages_current+0x107/0x210 [ 595.607337] pipe_write+0xa65/0xfb0 [ 595.610978] __vfs_write+0x613/0x8e0 [ 595.614685] ? kernel_read+0x120/0x120 [ 595.618572] ? common_file_perm+0x1d6/0x6f0 [ 595.622903] ? apparmor_file_permission+0x25/0x30 [ 595.627751] ? rw_verify_area+0x118/0x360 [ 595.631891] vfs_write+0x20c/0x580 [ 595.635440] ksys_write+0xea/0x1f0 [ 595.638981] ? __ia32_sys_read+0xb0/0xb0 [ 595.643052] ? do_fast_syscall_32+0xd1/0xc98 [ 595.647645] ? entry_SYSENTER_compat+0x70/0x7f [ 595.652222] ? do_fast_syscall_32+0xd1/0xc98 [ 595.656650] __ia32_sys_write+0x71/0xb0 [ 595.660630] do_fast_syscall_32+0x281/0xc98 [ 595.664973] entry_SYSENTER_compat+0x70/0x7f [ 595.669389] RIP: 0023:0xf7fdf869 [ 595.672751] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 595.691652] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 595.699356] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 595.706611] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 595.713866] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 595.721120] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 595.728396] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:54 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:54 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x80000) setns(r2, 0x24000000) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000040), 0x4) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000180)=0x7ff, 0x13c) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 17:04:54 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:54 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:04:54 executing program 4 (fault-call:2 fault-nth:38): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:54 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 597.812441] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 597.850594] FAULT_INJECTION: forcing a failure. [ 597.850594] name fail_page_alloc, interval 1, probability 0, space 0, times 0 17:04:54 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 597.864821] CPU: 1 PID: 14840 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 597.871599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 597.880954] Call Trace: [ 597.883557] dump_stack+0x172/0x1f0 [ 597.887204] should_fail.cold+0xa/0x1b [ 597.891200] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 597.896321] ? ___might_sleep+0x163/0x280 [ 597.900594] should_fail_alloc_page+0x50/0x60 [ 597.905101] __alloc_pages_nodemask+0x1a1/0x710 [ 597.909814] ? __alloc_pages_slowpath+0x2900/0x2900 17:04:54 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:55 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 597.914847] ? ___might_sleep+0x163/0x280 [ 597.919002] ? copyin+0xb5/0x100 [ 597.922379] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 597.927935] alloc_pages_current+0x107/0x210 [ 597.932358] pipe_write+0xa65/0xfb0 [ 597.936007] __vfs_write+0x613/0x8e0 [ 597.939742] ? kernel_read+0x120/0x120 [ 597.943648] ? common_file_perm+0x1d6/0x6f0 [ 597.947998] ? apparmor_file_permission+0x25/0x30 [ 597.952871] ? rw_verify_area+0x118/0x360 [ 597.957037] vfs_write+0x20c/0x580 [ 597.960598] ksys_write+0xea/0x1f0 17:04:55 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 597.964148] ? __ia32_sys_read+0xb0/0xb0 [ 597.968227] ? do_fast_syscall_32+0xd1/0xc98 [ 597.972744] ? entry_SYSENTER_compat+0x70/0x7f [ 597.977336] ? do_fast_syscall_32+0xd1/0xc98 [ 597.981766] __ia32_sys_write+0x71/0xb0 [ 597.985749] do_fast_syscall_32+0x281/0xc98 [ 597.990087] entry_SYSENTER_compat+0x70/0x7f [ 597.994497] RIP: 0023:0xf7fdf869 17:04:55 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 597.997867] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 598.016782] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 598.024991] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 598.025001] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 598.025014] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 598.025022] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 598.025030] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:57 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:04:57 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:04:57 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:04:57 executing program 4 (fault-call:2 fault-nth:39): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:04:57 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:57 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:04:57 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 600.907219] FAULT_INJECTION: forcing a failure. [ 600.907219] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 600.940065] CPU: 0 PID: 14898 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 600.946870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 600.956248] Call Trace: [ 600.958854] dump_stack+0x172/0x1f0 [ 600.962511] should_fail.cold+0xa/0x1b [ 600.966417] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 600.971530] ? ___might_sleep+0x163/0x280 [ 600.975708] should_fail_alloc_page+0x50/0x60 [ 600.980216] __alloc_pages_nodemask+0x1a1/0x710 [ 600.984899] ? __alloc_pages_slowpath+0x2900/0x2900 [ 600.989932] ? ___might_sleep+0x163/0x280 [ 600.994095] ? copyin+0xb5/0x100 [ 600.997475] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 601.003026] alloc_pages_current+0x107/0x210 [ 601.007451] pipe_write+0xa65/0xfb0 [ 601.011102] __vfs_write+0x613/0x8e0 [ 601.014831] ? kernel_read+0x120/0x120 [ 601.018726] ? common_file_perm+0x1d6/0x6f0 [ 601.023067] ? apparmor_file_permission+0x25/0x30 [ 601.027925] ? rw_verify_area+0x118/0x360 [ 601.032090] vfs_write+0x20c/0x580 [ 601.035641] ksys_write+0xea/0x1f0 [ 601.039201] ? __ia32_sys_read+0xb0/0xb0 [ 601.043269] ? do_fast_syscall_32+0xd1/0xc98 [ 601.047698] ? entry_SYSENTER_compat+0x70/0x7f [ 601.052283] ? do_fast_syscall_32+0xd1/0xc98 [ 601.056703] __ia32_sys_write+0x71/0xb0 [ 601.056722] do_fast_syscall_32+0x281/0xc98 [ 601.056741] entry_SYSENTER_compat+0x70/0x7f [ 601.056755] RIP: 0023:0xf7fdf869 [ 601.072816] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 601.091744] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 601.099457] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 17:04:57 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:58 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:58 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 601.106736] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 601.114006] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 601.121287] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 601.128560] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:04:58 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:04:58 executing program 4 (fault-call:2 fault-nth:40): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 601.367370] FAULT_INJECTION: forcing a failure. [ 601.367370] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 601.379480] CPU: 1 PID: 14937 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 601.386240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 601.395598] Call Trace: [ 601.398189] dump_stack+0x172/0x1f0 [ 601.401806] should_fail.cold+0xa/0x1b [ 601.405704] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 601.410804] ? ___might_sleep+0x163/0x280 [ 601.414961] should_fail_alloc_page+0x50/0x60 [ 601.419481] __alloc_pages_nodemask+0x1a1/0x710 [ 601.424165] ? __alloc_pages_slowpath+0x2900/0x2900 [ 601.429186] ? ___might_sleep+0x163/0x280 [ 601.433329] ? copyin+0xb5/0x100 [ 601.436692] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 601.442229] alloc_pages_current+0x107/0x210 [ 601.446649] pipe_write+0xa65/0xfb0 [ 601.450304] __vfs_write+0x613/0x8e0 [ 601.454034] ? kernel_read+0x120/0x120 [ 601.457923] ? common_file_perm+0x1d6/0x6f0 [ 601.462236] ? apparmor_file_permission+0x25/0x30 [ 601.467080] ? rw_verify_area+0x118/0x360 [ 601.471231] vfs_write+0x20c/0x580 [ 601.474774] ksys_write+0xea/0x1f0 [ 601.478325] ? __ia32_sys_read+0xb0/0xb0 [ 601.482376] ? do_fast_syscall_32+0xd1/0xc98 [ 601.486783] ? entry_SYSENTER_compat+0x70/0x7f [ 601.491361] ? do_fast_syscall_32+0xd1/0xc98 [ 601.495759] __ia32_sys_write+0x71/0xb0 [ 601.499724] do_fast_syscall_32+0x281/0xc98 [ 601.504058] entry_SYSENTER_compat+0x70/0x7f [ 601.508476] RIP: 0023:0xf7fdf869 [ 601.511847] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 601.530747] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 601.538458] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 601.545757] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 601.553023] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 601.560284] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 601.567559] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:00 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:00 executing program 4 (fault-call:2 fault-nth:41): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:00 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:05:00 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:00 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:00 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:00 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 603.967227] FAULT_INJECTION: forcing a failure. [ 603.967227] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 604.002275] CPU: 0 PID: 14953 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 604.009075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 604.018423] Call Trace: [ 604.021311] dump_stack+0x172/0x1f0 [ 604.024929] should_fail.cold+0xa/0x1b [ 604.028808] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 604.033970] ? ___might_sleep+0x163/0x280 [ 604.038113] should_fail_alloc_page+0x50/0x60 [ 604.042676] __alloc_pages_nodemask+0x1a1/0x710 [ 604.047338] ? __alloc_pages_slowpath+0x2900/0x2900 [ 604.052343] ? ___might_sleep+0x163/0x280 [ 604.056479] ? copyin+0xb5/0x100 [ 604.059836] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 604.065378] alloc_pages_current+0x107/0x210 [ 604.069797] pipe_write+0xa65/0xfb0 [ 604.073446] __vfs_write+0x613/0x8e0 [ 604.077174] ? kernel_read+0x120/0x120 [ 604.081055] ? common_file_perm+0x1d6/0x6f0 [ 604.085368] ? apparmor_file_permission+0x25/0x30 [ 604.090205] ? rw_verify_area+0x118/0x360 [ 604.094342] vfs_write+0x20c/0x580 [ 604.097875] ksys_write+0xea/0x1f0 [ 604.101402] ? __ia32_sys_read+0xb0/0xb0 [ 604.105454] ? do_fast_syscall_32+0xd1/0xc98 [ 604.109865] ? entry_SYSENTER_compat+0x70/0x7f [ 604.114442] ? do_fast_syscall_32+0xd1/0xc98 [ 604.118855] __ia32_sys_write+0x71/0xb0 [ 604.122835] do_fast_syscall_32+0x281/0xc98 [ 604.127147] entry_SYSENTER_compat+0x70/0x7f [ 604.131556] RIP: 0023:0xf7fdf869 [ 604.134905] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 604.153804] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 17:05:01 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:01 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'%xz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 604.161523] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 604.168878] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 604.176164] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 604.183438] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 604.190710] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:01 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'ixz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:01 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:01 executing program 4 (fault-call:2 fault-nth:42): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:01 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e#z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:01 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e%z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:01 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 604.459331] FAULT_INJECTION: forcing a failure. [ 604.459331] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 604.472929] CPU: 1 PID: 14992 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 604.479711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 604.489076] Call Trace: [ 604.491703] dump_stack+0x172/0x1f0 [ 604.495367] should_fail.cold+0xa/0x1b [ 604.499279] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 604.504403] ? ___might_sleep+0x163/0x280 [ 604.508578] should_fail_alloc_page+0x50/0x60 [ 604.513084] __alloc_pages_nodemask+0x1a1/0x710 [ 604.517770] ? __alloc_pages_slowpath+0x2900/0x2900 [ 604.522809] ? ___might_sleep+0x163/0x280 [ 604.526972] ? copyin+0xb5/0x100 [ 604.530356] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 604.535998] alloc_pages_current+0x107/0x210 [ 604.540439] pipe_write+0xa65/0xfb0 [ 604.544090] __vfs_write+0x613/0x8e0 [ 604.547821] ? kernel_read+0x120/0x120 [ 604.551719] ? common_file_perm+0x1d6/0x6f0 [ 604.556686] ? apparmor_file_permission+0x25/0x30 [ 604.556708] ? rw_verify_area+0x118/0x360 [ 604.556724] vfs_write+0x20c/0x580 [ 604.556742] ksys_write+0xea/0x1f0 [ 604.556759] ? __ia32_sys_read+0xb0/0xb0 [ 604.556777] ? do_fast_syscall_32+0xd1/0xc98 [ 604.556792] ? entry_SYSENTER_compat+0x70/0x7f [ 604.556809] ? do_fast_syscall_32+0xd1/0xc98 [ 604.590694] __ia32_sys_write+0x71/0xb0 [ 604.594700] do_fast_syscall_32+0x281/0xc98 [ 604.599035] entry_SYSENTER_compat+0x70/0x7f [ 604.603462] RIP: 0023:0xf7fdf869 [ 604.606841] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 604.625754] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 604.633458] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 604.640720] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 604.647980] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 604.655379] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 604.662738] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:03 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:05:03 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e*z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:03 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:03 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:03 executing program 4 (fault-call:2 fault-nth:43): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:04 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e+z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:04 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e-z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 607.024253] FAULT_INJECTION: forcing a failure. [ 607.024253] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 607.042191] CPU: 1 PID: 15018 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 607.048980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 607.058344] Call Trace: [ 607.060953] dump_stack+0x172/0x1f0 [ 607.064602] should_fail.cold+0xa/0x1b [ 607.068513] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 607.073628] ? ___might_sleep+0x163/0x280 [ 607.077801] should_fail_alloc_page+0x50/0x60 [ 607.082310] __alloc_pages_nodemask+0x1a1/0x710 [ 607.086989] ? __alloc_pages_slowpath+0x2900/0x2900 [ 607.092016] ? ___might_sleep+0x163/0x280 [ 607.096185] ? copyin+0xb5/0x100 [ 607.099566] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 607.105122] alloc_pages_current+0x107/0x210 [ 607.109544] pipe_write+0xa65/0xfb0 [ 607.113192] __vfs_write+0x613/0x8e0 [ 607.116919] ? kernel_read+0x120/0x120 [ 607.120826] ? common_file_perm+0x1d6/0x6f0 [ 607.125164] ? apparmor_file_permission+0x25/0x30 [ 607.130028] ? rw_verify_area+0x118/0x360 [ 607.134188] vfs_write+0x20c/0x580 [ 607.137743] ksys_write+0xea/0x1f0 [ 607.141297] ? __ia32_sys_read+0xb0/0xb0 [ 607.145375] ? do_fast_syscall_32+0xd1/0xc98 [ 607.149796] ? entry_SYSENTER_compat+0x70/0x7f [ 607.154394] ? do_fast_syscall_32+0xd1/0xc98 [ 607.158823] __ia32_sys_write+0x71/0xb0 [ 607.162813] do_fast_syscall_32+0x281/0xc98 [ 607.167157] entry_SYSENTER_compat+0x70/0x7f [ 607.171575] RIP: 0023:0xf7fdf869 [ 607.174976] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 607.193887] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 607.201606] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 607.208892] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 607.216172] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 17:05:04 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:04 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e.z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:04 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'e0z'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:04 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'eXz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 607.223448] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 607.230732] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:07 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:05:07 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'ecz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:07 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:07 executing program 2: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:07 executing program 4 (fault-call:2 fault-nth:44): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:07 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:07 executing program 2: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:07 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'edz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 610.066965] FAULT_INJECTION: forcing a failure. [ 610.066965] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 610.118179] CPU: 0 PID: 15114 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 610.124987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 610.134345] Call Trace: [ 610.136945] dump_stack+0x172/0x1f0 [ 610.140598] should_fail.cold+0xa/0x1b [ 610.144495] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 610.149610] ? ___might_sleep+0x163/0x280 [ 610.153770] should_fail_alloc_page+0x50/0x60 [ 610.158280] __alloc_pages_nodemask+0x1a1/0x710 [ 610.162971] ? __alloc_pages_slowpath+0x2900/0x2900 17:05:07 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'eiz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:07 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 610.168025] ? ___might_sleep+0x163/0x280 [ 610.172183] ? copyin+0xb5/0x100 [ 610.175556] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 610.181281] alloc_pages_current+0x107/0x210 [ 610.185704] pipe_write+0xa65/0xfb0 [ 610.189410] __vfs_write+0x613/0x8e0 [ 610.193136] ? kernel_read+0x120/0x120 [ 610.197042] ? common_file_perm+0x1d6/0x6f0 [ 610.201387] ? apparmor_file_permission+0x25/0x30 [ 610.206246] ? rw_verify_area+0x118/0x360 [ 610.210408] vfs_write+0x20c/0x580 [ 610.213971] ksys_write+0xea/0x1f0 [ 610.217530] ? __ia32_sys_read+0xb0/0xb0 [ 610.221605] ? do_fast_syscall_32+0xd1/0xc98 [ 610.226021] ? entry_SYSENTER_compat+0x70/0x7f [ 610.230611] ? do_fast_syscall_32+0xd1/0xc98 [ 610.235033] __ia32_sys_write+0x71/0xb0 [ 610.239017] do_fast_syscall_32+0x281/0xc98 [ 610.243354] entry_SYSENTER_compat+0x70/0x7f [ 610.247768] RIP: 0023:0xf7fdf869 17:05:07 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:07 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'elz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 610.251136] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 610.270041] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 610.277758] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 610.285032] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 610.292320] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 610.299695] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 610.306972] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:10 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, 0x0, 0x0) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:05:10 executing program 2: setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:10 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'eoz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:10 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:10 executing program 4 (fault-call:2 fault-nth:45): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:10 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'epz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 613.129926] FAULT_INJECTION: forcing a failure. [ 613.129926] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 613.148235] CPU: 0 PID: 15171 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 613.155019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.164377] Call Trace: [ 613.166984] dump_stack+0x172/0x1f0 [ 613.170628] should_fail.cold+0xa/0x1b [ 613.174537] ? fault_create_debugfs_attr+0x1e0/0x1e0 17:05:10 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) [ 613.179652] ? ___might_sleep+0x163/0x280 [ 613.183824] should_fail_alloc_page+0x50/0x60 [ 613.188331] __alloc_pages_nodemask+0x1a1/0x710 [ 613.193012] ? __alloc_pages_slowpath+0x2900/0x2900 [ 613.198034] ? ___might_sleep+0x163/0x280 [ 613.202192] ? copyin+0xb5/0x100 [ 613.205574] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 613.211122] alloc_pages_current+0x107/0x210 [ 613.215543] pipe_write+0xa65/0xfb0 [ 613.219185] __vfs_write+0x613/0x8e0 [ 613.219207] ? kernel_read+0x120/0x120 [ 613.226800] ? common_file_perm+0x1d6/0x6f0 [ 613.226821] ? apparmor_file_permission+0x25/0x30 [ 613.226842] ? rw_verify_area+0x118/0x360 [ 613.226859] vfs_write+0x20c/0x580 [ 613.226878] ksys_write+0xea/0x1f0 [ 613.226896] ? __ia32_sys_read+0xb0/0xb0 [ 613.226914] ? do_fast_syscall_32+0xd1/0xc98 [ 613.226928] ? entry_SYSENTER_compat+0x70/0x7f [ 613.226943] ? do_fast_syscall_32+0xd1/0xc98 [ 613.226970] __ia32_sys_write+0x71/0xb0 [ 613.268705] do_fast_syscall_32+0x281/0xc98 [ 613.273047] entry_SYSENTER_compat+0x70/0x7f [ 613.277461] RIP: 0023:0xf7fdf869 [ 613.280839] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 613.299929] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 613.307670] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 613.314996] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 613.322276] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 17:05:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:10 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'esz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 613.329554] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 613.336827] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:10 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) 17:05:10 executing program 4 (fault-call:2 fault-nth:46): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 613.593631] FAULT_INJECTION: forcing a failure. [ 613.593631] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 613.614405] CPU: 0 PID: 15208 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 613.621188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 613.630543] Call Trace: [ 613.633193] dump_stack+0x172/0x1f0 [ 613.636826] should_fail.cold+0xa/0x1b [ 613.640748] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 613.645851] ? ___might_sleep+0x163/0x280 [ 613.650012] should_fail_alloc_page+0x50/0x60 [ 613.654507] __alloc_pages_nodemask+0x1a1/0x710 [ 613.659165] ? __alloc_pages_slowpath+0x2900/0x2900 [ 613.664181] ? ___might_sleep+0x163/0x280 [ 613.668336] ? copyin+0xb5/0x100 [ 613.671733] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 613.677289] alloc_pages_current+0x107/0x210 [ 613.681704] pipe_write+0xa65/0xfb0 [ 613.685345] __vfs_write+0x613/0x8e0 [ 613.689065] ? kernel_read+0x120/0x120 [ 613.692966] ? common_file_perm+0x1d6/0x6f0 [ 613.697279] ? apparmor_file_permission+0x25/0x30 [ 613.702125] ? rw_verify_area+0x118/0x360 [ 613.706453] vfs_write+0x20c/0x580 [ 613.710020] ksys_write+0xea/0x1f0 [ 613.713556] ? __ia32_sys_read+0xb0/0xb0 [ 613.717622] ? do_fast_syscall_32+0xd1/0xc98 [ 613.722027] ? entry_SYSENTER_compat+0x70/0x7f [ 613.726621] ? do_fast_syscall_32+0xd1/0xc98 [ 613.731041] __ia32_sys_write+0x71/0xb0 [ 613.735014] do_fast_syscall_32+0x281/0xc98 [ 613.739342] entry_SYSENTER_compat+0x70/0x7f [ 613.743755] RIP: 0023:0xf7fdf869 [ 613.747132] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 613.766040] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 613.773773] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 613.781041] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 613.788305] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 613.795574] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 613.802830] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:13 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, 0x0, 0x0) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:05:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:13 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'euz'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:13 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:13 executing program 4 (fault-call:2 fault-nth:47): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:13 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'ex:'}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:13 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x2}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 616.185360] FAULT_INJECTION: forcing a failure. [ 616.185360] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 616.224555] CPU: 0 PID: 15218 Comm: syz-executor.4 Not tainted 5.0.0 #4 17:05:13 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 616.231365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.240723] Call Trace: [ 616.243324] dump_stack+0x172/0x1f0 [ 616.246977] should_fail.cold+0xa/0x1b [ 616.250897] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 616.256014] ? ___might_sleep+0x163/0x280 [ 616.260174] should_fail_alloc_page+0x50/0x60 [ 616.264687] __alloc_pages_nodemask+0x1a1/0x710 [ 616.269371] ? __alloc_pages_slowpath+0x2900/0x2900 [ 616.274394] ? ___might_sleep+0x163/0x280 [ 616.278545] ? copyin+0xb5/0x100 17:05:13 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x3}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 616.281924] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 616.287480] alloc_pages_current+0x107/0x210 [ 616.291902] pipe_write+0xa65/0xfb0 [ 616.295557] __vfs_write+0x613/0x8e0 [ 616.299282] ? kernel_read+0x120/0x120 [ 616.303178] ? common_file_perm+0x1d6/0x6f0 [ 616.307519] ? apparmor_file_permission+0x25/0x30 [ 616.312382] ? rw_verify_area+0x118/0x360 [ 616.316543] vfs_write+0x20c/0x580 [ 616.320098] ksys_write+0xea/0x1f0 [ 616.323654] ? __ia32_sys_read+0xb0/0xb0 [ 616.327739] ? do_fast_syscall_32+0xd1/0xc98 17:05:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) [ 616.332153] ? entry_SYSENTER_compat+0x70/0x7f [ 616.336738] ? do_fast_syscall_32+0xd1/0xc98 [ 616.341159] __ia32_sys_write+0x71/0xb0 [ 616.345147] do_fast_syscall_32+0x281/0xc98 [ 616.349478] entry_SYSENTER_compat+0x70/0x7f [ 616.349492] RIP: 0023:0xf7fdf869 [ 616.357254] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 616.376189] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 616.376204] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 616.376213] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 616.376222] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 616.376231] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 616.376240] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:13 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 617.364674] device bridge_slave_1 left promiscuous mode [ 617.370220] bridge0: port 2(bridge_slave_1) entered disabled state [ 617.414554] device bridge_slave_0 left promiscuous mode [ 617.419995] bridge0: port 1(bridge_slave_0) entered disabled state [ 617.537427] device hsr_slave_1 left promiscuous mode [ 617.576993] device hsr_slave_0 left promiscuous mode [ 617.617251] team0 (unregistering): Port device team_slave_1 removed [ 617.629276] team0 (unregistering): Port device team_slave_0 removed [ 617.639592] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 617.700317] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 617.793473] bond0 (unregistering): Released all slaves [ 618.373020] IPVS: ftp: loaded support on port[0] = 21 [ 618.481927] chnl_net:caif_netlink_parms(): no params data found [ 618.523469] bridge0: port 1(bridge_slave_0) entered blocking state [ 618.531394] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.538903] device bridge_slave_0 entered promiscuous mode [ 618.546633] bridge0: port 2(bridge_slave_1) entered blocking state [ 618.553065] bridge0: port 2(bridge_slave_1) entered disabled state [ 618.560580] device bridge_slave_1 entered promiscuous mode [ 618.580929] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 618.593588] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 618.613233] team0: Port device team_slave_0 added [ 618.621121] team0: Port device team_slave_1 added [ 618.686477] device hsr_slave_0 entered promiscuous mode [ 618.724161] device hsr_slave_1 entered promiscuous mode [ 618.802572] bridge0: port 2(bridge_slave_1) entered blocking state [ 618.809000] bridge0: port 2(bridge_slave_1) entered forwarding state [ 618.815687] bridge0: port 1(bridge_slave_0) entered blocking state [ 618.822043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 618.902754] 8021q: adding VLAN 0 to HW filter on device bond0 [ 618.919416] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.930149] bridge0: port 2(bridge_slave_1) entered disabled state [ 618.959086] 8021q: adding VLAN 0 to HW filter on device team0 [ 618.968749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 618.980278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 619.002842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 619.011194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 619.019623] bridge0: port 1(bridge_slave_0) entered blocking state [ 619.026052] bridge0: port 1(bridge_slave_0) entered forwarding state [ 619.033597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 619.041804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 619.049987] bridge0: port 2(bridge_slave_1) entered blocking state [ 619.056406] bridge0: port 2(bridge_slave_1) entered forwarding state [ 619.070233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 619.084590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 619.092731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 619.100961] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 619.116303] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 619.129372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 619.140210] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 619.148412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 619.157488] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 17:05:16 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, 0x0, 0x0) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:05:16 executing program 2: socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:16 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:16 executing program 4 (fault-call:2 fault-nth:48): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:16 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) [ 619.165448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 619.172970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 619.182772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 17:05:16 executing program 2: socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) [ 619.275356] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 619.284331] FAULT_INJECTION: forcing a failure. [ 619.284331] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 619.349618] CPU: 0 PID: 15274 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 619.356430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 619.365786] Call Trace: [ 619.368389] dump_stack+0x172/0x1f0 [ 619.372035] should_fail.cold+0xa/0x1b [ 619.375938] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 619.381056] ? ___might_sleep+0x163/0x280 [ 619.385222] should_fail_alloc_page+0x50/0x60 [ 619.389719] __alloc_pages_nodemask+0x1a1/0x710 [ 619.394401] ? __alloc_pages_slowpath+0x2900/0x2900 [ 619.399424] ? ___might_sleep+0x163/0x280 [ 619.403580] ? copyin+0xb5/0x100 [ 619.406968] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 619.412524] alloc_pages_current+0x107/0x210 [ 619.416945] pipe_write+0xa65/0xfb0 [ 619.420612] __vfs_write+0x613/0x8e0 [ 619.424335] ? kernel_read+0x120/0x120 [ 619.428233] ? common_file_perm+0x1d6/0x6f0 [ 619.432565] ? apparmor_file_permission+0x25/0x30 [ 619.437417] ? rw_verify_area+0x118/0x360 [ 619.441579] vfs_write+0x20c/0x580 [ 619.445133] ksys_write+0xea/0x1f0 17:05:16 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:16 executing program 2: socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) [ 619.448687] ? __ia32_sys_read+0xb0/0xb0 [ 619.452765] ? do_fast_syscall_32+0xd1/0xc98 [ 619.457175] ? entry_SYSENTER_compat+0x70/0x7f [ 619.461762] ? do_fast_syscall_32+0xd1/0xc98 [ 619.466182] __ia32_sys_write+0x71/0xb0 [ 619.470166] do_fast_syscall_32+0x281/0xc98 [ 619.474501] entry_SYSENTER_compat+0x70/0x7f [ 619.478908] RIP: 0023:0xf7fdf869 17:05:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) [ 619.482277] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 619.501182] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 619.508899] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 619.516169] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 619.523441] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 619.523453] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 619.537992] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:16 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x4}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 17:05:16 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 17:05:19 executing program 4 (fault-call:2 fault-nth:49): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:19 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x5}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:19 executing program 1: syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x1000) write$evdev(0xffffffffffffffff, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:05:19 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:19 executing program 3: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:19 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x6}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080), 0x0) [ 622.362644] FAULT_INJECTION: forcing a failure. [ 622.362644] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 622.415801] CPU: 1 PID: 15326 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 622.422705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 622.432067] Call Trace: [ 622.434681] dump_stack+0x172/0x1f0 [ 622.438348] should_fail.cold+0xa/0x1b [ 622.442252] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 622.447369] ? ___might_sleep+0x163/0x280 [ 622.451529] should_fail_alloc_page+0x50/0x60 [ 622.456035] __alloc_pages_nodemask+0x1a1/0x710 [ 622.460720] ? __alloc_pages_slowpath+0x2900/0x2900 17:05:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080), 0x0) [ 622.465747] ? ___might_sleep+0x163/0x280 [ 622.469911] ? copyin+0xb5/0x100 [ 622.473284] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 622.478833] alloc_pages_current+0x107/0x210 [ 622.483254] pipe_write+0xa65/0xfb0 [ 622.486897] __vfs_write+0x613/0x8e0 [ 622.490632] ? kernel_read+0x120/0x120 [ 622.494540] ? common_file_perm+0x1d6/0x6f0 [ 622.498910] ? apparmor_file_permission+0x25/0x30 [ 622.503769] ? rw_verify_area+0x118/0x360 [ 622.507929] vfs_write+0x20c/0x580 [ 622.511492] ksys_write+0xea/0x1f0 17:05:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080), 0x0) [ 622.515040] ? __ia32_sys_read+0xb0/0xb0 [ 622.519108] ? do_fast_syscall_32+0xd1/0xc98 [ 622.523619] ? entry_SYSENTER_compat+0x70/0x7f [ 622.528218] ? do_fast_syscall_32+0xd1/0xc98 [ 622.532647] __ia32_sys_write+0x71/0xb0 [ 622.536658] do_fast_syscall_32+0x281/0xc98 [ 622.541269] entry_SYSENTER_compat+0x70/0x7f [ 622.545694] RIP: 0023:0xf7fdf869 17:05:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:19 executing program 3: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:19 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x7}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 622.549068] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 622.567977] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 622.575704] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 622.582977] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 622.590253] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 622.597526] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 622.604802] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:19 executing program 4 (fault-call:2 fault-nth:50): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:19 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:19 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0xa}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 622.849765] FAULT_INJECTION: forcing a failure. [ 622.849765] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 622.861908] CPU: 0 PID: 15372 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 622.868702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 622.868708] Call Trace: [ 622.868737] dump_stack+0x172/0x1f0 [ 622.868759] should_fail.cold+0xa/0x1b [ 622.868780] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 622.868800] ? ___might_sleep+0x163/0x280 [ 622.868826] should_fail_alloc_page+0x50/0x60 [ 622.868844] __alloc_pages_nodemask+0x1a1/0x710 [ 622.868865] ? __alloc_pages_slowpath+0x2900/0x2900 [ 622.868881] ? ___might_sleep+0x163/0x280 [ 622.868898] ? copyin+0xb5/0x100 [ 622.868917] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 622.868938] alloc_pages_current+0x107/0x210 [ 622.868966] pipe_write+0xa65/0xfb0 [ 622.868997] __vfs_write+0x613/0x8e0 [ 622.869016] ? kernel_read+0x120/0x120 [ 622.869036] ? common_file_perm+0x1d6/0x6f0 [ 622.869059] ? apparmor_file_permission+0x25/0x30 [ 622.869083] ? rw_verify_area+0x118/0x360 [ 622.869101] vfs_write+0x20c/0x580 [ 622.869121] ksys_write+0xea/0x1f0 [ 622.869139] ? __ia32_sys_read+0xb0/0xb0 [ 622.889429] ? do_fast_syscall_32+0xd1/0xc98 [ 622.889446] ? entry_SYSENTER_compat+0x70/0x7f [ 622.889460] ? do_fast_syscall_32+0xd1/0xc98 [ 622.889482] __ia32_sys_write+0x71/0xb0 [ 622.889501] do_fast_syscall_32+0x281/0xc98 [ 622.889520] entry_SYSENTER_compat+0x70/0x7f [ 622.991801] RIP: 0023:0xf7fdf869 [ 622.995391] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 623.014283] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 623.021983] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 623.029259] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 623.036523] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 17:05:20 executing program 1: syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x1000) write$evdev(0xffffffffffffffff, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:05:20 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0xf}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:20 executing program 3: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:20 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 623.043800] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 623.051061] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:20 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x48}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:20 executing program 4 (fault-call:2 fault-nth:51): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 623.274907] FAULT_INJECTION: forcing a failure. [ 623.274907] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 623.313917] CPU: 0 PID: 15395 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 623.320729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 623.330087] Call Trace: [ 623.332679] dump_stack+0x172/0x1f0 [ 623.336302] should_fail.cold+0xa/0x1b [ 623.340194] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 623.345315] ? ___might_sleep+0x163/0x280 [ 623.349456] should_fail_alloc_page+0x50/0x60 [ 623.353943] __alloc_pages_nodemask+0x1a1/0x710 [ 623.358602] ? __alloc_pages_slowpath+0x2900/0x2900 [ 623.363608] ? ___might_sleep+0x163/0x280 [ 623.367745] ? copyin+0xb5/0x100 [ 623.371100] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 623.376644] alloc_pages_current+0x107/0x210 [ 623.381070] pipe_write+0xa65/0xfb0 [ 623.384696] __vfs_write+0x613/0x8e0 [ 623.388399] ? kernel_read+0x120/0x120 [ 623.392277] ? common_file_perm+0x1d6/0x6f0 [ 623.396603] ? apparmor_file_permission+0x25/0x30 [ 623.401448] ? rw_verify_area+0x118/0x360 [ 623.405589] vfs_write+0x20c/0x580 [ 623.409132] ksys_write+0xea/0x1f0 [ 623.412686] ? __ia32_sys_read+0xb0/0xb0 [ 623.416851] ? do_fast_syscall_32+0xd1/0xc98 [ 623.421266] ? entry_SYSENTER_compat+0x70/0x7f [ 623.425837] ? do_fast_syscall_32+0xd1/0xc98 [ 623.430233] __ia32_sys_write+0x71/0xb0 [ 623.434198] do_fast_syscall_32+0x281/0xc98 [ 623.438518] entry_SYSENTER_compat+0x70/0x7f [ 623.442912] RIP: 0023:0xf7fdf869 [ 623.446270] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 623.465269] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 17:05:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:20 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x4c}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:20 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:20 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 623.472980] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 623.480235] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 623.487576] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 623.494840] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 623.502097] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 623.546744] FAULT_INJECTION: forcing a failure. [ 623.546744] name failslab, interval 1, probability 0, space 0, times 0 [ 623.599073] CPU: 0 PID: 15408 Comm: syz-executor.3 Not tainted 5.0.0 #4 [ 623.605874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 623.615256] Call Trace: [ 623.617859] dump_stack+0x172/0x1f0 [ 623.621503] should_fail.cold+0xa/0x1b [ 623.625405] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 623.630521] ? lock_downgrade+0x810/0x810 [ 623.634688] ? ___might_sleep+0x163/0x280 [ 623.638854] __should_failslab+0x121/0x190 [ 623.643098] should_failslab+0x9/0x14 [ 623.646986] kmem_cache_alloc_node_trace+0x270/0x720 [ 623.652122] __kmalloc_node+0x3d/0x70 [ 623.652143] kvmalloc_node+0x68/0x100 [ 623.652162] vmemdup_user+0x27/0xb0 [ 623.652183] __sctp_setsockopt_connectx+0x45/0x1a0 [ 623.652199] ? lock_sock_nested+0xe2/0x120 [ 623.672570] sctp_setsockopt+0x1bb2/0x5130 [ 623.676818] ? __fget+0x340/0x540 [ 623.680288] ? sctp_setsockopt_paddr_thresholds+0x420/0x420 [ 623.686022] ? ___might_sleep+0x163/0x280 [ 623.690184] ? __might_sleep+0x95/0x190 [ 623.694177] ? debug_lockdep_rcu_enabled+0x71/0xa0 17:05:20 executing program 4 (fault-call:2 fault-nth:52): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:20 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 623.699124] ? aa_sk_perm+0x1c6/0x7c0 [ 623.702940] ? aa_sock_opt_perm.isra.0+0xa1/0x130 [ 623.707812] compat_sock_common_setsockopt+0x10e/0x150 [ 623.713095] __compat_sys_setsockopt+0x192/0x670 [ 623.717858] ? sock_common_setsockopt+0xe0/0xe0 [ 623.722539] ? __compat_sys_getsockopt+0x640/0x640 [ 623.722558] ? __ia32_sys_read+0xb0/0xb0 [ 623.722579] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 623.736300] ? do_fast_syscall_32+0xd1/0xc98 [ 623.736317] ? entry_SYSENTER_compat+0x70/0x7f [ 623.736332] ? do_fast_syscall_32+0xd1/0xc98 [ 623.736352] __ia32_compat_sys_setsockopt+0xbd/0x150 [ 623.736371] do_fast_syscall_32+0x281/0xc98 [ 623.736391] entry_SYSENTER_compat+0x70/0x7f [ 623.736403] RIP: 0023:0xf7fbb869 [ 623.736419] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 623.785993] RSP: 002b:00000000f5db70cc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 623.793714] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000084 [ 623.800997] RDX: 000000000000006b RSI: 0000000020000080 RDI: 000000000000001c [ 623.808271] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 623.815553] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 623.822825] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:20 executing program 1: syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000000240), 0x1000) write$evdev(0xffffffffffffffff, &(0x7f0000000000)=[{{0x77359400}}], 0xff5f) 17:05:20 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x68}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:20 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) 17:05:20 executing program 3 (fault-call:1 fault-nth:1): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) [ 623.886949] FAULT_INJECTION: forcing a failure. [ 623.886949] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 623.907734] CPU: 0 PID: 15424 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 623.914532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 623.923889] Call Trace: [ 623.926493] dump_stack+0x172/0x1f0 [ 623.930144] should_fail.cold+0xa/0x1b 17:05:21 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x6c}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 623.934057] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 623.939177] ? ___might_sleep+0x163/0x280 [ 623.943354] should_fail_alloc_page+0x50/0x60 [ 623.947860] __alloc_pages_nodemask+0x1a1/0x710 [ 623.952547] ? __alloc_pages_slowpath+0x2900/0x2900 [ 623.957578] ? ___might_sleep+0x163/0x280 [ 623.961756] ? copyin+0xb5/0x100 [ 623.965138] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 623.970705] alloc_pages_current+0x107/0x210 [ 623.975129] pipe_write+0xa65/0xfb0 [ 623.978779] __vfs_write+0x613/0x8e0 [ 623.982507] ? kernel_read+0x120/0x120 17:05:21 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x74}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 623.986407] ? common_file_perm+0x1d6/0x6f0 [ 623.990741] ? apparmor_file_permission+0x25/0x30 [ 623.995608] ? rw_verify_area+0x118/0x360 [ 623.999971] vfs_write+0x20c/0x580 [ 624.003532] ksys_write+0xea/0x1f0 [ 624.007096] ? __ia32_sys_read+0xb0/0xb0 [ 624.011173] ? do_fast_syscall_32+0xd1/0xc98 [ 624.015598] ? entry_SYSENTER_compat+0x70/0x7f [ 624.020493] ? do_fast_syscall_32+0xd1/0xc98 [ 624.024915] __ia32_sys_write+0x71/0xb0 [ 624.028903] do_fast_syscall_32+0x281/0xc98 [ 624.028925] entry_SYSENTER_compat+0x70/0x7f [ 624.028938] RIP: 0023:0xf7fdf869 [ 624.028954] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 624.028970] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 624.028985] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 624.028997] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 624.041077] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 624.041086] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 624.041095] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:21 executing program 4 (fault-call:2 fault-nth:53): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:21 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x7a}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:21 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) 17:05:21 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:21 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x300}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:21 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, 0x0, 0x0) [ 624.476715] FAULT_INJECTION: forcing a failure. [ 624.476715] name fail_page_alloc, interval 1, probability 0, space 0, times 0 17:05:21 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x500}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 624.542037] CPU: 0 PID: 15461 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 624.548839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 624.558205] Call Trace: [ 624.560815] dump_stack+0x172/0x1f0 [ 624.564462] should_fail.cold+0xa/0x1b [ 624.568366] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 624.573484] ? ___might_sleep+0x163/0x280 [ 624.578039] should_fail_alloc_page+0x50/0x60 [ 624.582546] __alloc_pages_nodemask+0x1a1/0x710 [ 624.587225] ? __alloc_pages_slowpath+0x2900/0x2900 17:05:21 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x600}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:21 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x700}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 624.592248] ? ___might_sleep+0x163/0x280 [ 624.596410] ? copyin+0xb5/0x100 [ 624.599797] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 624.605349] alloc_pages_current+0x107/0x210 [ 624.609768] pipe_write+0xa65/0xfb0 [ 624.613417] __vfs_write+0x613/0x8e0 [ 624.617141] ? kernel_read+0x120/0x120 [ 624.621046] ? common_file_perm+0x1d6/0x6f0 [ 624.625392] ? apparmor_file_permission+0x25/0x30 [ 624.630251] ? rw_verify_area+0x118/0x360 [ 624.634403] vfs_write+0x20c/0x580 [ 624.637970] ksys_write+0xea/0x1f0 17:05:21 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0xa00}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:21 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0xf00}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 624.641527] ? __ia32_sys_read+0xb0/0xb0 [ 624.645600] ? do_fast_syscall_32+0xd1/0xc98 [ 624.650014] ? entry_SYSENTER_compat+0x70/0x7f [ 624.654598] ? do_fast_syscall_32+0xd1/0xc98 [ 624.659023] __ia32_sys_write+0x71/0xb0 [ 624.663013] do_fast_syscall_32+0x281/0xc98 [ 624.667386] entry_SYSENTER_compat+0x70/0x7f [ 624.671807] RIP: 0023:0xf7fdf869 [ 624.675178] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 624.694093] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 624.701812] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 624.709086] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 624.716369] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 624.723642] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 624.730919] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:21 executing program 4 (fault-call:2 fault-nth:54): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:21 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:22 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 624.999365] FAULT_INJECTION: forcing a failure. [ 624.999365] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 625.022085] CPU: 0 PID: 15516 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 625.029139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.038506] Call Trace: [ 625.041116] dump_stack+0x172/0x1f0 [ 625.044765] should_fail.cold+0xa/0x1b [ 625.048684] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 625.053803] ? ___might_sleep+0x163/0x280 [ 625.057981] should_fail_alloc_page+0x50/0x60 [ 625.062481] __alloc_pages_nodemask+0x1a1/0x710 [ 625.067144] ? __alloc_pages_slowpath+0x2900/0x2900 [ 625.072166] ? ___might_sleep+0x163/0x280 [ 625.076322] ? copyin+0xb5/0x100 [ 625.079687] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 625.085219] alloc_pages_current+0x107/0x210 [ 625.089635] pipe_write+0xa65/0xfb0 [ 625.093263] __vfs_write+0x613/0x8e0 [ 625.096976] ? kernel_read+0x120/0x120 [ 625.100863] ? common_file_perm+0x1d6/0x6f0 [ 625.105194] ? apparmor_file_permission+0x25/0x30 [ 625.110055] ? rw_verify_area+0x118/0x360 [ 625.114216] vfs_write+0x20c/0x580 [ 625.117771] ksys_write+0xea/0x1f0 [ 625.121352] ? __ia32_sys_read+0xb0/0xb0 [ 625.125428] ? do_fast_syscall_32+0xd1/0xc98 [ 625.129836] ? entry_SYSENTER_compat+0x70/0x7f [ 625.134425] ? do_fast_syscall_32+0xd1/0xc98 [ 625.138841] __ia32_sys_write+0x71/0xb0 [ 625.142830] do_fast_syscall_32+0x281/0xc98 [ 625.147429] entry_SYSENTER_compat+0x70/0x7f [ 625.151868] RIP: 0023:0xf7fdf869 [ 625.155220] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 625.174178] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 625.181881] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 625.189138] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 625.196413] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 625.203691] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 625.210974] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x2, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:22 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:22 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, 0x0, 0x0) 17:05:22 executing program 4 (fault-call:2 fault-nth:55): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x3, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:22 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:22 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x4, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) [ 625.725015] device bridge_slave_1 left promiscuous mode [ 625.730557] bridge0: port 2(bridge_slave_1) entered disabled state [ 625.795297] device bridge_slave_0 left promiscuous mode [ 625.805891] bridge0: port 1(bridge_slave_0) entered disabled state [ 625.871498] FAULT_INJECTION: forcing a failure. [ 625.871498] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 625.907056] CPU: 1 PID: 15554 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 625.913851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.923207] Call Trace: [ 625.925809] dump_stack+0x172/0x1f0 [ 625.929448] should_fail.cold+0xa/0x1b [ 625.933349] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 625.938470] ? ___might_sleep+0x163/0x280 [ 625.942644] should_fail_alloc_page+0x50/0x60 [ 625.947327] __alloc_pages_nodemask+0x1a1/0x710 [ 625.952008] ? __alloc_pages_slowpath+0x2900/0x2900 [ 625.957031] ? ___might_sleep+0x163/0x280 [ 625.961212] ? copyin+0xb5/0x100 [ 625.964588] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 625.970136] alloc_pages_current+0x107/0x210 [ 625.974551] pipe_write+0xa65/0xfb0 [ 625.978199] __vfs_write+0x613/0x8e0 [ 625.981921] ? kernel_read+0x120/0x120 [ 625.985822] ? common_file_perm+0x1d6/0x6f0 [ 625.990150] ? apparmor_file_permission+0x25/0x30 [ 625.995001] ? rw_verify_area+0x118/0x360 [ 625.999153] vfs_write+0x20c/0x580 [ 626.002711] ksys_write+0xea/0x1f0 [ 626.006257] ? __ia32_sys_read+0xb0/0xb0 [ 626.010325] ? do_fast_syscall_32+0xd1/0xc98 [ 626.014735] ? entry_SYSENTER_compat+0x70/0x7f [ 626.019801] ? do_fast_syscall_32+0xd1/0xc98 [ 626.024319] __ia32_sys_write+0x71/0xb0 [ 626.028298] do_fast_syscall_32+0x281/0xc98 [ 626.032631] entry_SYSENTER_compat+0x70/0x7f [ 626.037040] RIP: 0023:0xf7fdf869 [ 626.040412] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 626.059404] RSP: 002b:00000000f5dba0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 626.067124] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000020000340 [ 626.074395] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 626.074404] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 626.074413] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 626.074421] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 626.197085] device hsr_slave_1 left promiscuous mode [ 626.243655] device hsr_slave_0 left promiscuous mode [ 626.288539] team0 (unregistering): Port device team_slave_1 removed [ 626.300483] team0 (unregistering): Port device team_slave_0 removed [ 626.311754] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 626.359109] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 626.452681] bond0 (unregistering): Released all slaves [ 627.149558] IPVS: ftp: loaded support on port[0] = 21 [ 627.259835] chnl_net:caif_netlink_parms(): no params data found [ 627.315346] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.323903] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.337570] device bridge_slave_0 entered promiscuous mode [ 627.348553] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.358816] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.368898] device bridge_slave_1 entered promiscuous mode [ 627.399090] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 627.412619] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 627.441577] team0: Port device team_slave_0 added [ 627.451893] team0: Port device team_slave_1 added [ 627.527160] device hsr_slave_0 entered promiscuous mode [ 627.604219] device hsr_slave_1 entered promiscuous mode [ 627.711580] 8021q: adding VLAN 0 to HW filter on device bond0 [ 627.724558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 627.731538] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 627.741545] 8021q: adding VLAN 0 to HW filter on device team0 [ 627.751499] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 627.759504] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 627.767830] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.774243] bridge0: port 1(bridge_slave_0) entered forwarding state [ 627.782437] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 627.795514] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 627.803354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 627.811400] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.817814] bridge0: port 2(bridge_slave_1) entered forwarding state [ 627.826040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 627.844336] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 627.852595] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 627.860579] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 627.868964] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 627.878815] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 627.886619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 627.894302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 627.904963] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 627.916524] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 627.923448] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 627.930558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 627.938297] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 627.962925] 8021q: adding VLAN 0 to HW filter on device batadv0 17:05:25 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x3f00}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x5, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:25 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, 0x0, 0x0) 17:05:25 executing program 4 (fault-call:2 fault-nth:56): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:25 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:25 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x4000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 628.100197] FAULT_INJECTION: forcing a failure. [ 628.100197] name fail_page_alloc, interval 1, probability 0, space 0, times 0 17:05:25 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x4800}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 628.154340] CPU: 1 PID: 15577 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 628.161145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 628.170511] Call Trace: [ 628.173120] dump_stack+0x172/0x1f0 [ 628.176767] should_fail.cold+0xa/0x1b [ 628.180674] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 628.185788] ? ___might_sleep+0x163/0x280 [ 628.189964] should_fail_alloc_page+0x50/0x60 [ 628.194474] __alloc_pages_nodemask+0x1a1/0x710 [ 628.199168] ? __alloc_pages_slowpath+0x2900/0x2900 17:05:25 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x4c00}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 628.204191] ? ___might_sleep+0x163/0x280 [ 628.208350] ? copyin+0xb5/0x100 [ 628.211729] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 628.217279] alloc_pages_current+0x107/0x210 [ 628.221708] pipe_write+0xa65/0xfb0 [ 628.225359] __vfs_write+0x613/0x8e0 [ 628.229092] ? kernel_read+0x120/0x120 [ 628.232991] ? common_file_perm+0x1d6/0x6f0 [ 628.237329] ? apparmor_file_permission+0x25/0x30 [ 628.242194] ? rw_verify_area+0x118/0x360 [ 628.246352] vfs_write+0x20c/0x580 [ 628.249911] ksys_write+0xea/0x1f0 17:05:25 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x6800}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 628.253473] ? __ia32_sys_read+0xb0/0xb0 [ 628.257549] ? do_fast_syscall_32+0xd1/0xc98 [ 628.261988] ? entry_SYSENTER_compat+0x70/0x7f [ 628.266587] ? do_fast_syscall_32+0xd1/0xc98 [ 628.271189] __ia32_sys_write+0x71/0xb0 [ 628.275180] do_fast_syscall_32+0x281/0xc98 [ 628.279781] entry_SYSENTER_compat+0x70/0x7f [ 628.284191] RIP: 0023:0xf7fdf869 17:05:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x7, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:25 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) 17:05:25 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x6c00}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 628.287569] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 628.306476] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 628.306492] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 628.306501] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 628.306510] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 628.306519] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 628.306528] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:25 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000), 0x0) 17:05:25 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x7400}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:25 executing program 2: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) 17:05:25 executing program 4 (fault-call:2 fault-nth:57): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x8, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:25 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:25 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x7a00}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:25 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x9, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:26 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0xfeffff}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 628.953748] FAULT_INJECTION: forcing a failure. [ 628.953748] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 628.991019] CPU: 1 PID: 15652 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 628.997820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.007202] Call Trace: [ 629.009808] dump_stack+0x172/0x1f0 [ 629.013456] should_fail.cold+0xa/0x1b [ 629.017366] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 629.022926] ? ___might_sleep+0x163/0x280 [ 629.027086] should_fail_alloc_page+0x50/0x60 [ 629.031617] __alloc_pages_nodemask+0x1a1/0x710 [ 629.036300] ? __alloc_pages_slowpath+0x2900/0x2900 [ 629.041347] ? ___might_sleep+0x163/0x280 [ 629.045514] ? copyin+0xb5/0x100 [ 629.045532] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 629.045552] alloc_pages_current+0x107/0x210 [ 629.045571] pipe_write+0xa65/0xfb0 [ 629.045596] __vfs_write+0x613/0x8e0 [ 629.066212] ? kernel_read+0x120/0x120 [ 629.070113] ? common_file_perm+0x1d6/0x6f0 [ 629.074466] ? apparmor_file_permission+0x25/0x30 [ 629.079334] ? rw_verify_area+0x118/0x360 [ 629.079483] FAULT_INJECTION: forcing a failure. [ 629.079483] name failslab, interval 1, probability 0, space 0, times 0 [ 629.083496] vfs_write+0x20c/0x580 [ 629.083517] ksys_write+0xea/0x1f0 [ 629.083534] ? __ia32_sys_read+0xb0/0xb0 [ 629.083556] ? do_fast_syscall_32+0xd1/0xc98 [ 629.110229] ? entry_SYSENTER_compat+0x70/0x7f [ 629.114819] ? do_fast_syscall_32+0xd1/0xc98 [ 629.119236] __ia32_sys_write+0x71/0xb0 [ 629.123223] do_fast_syscall_32+0x281/0xc98 [ 629.127565] entry_SYSENTER_compat+0x70/0x7f [ 629.131977] RIP: 0023:0xf7fdf869 [ 629.135352] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 17:05:26 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) [ 629.154259] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 629.161975] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 629.169249] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 629.176521] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 629.183793] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 629.191149] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 629.198447] CPU: 0 PID: 15664 Comm: syz-executor.2 Not tainted 5.0.0 #4 [ 629.205218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.214576] Call Trace: [ 629.217172] dump_stack+0x172/0x1f0 [ 629.220816] should_fail.cold+0xa/0x1b [ 629.224711] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 629.229823] ? lock_downgrade+0x810/0x810 [ 629.233984] ? ___might_sleep+0x163/0x280 [ 629.238145] __should_failslab+0x121/0x190 [ 629.242386] should_failslab+0x9/0x14 [ 629.246195] kmem_cache_alloc_node_trace+0x270/0x720 [ 629.251312] __kmalloc_node+0x3d/0x70 [ 629.255123] kvmalloc_node+0x68/0x100 [ 629.258950] vmemdup_user+0x27/0xb0 [ 629.262602] __sctp_setsockopt_connectx+0x45/0x1a0 [ 629.267532] ? lock_sock_nested+0xe2/0x120 [ 629.271779] sctp_setsockopt+0x1bb2/0x5130 [ 629.276015] ? __fget+0x340/0x540 [ 629.279478] ? sctp_setsockopt_paddr_thresholds+0x420/0x420 [ 629.285288] ? ___might_sleep+0x163/0x280 [ 629.289439] ? __might_sleep+0x95/0x190 [ 629.293415] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 629.298359] ? aa_sk_perm+0x1c6/0x7c0 [ 629.302198] ? aa_sock_opt_perm.isra.0+0xa1/0x130 [ 629.307050] compat_sock_common_setsockopt+0x10e/0x150 [ 629.312338] __compat_sys_setsockopt+0x192/0x670 [ 629.317093] ? sock_common_setsockopt+0xe0/0xe0 [ 629.321767] ? __compat_sys_getsockopt+0x640/0x640 [ 629.326706] ? __ia32_sys_read+0xb0/0xb0 [ 629.330775] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 629.335532] ? do_fast_syscall_32+0xd1/0xc98 [ 629.339938] ? entry_SYSENTER_compat+0x70/0x7f [ 629.344532] ? do_fast_syscall_32+0xd1/0xc98 [ 629.348945] __ia32_compat_sys_setsockopt+0xbd/0x150 [ 629.354056] do_fast_syscall_32+0x281/0xc98 [ 629.358383] entry_SYSENTER_compat+0x70/0x7f [ 629.362789] RIP: 0023:0xf7fba869 [ 629.366155] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 629.385061] RSP: 002b:00000000f5db60cc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 629.392776] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000084 17:05:26 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:26 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0xa, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) [ 629.400054] RDX: 000000000000006b RSI: 0000000020000080 RDI: 000000000000001c [ 629.407411] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 629.415814] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 629.423084] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:26 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000), 0x0) 17:05:26 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x1000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:26 executing program 4 (fault-call:2 fault-nth:58): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:26 executing program 2 (fault-call:1 fault-nth:1): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:26 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0xb, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) [ 629.630084] FAULT_INJECTION: forcing a failure. [ 629.630084] name failslab, interval 1, probability 0, space 0, times 0 [ 629.642409] CPU: 0 PID: 15692 Comm: syz-executor.2 Not tainted 5.0.0 #4 [ 629.649170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.658527] Call Trace: [ 629.661122] dump_stack+0x172/0x1f0 [ 629.664765] should_fail.cold+0xa/0x1b [ 629.668663] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 629.673781] ? mark_held_locks+0xb1/0x100 [ 629.677947] __should_failslab+0x121/0x190 [ 629.682192] should_failslab+0x9/0x14 [ 629.685995] kmem_cache_alloc+0x47/0x6f0 [ 629.690062] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 629.695096] sctp_get_port_local+0x435/0x1670 [ 629.699603] ? sctp_unhash+0x10/0x10 [ 629.703314] ? kasan_check_read+0x11/0x20 [ 629.707477] ? sctp_bind_addr_match+0x1e8/0x2d0 [ 629.712154] ? sctp_inet6_bind_verify+0xae/0x4f0 [ 629.716915] sctp_do_bind+0x215/0x5d0 [ 629.720726] sctp_autobind+0x16d/0x1f0 [ 629.724619] ? sctp_do_bind+0x5d0/0x5d0 [ 629.728594] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 629.733785] ? __ipv6_addr_type+0x219/0x32d [ 629.738115] ? sctp_endpoint_is_peeled_off+0xf2/0x130 [ 629.743314] __sctp_connect+0x78a/0xce0 [ 629.747304] ? sctp_sendmsg_to_asoc+0x17c0/0x17c0 [ 629.752154] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 629.757705] ? _copy_from_user+0xdd/0x150 [ 629.761857] ? security_sctp_bind_connect+0x99/0xd0 [ 629.766881] __sctp_setsockopt_connectx+0x133/0x1a0 [ 629.771907] sctp_setsockopt+0x1bb2/0x5130 [ 629.776144] ? __fget+0x340/0x540 [ 629.779601] ? sctp_setsockopt_paddr_thresholds+0x420/0x420 [ 629.785319] ? ___might_sleep+0x163/0x280 [ 629.789480] ? __might_sleep+0x95/0x190 [ 629.793459] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 629.798389] ? aa_sk_perm+0x1c6/0x7c0 [ 629.802199] ? aa_sock_opt_perm.isra.0+0xa1/0x130 [ 629.807052] compat_sock_common_setsockopt+0x10e/0x150 [ 629.812349] __compat_sys_setsockopt+0x192/0x670 [ 629.817113] ? sock_common_setsockopt+0xe0/0xe0 [ 629.821785] ? __compat_sys_getsockopt+0x640/0x640 [ 629.826719] ? __ia32_sys_read+0xb0/0xb0 [ 629.830784] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 629.835549] ? do_fast_syscall_32+0xd1/0xc98 [ 629.839958] ? entry_SYSENTER_compat+0x70/0x7f [ 629.844546] ? do_fast_syscall_32+0xd1/0xc98 [ 629.848966] __ia32_compat_sys_setsockopt+0xbd/0x150 [ 629.854075] do_fast_syscall_32+0x281/0xc98 [ 629.858403] entry_SYSENTER_compat+0x70/0x7f [ 629.862815] RIP: 0023:0xf7fba869 17:05:26 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 629.866189] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 629.885092] RSP: 002b:00000000f5db60cc EFLAGS: 00000296 ORIG_RAX: 000000000000016e [ 629.892806] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000084 [ 629.900077] RDX: 000000000000006b RSI: 0000000020000080 RDI: 000000000000001c [ 629.907344] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 629.914620] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 629.921977] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:27 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x2000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0xc, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:27 executing program 2 (fault-call:1 fault-nth:2): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) [ 630.037858] FAULT_INJECTION: forcing a failure. [ 630.037858] name fail_page_alloc, interval 1, probability 0, space 0, times 0 17:05:27 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 630.108737] CPU: 0 PID: 15689 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 630.115540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.124902] Call Trace: [ 630.127529] dump_stack+0x172/0x1f0 [ 630.131174] should_fail.cold+0xa/0x1b [ 630.135076] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 630.140200] ? ___might_sleep+0x163/0x280 [ 630.144364] should_fail_alloc_page+0x50/0x60 [ 630.148872] __alloc_pages_nodemask+0x1a1/0x710 [ 630.153542] ? __alloc_pages_slowpath+0x2900/0x2900 17:05:27 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x3000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 630.158566] ? ___might_sleep+0x163/0x280 [ 630.162724] ? copyin+0xb5/0x100 [ 630.166104] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 630.171685] alloc_pages_current+0x107/0x210 [ 630.176109] pipe_write+0xa65/0xfb0 [ 630.179758] __vfs_write+0x613/0x8e0 [ 630.183487] ? kernel_read+0x120/0x120 [ 630.187388] ? common_file_perm+0x1d6/0x6f0 [ 630.191725] ? apparmor_file_permission+0x25/0x30 [ 630.196587] ? rw_verify_area+0x118/0x360 [ 630.200755] vfs_write+0x20c/0x580 [ 630.204305] ksys_write+0xea/0x1f0 17:05:27 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x4000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 630.207857] ? __ia32_sys_read+0xb0/0xb0 [ 630.211927] ? do_fast_syscall_32+0xd1/0xc98 [ 630.216342] ? entry_SYSENTER_compat+0x70/0x7f [ 630.220947] ? do_fast_syscall_32+0xd1/0xc98 [ 630.225384] __ia32_sys_write+0x71/0xb0 [ 630.229378] do_fast_syscall_32+0x281/0xc98 [ 630.233722] entry_SYSENTER_compat+0x70/0x7f [ 630.238141] RIP: 0023:0xf7fdf869 [ 630.241506] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 630.260418] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 630.268159] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 630.275435] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 630.282716] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 630.290099] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 630.297370] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:27 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x529, 0x141) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x0) read$FUSE(r1, &(0x7f0000000240), 0x1000) write$evdev(r0, &(0x7f0000000000), 0x0) 17:05:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0xd, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:27 executing program 4 (fault-call:2 fault-nth:59): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:27 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x5000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:27 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x10, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:27 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x6000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) [ 630.590827] FAULT_INJECTION: forcing a failure. [ 630.590827] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 630.608997] CPU: 1 PID: 15750 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 630.615816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.615824] Call Trace: [ 630.615849] dump_stack+0x172/0x1f0 [ 630.615872] should_fail.cold+0xa/0x1b [ 630.615893] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 630.615911] ? ___might_sleep+0x163/0x280 [ 630.615934] should_fail_alloc_page+0x50/0x60 [ 630.615950] __alloc_pages_nodemask+0x1a1/0x710 [ 630.615973] ? __alloc_pages_slowpath+0x2900/0x2900 [ 630.615990] ? ___might_sleep+0x163/0x280 [ 630.616009] ? copyin+0xb5/0x100 [ 630.616030] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 630.656904] alloc_pages_current+0x107/0x210 [ 630.656927] pipe_write+0xa65/0xfb0 [ 630.656955] __vfs_write+0x613/0x8e0 [ 630.656972] ? kernel_read+0x120/0x120 [ 630.656988] ? common_file_perm+0x1d6/0x6f0 [ 630.657013] ? apparmor_file_permission+0x25/0x30 [ 630.675064] ? rw_verify_area+0x118/0x360 [ 630.675084] vfs_write+0x20c/0x580 [ 630.675105] ksys_write+0xea/0x1f0 [ 630.675123] ? __ia32_sys_read+0xb0/0xb0 [ 630.675141] ? do_fast_syscall_32+0xd1/0xc98 [ 630.675155] ? entry_SYSENTER_compat+0x70/0x7f [ 630.675169] ? do_fast_syscall_32+0xd1/0xc98 [ 630.675187] __ia32_sys_write+0x71/0xb0 [ 630.690801] do_fast_syscall_32+0x281/0xc98 [ 630.690825] entry_SYSENTER_compat+0x70/0x7f 17:05:27 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:27 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x11, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:27 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x7000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:27 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0xa000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 630.690837] RIP: 0023:0xf7fdf869 [ 630.690852] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 630.690861] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 630.690875] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 630.690886] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 630.786028] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 630.793312] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 630.800595] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x12, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:28 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0xf000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:28 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:28 executing program 4 (fault-call:2 fault-nth:60): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:28 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x3f000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:05:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x13, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) [ 631.055079] FAULT_INJECTION: forcing a failure. [ 631.055079] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 631.104542] CPU: 1 PID: 15793 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 631.111345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.120700] Call Trace: [ 631.123308] dump_stack+0x172/0x1f0 [ 631.126956] should_fail.cold+0xa/0x1b [ 631.130857] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 631.135996] ? ___might_sleep+0x163/0x280 [ 631.140160] should_fail_alloc_page+0x50/0x60 [ 631.144677] __alloc_pages_nodemask+0x1a1/0x710 [ 631.149353] ? __alloc_pages_slowpath+0x2900/0x2900 [ 631.154373] ? ___might_sleep+0x163/0x280 [ 631.158532] ? copyin+0xb5/0x100 [ 631.161902] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 631.167446] alloc_pages_current+0x107/0x210 [ 631.171862] pipe_write+0xa65/0xfb0 [ 631.175505] __vfs_write+0x613/0x8e0 [ 631.179225] ? kernel_read+0x120/0x120 [ 631.183146] ? common_file_perm+0x1d6/0x6f0 [ 631.187477] ? apparmor_file_permission+0x25/0x30 [ 631.192326] ? rw_verify_area+0x118/0x360 [ 631.196486] vfs_write+0x20c/0x580 [ 631.200036] ksys_write+0xea/0x1f0 [ 631.203578] ? __ia32_sys_read+0xb0/0xb0 [ 631.207660] ? do_fast_syscall_32+0xd1/0xc98 [ 631.212093] ? entry_SYSENTER_compat+0x70/0x7f [ 631.216681] ? do_fast_syscall_32+0xd1/0xc98 [ 631.221112] __ia32_sys_write+0x71/0xb0 [ 631.225094] do_fast_syscall_32+0x281/0xc98 [ 631.229421] entry_SYSENTER_compat+0x70/0x7f [ 631.233913] RIP: 0023:0xf7fdf869 [ 631.237282] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 631.256195] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 631.264166] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 631.271433] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 631.279140] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 631.286405] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 631.293677] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x2, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:28 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:28 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x40000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x14, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:28 executing program 4 (fault-call:2 fault-nth:61): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x3, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:28 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x48000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x15, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:28 executing program 1: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 17:05:28 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:28 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x4, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:28 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x4c000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x16, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) [ 631.668084] FAULT_INJECTION: forcing a failure. [ 631.668084] name fail_page_alloc, interval 1, probability 0, space 0, times 0 17:05:28 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x68000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 631.741693] CPU: 1 PID: 15831 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 631.748495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.757846] Call Trace: [ 631.760445] dump_stack+0x172/0x1f0 [ 631.764092] should_fail.cold+0xa/0x1b [ 631.767996] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 631.773109] ? ___might_sleep+0x163/0x280 [ 631.777273] should_fail_alloc_page+0x50/0x60 [ 631.781776] __alloc_pages_nodemask+0x1a1/0x710 [ 631.786456] ? __alloc_pages_slowpath+0x2900/0x2900 [ 631.791499] ? ___might_sleep+0x163/0x280 [ 631.795658] ? copyin+0xb5/0x100 [ 631.799048] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 631.804600] alloc_pages_current+0x107/0x210 [ 631.809022] pipe_write+0xa65/0xfb0 [ 631.812680] __vfs_write+0x613/0x8e0 [ 631.816410] ? kernel_read+0x120/0x120 [ 631.820302] ? common_file_perm+0x1d6/0x6f0 [ 631.824642] ? apparmor_file_permission+0x25/0x30 [ 631.829510] ? rw_verify_area+0x118/0x360 [ 631.833679] vfs_write+0x20c/0x580 [ 631.837229] ksys_write+0xea/0x1f0 [ 631.840778] ? __ia32_sys_read+0xb0/0xb0 [ 631.844847] ? do_fast_syscall_32+0xd1/0xc98 [ 631.844862] ? entry_SYSENTER_compat+0x70/0x7f [ 631.844877] ? do_fast_syscall_32+0xd1/0xc98 [ 631.844895] __ia32_sys_write+0x71/0xb0 [ 631.862234] do_fast_syscall_32+0x281/0xc98 [ 631.866572] entry_SYSENTER_compat+0x70/0x7f [ 631.870989] RIP: 0023:0xf7fdf869 17:05:28 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x17, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:28 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x6c000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 631.874361] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 631.893266] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 631.893280] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 631.893288] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 631.893296] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 631.893304] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 631.893313] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:29 executing program 4 (fault-call:2 fault-nth:62): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:29 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:29 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) r0 = socket$kcm(0xa, 0x6, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000100)) setsockopt$sock_attach_bpf(r0, 0x1, 0x7, &(0x7f00000000c0), 0x4) 17:05:29 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x74000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x5, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:29 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x18, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:29 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x7a000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:29 executing program 1: sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x9) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgroups(0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x800010b, 0x18) 17:05:29 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0xfeffffff}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:29 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x19, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) [ 632.167624] FAULT_INJECTION: forcing a failure. [ 632.167624] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 632.227754] CPU: 0 PID: 15903 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 632.234584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.243943] Call Trace: [ 632.246556] dump_stack+0x172/0x1f0 [ 632.250204] should_fail.cold+0xa/0x1b [ 632.254108] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 632.259228] ? ___might_sleep+0x163/0x280 [ 632.263398] should_fail_alloc_page+0x50/0x60 [ 632.267903] __alloc_pages_nodemask+0x1a1/0x710 [ 632.272586] ? __alloc_pages_slowpath+0x2900/0x2900 [ 632.277614] ? ___might_sleep+0x163/0x280 [ 632.281777] ? copyin+0xb5/0x100 [ 632.285158] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 632.290716] alloc_pages_current+0x107/0x210 [ 632.295140] pipe_write+0xa65/0xfb0 [ 632.298784] __vfs_write+0x613/0x8e0 [ 632.302514] ? kernel_read+0x120/0x120 [ 632.306411] ? common_file_perm+0x1d6/0x6f0 [ 632.310750] ? apparmor_file_permission+0x25/0x30 [ 632.315612] ? rw_verify_area+0x118/0x360 [ 632.319772] vfs_write+0x20c/0x580 [ 632.323320] ksys_write+0xea/0x1f0 17:05:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x7, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) [ 632.326868] ? __ia32_sys_read+0xb0/0xb0 [ 632.330949] ? do_fast_syscall_32+0xd1/0xc98 [ 632.335402] ? entry_SYSENTER_compat+0x70/0x7f [ 632.340001] ? do_fast_syscall_32+0xd1/0xc98 [ 632.344426] __ia32_sys_write+0x71/0xb0 [ 632.348417] do_fast_syscall_32+0x281/0xc98 [ 632.352759] entry_SYSENTER_compat+0x70/0x7f [ 632.357172] RIP: 0023:0xf7fdf869 [ 632.360545] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 632.379461] RSP: 002b:00000000f5ddb0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 632.387175] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 632.394449] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 632.394458] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 632.394466] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 632.394474] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:29 executing program 4 (fault-call:2 fault-nth:63): perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:29 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x1e, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:29 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0xfffffe00}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x8, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:29 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:29 executing program 1: pipe(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) close(r0) syz_open_procfs(0x0, &(0x7f0000000080)='net/dev\x00') splice(r0, 0x0, r1, 0x0, 0x11004, 0x0) [ 632.538812] [ 632.540495] ====================================================== [ 632.546814] WARNING: possible circular locking dependency detected [ 632.553132] 5.0.0 #4 Not tainted [ 632.556495] ------------------------------------------------------ [ 632.562809] syz-executor.1/15943 is trying to acquire lock: [ 632.568510] 00000000261d4757 (&p->lock){+.+.}, at: seq_read+0x71/0x1130 [ 632.575278] [ 632.575278] but task is already holding lock: [ 632.581234] 000000003df2301d (&pipe->mutex/1){+.+.}, at: pipe_lock+0x6e/0x80 [ 632.588431] [ 632.588431] which lock already depends on the new lock. [ 632.588431] [ 632.596738] [ 632.596738] the existing dependency chain (in reverse order) is: [ 632.604348] [ 632.604348] -> #2 (&pipe->mutex/1){+.+.}: [ 632.609984] __mutex_lock+0xf7/0x1310 [ 632.614405] mutex_lock_nested+0x16/0x20 [ 632.618979] fifo_open+0x159/0xb00 [ 632.623040] do_dentry_open+0x47d/0x1130 [ 632.627624] vfs_open+0xa0/0xd0 [ 632.631420] path_openat+0x10d7/0x4690 [ 632.635826] do_filp_open+0x1a1/0x280 [ 632.640144] do_open_execat+0x13b/0x6d0 [ 632.644631] __do_execve_file.isra.0+0x178d/0x23f0 [ 632.650077] __ia32_compat_sys_execve+0x94/0xc0 [ 632.655265] do_fast_syscall_32+0x281/0xc98 [ 632.660105] entry_SYSENTER_compat+0x70/0x7f [ 632.665019] [ 632.665019] -> #1 (&sig->cred_guard_mutex){+.+.}: [ 632.671344] __mutex_lock+0xf7/0x1310 [ 632.675661] mutex_lock_killable_nested+0x16/0x20 [ 632.681028] lock_trace+0x4a/0xe0 [ 632.685012] proc_pid_syscall+0x98/0x250 [ 632.689692] proc_single_show+0xf6/0x180 [ 632.694291] seq_read+0x4db/0x1130 [ 632.698346] do_iter_read+0x4a9/0x660 [ 632.702750] compat_readv+0x18e/0x200 [ 632.707066] do_compat_preadv64+0x190/0x1c0 [ 632.711904] __ia32_compat_sys_preadv+0xc7/0x140 [ 632.717349] do_fast_syscall_32+0x281/0xc98 [ 632.722188] entry_SYSENTER_compat+0x70/0x7f [ 632.727100] [ 632.727100] -> #0 (&p->lock){+.+.}: [ 632.732207] lock_acquire+0x16f/0x3f0 [ 632.736523] __mutex_lock+0xf7/0x1310 [ 632.740839] mutex_lock_nested+0x16/0x20 [ 632.745416] seq_read+0x71/0x1130 [ 632.749383] proc_reg_read+0x1fa/0x2c0 [ 632.753783] do_iter_read+0x4a9/0x660 [ 632.758096] vfs_readv+0xf0/0x160 [ 632.762065] default_file_splice_read+0x475/0x890 [ 632.767427] do_splice_to+0x12a/0x190 [ 632.771743] do_splice+0xf7c/0x1330 [ 632.775886] __ia32_sys_splice+0x2c4/0x330 [ 632.780645] do_fast_syscall_32+0x281/0xc98 [ 632.785497] entry_SYSENTER_compat+0x70/0x7f [ 632.790411] [ 632.790411] other info that might help us debug this: [ 632.790411] [ 632.798535] Chain exists of: [ 632.798535] &p->lock --> &sig->cred_guard_mutex --> &pipe->mutex/1 [ 632.798535] [ 632.809459] Possible unsafe locking scenario: [ 632.809459] [ 632.815504] CPU0 CPU1 [ 632.820771] ---- ---- [ 632.825424] lock(&pipe->mutex/1); [ 632.829048] lock(&sig->cred_guard_mutex); [ 632.835873] lock(&pipe->mutex/1); [ 632.842012] lock(&p->lock); [ 632.845108] [ 632.845108] *** DEADLOCK *** [ 632.845108] [ 632.851172] 1 lock held by syz-executor.1/15943: [ 632.855909] #0: 000000003df2301d (&pipe->mutex/1){+.+.}, at: pipe_lock+0x6e/0x80 [ 632.863542] [ 632.863542] stack backtrace: [ 632.868034] CPU: 1 PID: 15943 Comm: syz-executor.1 Not tainted 5.0.0 #4 [ 632.874795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.884140] Call Trace: [ 632.886730] dump_stack+0x172/0x1f0 [ 632.890628] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 632.895991] __lock_acquire+0x2f00/0x4700 [ 632.900140] ? mark_held_locks+0x100/0x100 [ 632.904453] ? __lock_acquire+0x53b/0x4700 [ 632.908692] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 632.913790] ? depot_save_stack+0x1de/0x460 [ 632.918111] ? lockdep_hardirqs_on+0x415/0x5d0 [ 632.922693] ? trace_hardirqs_on+0x67/0x230 [ 632.927010] ? kasan_check_read+0x11/0x20 [ 632.931172] ? __lock_is_held+0xb6/0x140 [ 632.935235] ? seq_read+0x71/0x1130 [ 632.938858] lock_acquire+0x16f/0x3f0 [ 632.942661] ? seq_read+0x71/0x1130 [ 632.946300] ? seq_read+0x71/0x1130 [ 632.949928] __mutex_lock+0xf7/0x1310 [ 632.953726] ? seq_read+0x71/0x1130 [ 632.957361] ? seq_read+0x71/0x1130 [ 632.960992] ? mutex_trylock+0x1e0/0x1e0 [ 632.965050] ? aa_file_perm+0x3f6/0xdc0 [ 632.969029] ? __lock_is_held+0xb6/0x140 [ 632.973089] ? aa_path_link+0x460/0x460 [ 632.977062] ? seq_dentry+0x2d0/0x2d0 [ 632.980863] mutex_lock_nested+0x16/0x20 [ 632.984922] ? mutex_lock_nested+0x16/0x20 [ 632.989155] seq_read+0x71/0x1130 [ 632.992615] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 632.998158] ? seq_dentry+0x2d0/0x2d0 [ 633.001953] proc_reg_read+0x1fa/0x2c0 [ 633.005842] ? proc_reg_unlocked_ioctl+0x2a0/0x2a0 [ 633.010816] ? rw_verify_area+0x118/0x360 [ 633.014975] do_iter_read+0x4a9/0x660 [ 633.018775] ? dup_iter+0x260/0x260 [ 633.022907] vfs_readv+0xf0/0x160 [ 633.026359] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 633.031721] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 633.037256] ? push_pipe+0x417/0x7a0 [ 633.040966] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 633.046499] ? iov_iter_get_pages_alloc+0x3ae/0x1260 [ 633.051601] ? iov_iter_revert+0xaa0/0xaa0 [ 633.055831] ? aa_file_perm+0x3cf/0xdc0 [ 633.059799] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 633.064811] ? iov_iter_pipe+0xba/0x2f0 [ 633.068799] default_file_splice_read+0x475/0x890 [ 633.073640] ? iter_file_splice_write+0xbe0/0xbe0 [ 633.078490] ? pipe_lock+0x6e/0x80 [ 633.082030] ? lock_acquire+0x16f/0x3f0 [ 633.086001] ? pipe_lock+0x6e/0x80 [ 633.089538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 633.095070] ? fsnotify+0x395/0xbd0 [ 633.098709] ? security_file_permission+0x94/0x320 [ 633.103636] ? rw_verify_area+0x118/0x360 [ 633.107789] ? iter_file_splice_write+0xbe0/0xbe0 [ 633.112629] do_splice_to+0x12a/0x190 [ 633.116434] do_splice+0xf7c/0x1330 [ 633.120080] ? iterate_fd+0x360/0x360 [ 633.123887] ? opipe_prep.part.0+0x2d0/0x2d0 [ 633.128292] ? __fget_light+0x1a9/0x230 [ 633.132291] __ia32_sys_splice+0x2c4/0x330 [ 633.136526] do_fast_syscall_32+0x281/0xc98 [ 633.140847] entry_SYSENTER_compat+0x70/0x7f [ 633.145247] RIP: 0023:0xf7f63869 [ 633.148610] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 633.167507] RSP: 002b:00000000f5d5f0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 633.175211] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 633.182481] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000011004 [ 633.189762] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 633.197027] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 633.204288] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 17:05:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x9, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:30 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0xfffffffe}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x21, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:30 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 633.244496] kobject: 'loop2' (00000000d99aeab1): kobject_uevent_env [ 633.250963] kobject: 'loop2' (00000000d99aeab1): fill_kobj_path: path = '/devices/virtual/block/loop2' 17:05:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0xa, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:30 executing program 1: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000580)={0x2, 0x0, @remote}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) [ 633.298802] kobject: 'loop3' (00000000b2a6da2f): kobject_uevent_env [ 633.328918] kobject: 'loop3' (00000000b2a6da2f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 633.341787] kobject: 'loop5' (0000000087db4b27): kobject_uevent_env [ 633.350912] kobject: 'loop5' (0000000087db4b27): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 633.369006] kobject: 'loop1' (000000008c50320a): kobject_uevent_env [ 633.385186] FAULT_INJECTION: forcing a failure. [ 633.385186] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 633.399028] kobject: 'loop1' (000000008c50320a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 633.404024] CPU: 1 PID: 15969 Comm: syz-executor.4 Not tainted 5.0.0 #4 [ 633.413572] kobject: 'loop1' (000000008c50320a): kobject_uevent_env [ 633.415228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.415233] Call Trace: [ 633.415254] dump_stack+0x172/0x1f0 [ 633.415270] should_fail.cold+0xa/0x1b [ 633.415285] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 633.415301] ? ___might_sleep+0x163/0x280 [ 633.415318] should_fail_alloc_page+0x50/0x60 [ 633.415331] __alloc_pages_nodemask+0x1a1/0x710 [ 633.415348] ? __alloc_pages_slowpath+0x2900/0x2900 [ 633.415364] ? ___might_sleep+0x163/0x280 [ 633.421897] kobject: 'loop1' (000000008c50320a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 633.431109] ? copyin+0xb5/0x100 [ 633.431126] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 633.431144] alloc_pages_current+0x107/0x210 [ 633.431161] pipe_write+0xa65/0xfb0 [ 633.495032] __vfs_write+0x613/0x8e0 [ 633.498735] ? kernel_read+0x120/0x120 [ 633.502612] ? common_file_perm+0x1d6/0x6f0 [ 633.506929] ? apparmor_file_permission+0x25/0x30 [ 633.511770] ? rw_verify_area+0x118/0x360 [ 633.515911] vfs_write+0x20c/0x580 [ 633.519456] ksys_write+0xea/0x1f0 [ 633.523090] ? __ia32_sys_read+0xb0/0xb0 [ 633.527147] ? prepare_exit_to_usermode+0x279/0x2e0 [ 633.532149] ? entry_SYSENTER_compat+0x68/0x7f [ 633.536725] __ia32_sys_write+0x71/0xb0 [ 633.540710] do_fast_syscall_32+0x281/0xc98 [ 633.545037] entry_SYSENTER_compat+0x70/0x7f [ 633.549439] RIP: 0023:0xf7fdf869 [ 633.552806] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 633.571721] RSP: 002b:00000000f5dba0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000004 [ 633.579432] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000020000340 [ 633.586700] RDX: 0000000041395527 RSI: 0000000000000000 RDI: 0000000000000000 [ 633.593967] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 633.601231] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 633.608494] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 633.623650] kobject: 'loop2' (00000000d99aeab1): kobject_uevent_env [ 633.638832] kobject: 'loop2' (00000000d99aeab1): fill_kobj_path: path = '/devices/virtual/block/loop2' 17:05:30 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:30 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0xfeffff00000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x22, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:30 executing program 1: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000580)={0x2, 0x0, @remote}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) 17:05:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0xb, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:30 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 633.650004] kobject: 'loop5' (0000000087db4b27): kobject_uevent_env [ 633.656630] kobject: 'loop5' (0000000087db4b27): fill_kobj_path: path = '/devices/virtual/block/loop5' 17:05:30 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x100000000000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:30 executing program 1: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000580)={0x2, 0x0, @remote}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) [ 633.712047] kobject: 'loop4' (00000000a5b1f98f): kobject_uevent_env [ 633.746632] kobject: 'loop4' (00000000a5b1f98f): fill_kobj_path: path = '/devices/virtual/block/loop4' 17:05:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0xc, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:30 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x23, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) [ 633.763102] kobject: 'loop1' (000000008c50320a): kobject_uevent_env [ 633.782561] kobject: 'loop1' (000000008c50320a): fill_kobj_path: path = '/devices/virtual/block/loop1' 17:05:30 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:30 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x200000000000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 633.816762] kobject: 'loop2' (00000000d99aeab1): kobject_uevent_env [ 633.848685] kobject: 'loop2' (00000000d99aeab1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 633.887143] kobject: 'loop3' (00000000b2a6da2f): kobject_uevent_env [ 633.894063] kobject: 'loop3' (00000000b2a6da2f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 633.917881] kobject: 'loop5' (0000000087db4b27): kobject_uevent_env [ 633.938594] kobject: 'loop5' (0000000087db4b27): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 633.948791] kobject: 'loop3' (00000000b2a6da2f): kobject_uevent_env [ 633.959417] kobject: 'loop3' (00000000b2a6da2f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 633.970256] kobject: 'loop5' (0000000087db4b27): kobject_uevent_env [ 633.977019] kobject: 'loop5' (0000000087db4b27): fill_kobj_path: path = '/devices/virtual/block/loop5' 17:05:31 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0xd, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:31 executing program 1: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000580)={0x2, 0x0, @remote}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) 17:05:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x24, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:31 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x300000000000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:31 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x2000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:31 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x400000000000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 634.086696] kobject: 'loop4' (00000000a5b1f98f): kobject_uevent_env [ 634.093196] kobject: 'loop4' (00000000a5b1f98f): fill_kobj_path: path = '/devices/virtual/block/loop4' 17:05:31 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x10, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:31 executing program 1: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000580)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) [ 634.156604] kobject: 'loop3' (00000000b2a6da2f): kobject_uevent_env [ 634.181082] kobject: 'loop3' (00000000b2a6da2f): fill_kobj_path: path = '/devices/virtual/block/loop3' 17:05:31 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x500000000000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:31 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x65, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:31 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x600000000000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x3000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 634.202660] kobject: 'loop1' (000000008c50320a): kobject_uevent_env [ 634.220560] kobject: 'loop1' (000000008c50320a): fill_kobj_path: path = '/devices/virtual/block/loop1' 17:05:31 executing program 1: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) 17:05:31 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x700000000000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 634.262326] kobject: 'loop2' (00000000d99aeab1): kobject_uevent_env [ 634.286785] kobject: 'loop2' (00000000d99aeab1): fill_kobj_path: path = '/devices/virtual/block/loop2' 17:05:31 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x11, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:31 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6e, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:31 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) [ 634.316845] kobject: 'loop5' (0000000087db4b27): kobject_uevent_env [ 634.336194] kobject: 'loop5' (0000000087db4b27): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 634.352503] kobject: 'loop3' (00000000b2a6da2f): kobject_uevent_env 17:05:31 executing program 1: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) 17:05:31 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0xa00000000000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:31 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x12, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) [ 634.365902] kobject: 'loop3' (00000000b2a6da2f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 634.391116] kobject: 'loop4' (00000000a5b1f98f): kobject_uevent_env 17:05:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:31 executing program 1: r0 = socket$inet(0x15, 0x5, 0x0) bind$inet(r0, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) 17:05:31 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0xf00000000000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 634.415431] kobject: 'loop4' (00000000a5b1f98f): fill_kobj_path: path = '/devices/virtual/block/loop4' 17:05:31 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:31 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x13, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:31 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x3f00000000000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) [ 634.475622] kobject: 'loop3' (00000000b2a6da2f): kobject_uevent_env [ 634.482196] kobject: 'loop3' (00000000b2a6da2f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 634.502808] kobject: 'loop5' (0000000087db4b27): kobject_uevent_env [ 634.512254] kobject: 'loop5' (0000000087db4b27): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 634.523289] kobject: 'loop1' (000000008c50320a): kobject_uevent_env [ 634.530014] kobject: 'loop1' (000000008c50320a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 634.540005] kobject: 'loop4' (00000000a5b1f98f): kobject_uevent_env 17:05:31 executing program 1: r0 = socket$inet(0x15, 0x5, 0x0) connect$inet(r0, &(0x7f0000000580)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) [ 634.573894] kobject: 'loop4' (00000000a5b1f98f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 634.586626] kobject: 'loop1' (000000008c50320a): kobject_uevent_env [ 634.606699] kobject: 'loop1' (000000008c50320a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 634.629924] kobject: 'loop1' (000000008c50320a): kobject_uevent_env [ 634.641172] kobject: 'loop1' (000000008c50320a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 634.651251] kobject: 'loop4' (00000000a5b1f98f): kobject_uevent_env [ 634.659052] kobject: 'loop4' (00000000a5b1f98f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 634.669366] kobject: 'loop2' (00000000d99aeab1): kobject_uevent_env [ 634.675854] kobject: 'loop2' (00000000d99aeab1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 634.686390] kobject: 'loop1' (000000008c50320a): kobject_uevent_env [ 634.692843] kobject: 'loop1' (000000008c50320a): fill_kobj_path: path = '/devices/virtual/block/loop1' 17:05:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x71, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x5000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:32 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x4000000000000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:32 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x14, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:32 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "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"}}, 0x110) 17:05:32 executing program 1: r0 = socket$inet(0x15, 0x5, 0x0) connect$inet(r0, &(0x7f0000000580)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) 17:05:32 executing program 0: clone(0x2102001dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f00000007c0)={'exz', 0xffffffffffffffff, 0x4800000000000000}, &(0x7f00000003c0)='fu\xb3\xa9{Q\x02sePG4+\x88\'\x99(\xd4FG\xf1\\\xea\xbb\x81U\x04=\xb38\x81|\xaa\t\xdd*\xc0\xc9a{\xf5h1\x1dF07m\x86\xcaH\x13>4\xc3\x1c\x00\xc7\xe2\rp\x92\xfa1]\x15,NI\xb0\xb1\xcd\x8c\x84\xfaO\x93[\xb7\xbeSY\x01\x05\x1aZg\xdc\xa3\xa3s1f\x18\x17:\xb2\xe4\x95\xc0\x9c\xce\aUS\x1e\xe8\xddw\xdb\xb0\xaa]|\xd56zd\xb9\r\xef\x9fzy9\x13n\x04\xc5\xef3\x15\xdbYm\x85\x1dwU\xbe\xaf\xc3Y\x90y\xe1e\xa3\xba\x1bP`Rm\x04B\x7f\xdf\x92\xb8\xf5B\xe3X\x1bw\'\xe4?\nC\xc3\x1f\xa3\xe3\x01\xc5\xfc\x9d\x8eo\x18\xf3\xc6\xc7\xa8\xc8\xe7\x7fWK\xb0\xa4\xed\x84\xcb\xb2\xa8\x1b {\xfc\xdc%\xc4\x8e\xc8;\x93\xdd\na\x11\x13O\x85', 0xfffffffffffffffe) 17:05:32 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) 17:05:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x72, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) [ 635.192540] kobject: 'loop3' (00000000b2a6da2f): kobject_uevent_env [ 635.212352] kobject: 'loop3' (00000000b2a6da2f): fill_kobj_path: path = '/devices/virtual/block/loop3' 17:05:32 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x15, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:32 executing program 1: r0 = socket$inet(0x15, 0x5, 0x0) connect$inet(r0, &(0x7f0000000580)={0x2, 0x0, @remote}, 0x10) sendmsg(r0, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) [ 635.275110] kobject: 'loop2' (00000000d99aeab1): kobject_uevent_env [ 635.282838] kobject: 'loop2' (00000000d99aeab1): fill_kobj_path: path = '/devices/virtual/block/loop2' 17:05:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x75, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:32 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000580)={0x2, 0x0, @remote}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) [ 635.322914] kobject: 'loop5' (0000000087db4b27): kobject_uevent_env [ 635.355489] kobject: 'loop5' (0000000087db4b27): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 635.397004] kobject: 'loop1' (000000008c50320a): kobject_uevent_env [ 635.420698] kobject: 'loop1' (000000008c50320a): fill_kobj_path: path = '/devices/virtual/block/loop1' 17:05:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x6000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 17:05:32 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x16, &(0x7f0000000080)=[@in6={0xa, 0x0, 0x0, @rand_addr="04ab703bfc7d1164323921506fde3866"}], 0x1c) 17:05:32 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f000001bff0)={0x2, 0x0, @loopback}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000580)={0x2, 0x0, @remote}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, 0x0}, 0x0) 17:05:32 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x76, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x46, @rand_addr="04ab703bfc7d1164323921506fde3866", 0x5}], 0x1c) 17:05:32 executing program 5: syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x7, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="0024ade3c90400000054db4f00000000bb6818218e5a0800000000009fff2286fd1b0779fbd593af5645500108d1aa36113ecc6ab366e7b7819960eb9e501ff574869fa6b8ce269474907d765dcd3666a035934b7b2377a7bff1670dc14f1449c468420e725210d431dd91a78cb734d1a484aeec55ccc714506f84390000000000736eaffbf483a812fb4b3be9b2871ce0f3534576b635ea8a6e56f3d989a087717ba56f3bdeb70d880fd0e6ce8ecec24c3bd08b275567a2f4ac5e3da1343f2c91f8925a014a50d125ed9a87314530d9678c010071e339e297d366bde3cc5643a2a270347f3f8a2a5efcdbaf4774156f18b127c11d2e159d03e2993966b385f411084ea7a7a132fd3c252021b00ab3cd6863edbe8ef83e269fff6a8e6e2adce8b6be1e5c27e5ce45f17c89ac8c8e3db3e4cc682bf2d7e63cd0c7502b40eed07ccc50f5311196e266428d9fd242e095c60be0a9fda82c455d7818346b94fbd21e5480431e3f33e7ff48c045b206beee871eba174556950a1f4792b9b6d6d392"], 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x81, 0x1a, &(0x7f0000000780)={0x7, 0x6, 0x80000001, 0x8b, 0x3, 0x42}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) r2 = socket$inet6(0xa, 0x3, 0x9) getsockopt$inet6_int(r2, 0x29, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x4) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000b80)={@dev={0xfe, 0x80, [], 0x16}, 0x37, r1}) setsockopt$inet6_int(r0, 0x29, 0xfb, &(0x7f00000001c0)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x8, 0x1a1100) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@rand_addr="fee09961fad8a298e72bf924ca0836a1", 0x75, r4}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, @mcast2, @loopback={0x0, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, r4}) ioctl$VIDIOC_CROPCAP(r5, 0xc02c563a, &(0x7f00000002c0)={0x3, {0xeb75, 0x7fffffff, 0x9, 0x1}, {0x4, 0x80, 0x7, 0x6}, {0x4, 0x7d4}}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000840)=ANY=[@ANYBLOB="21000016690e00000000000003ff40afff9af9728a"], 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r5, 0xc08c5336, &(0x7f00000006c0)={0x5, 0x8001, 0x100, 'queue0\x00', 0x6}) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000640)={@remote, @ipv4={[], [], @loopback}, @mcast2, 0x12c, 0x8, 0x3, 0x400, 0x4, 0x20, r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000b00)) socket$inet(0x2, 0x7, 0xbfd) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f0000000080)='syz0\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000280)=0x8) getsockname(r5, &(0x7f00000007c0)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000600)=0x80) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r5, &(0x7f0000000c40)={0x9, 0x108, 0xfa00, {r6, 0x9b, "1ce491", "0aea30d04f8616f8a37b6e6819f356a680a262f3e396fa85666abff95498c9a3af4e9a977a62c04037232ee7d0385d1048bb1627ba0e557a755ce92235012b6b9f821bc64cfdde3cb71943fd7a992d2c33596f5bdd8150ff96b6424a7483307cba7c803b4df3d72dbd2296cccc1ef1b52900afc67a69fb747c1642be882944ea0d60a79f925562f2f0ae4c3395661d207a56d23a36412a5dcb97481a74b19e863aad944dd8799ab1ca69bdb0bb159ecbdc0df496b4b90b9feb8530faf636e519fe5e5f8640e2e92e5b240c02e673e9fa677b7b3ea7755dbba5a418ed7abdb2954c15625af822a96bd6a96ad83bddc15356f83ad04a58b5d96fd90c0c60884202"}}, 0x110) [ 635.460427] kobject: 'loop3' (00000000b2a6da2f): kobject_uevent_env [ 635.483991] kobject: 'loop3' (00000000b2a6da2f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 635.524227] kobject: 'loop1' (000000008c50320a): kobject_uevent_env [ 635.530702] kobject: 'loop1' (000000008c50320a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 635.558717] kobject: 'loop2' (00000000d99aeab1): kobject_uevent_env [ 635.574513] kobject: 'loop2' (00000000d99aeab1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 635.592649] kobject: 'loop1' (000000008c50320a): kobject_uevent_env [ 635.599437] kobject: 'loop1' (000000008c50320a): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 635.614158] kobject: 'loop3' (00000000b2a6da2f): kobject_uevent_env [ 635.620593] kobject: 'loop3' (00000000b2a6da2f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 635.646235] kobject: 'loop4' (00000000a5b1f98f): kobject_uevent_env [ 635.652685] kobject: 'loop4' (00000000a5b1f98f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 635.674413] kobject: 'loop2' (00000000d99aeab1): kobject_uevent_env [ 635.680863] kobject: 'loop2' (00000000d99aeab1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 635.699405] kobject: 'loop3' (00000000b2a6da2f): kobject_uevent_env [ 635.709861] kobject: 'loop3' (00000000b2a6da2f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 635.719701] kobject: 'loop5' (0000000087db4b27): kobject_uevent_env [ 635.726165] kobject: 'loop5' (0000000087db4b27): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 635.735976] kobject: 'loop4' (00000000a5b1f98f): kobject_uevent_env [ 635.742383] kobject: 'loop4' (00000000a5b1f98f): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 635.790063] kobject: 'batman_adv' (000000003356a81a): kobject_uevent_env [ 635.798859] kobject: 'batman_adv' (000000003356a81a): kobject_uevent_env: filter function caused the event to drop! [ 635.812658] kobject: 'batman_adv' (000000003356a81a): kobject_cleanup, parent (null) [ 635.831626] kobject: 'batman_adv' (000000003356a81a): calling ktype release [ 635.840355] kobject: (000000003356a81a): dynamic_kobj_release [ 635.848840] kobject: 'batman_adv': free name [ 635.853380] kobject: 'rx-0' (000000000768ea11): kobject_cleanup, parent 00000000a57b5274 [ 635.861693] kobject: 'rx-0' (000000000768ea11): auto cleanup 'remove' event [ 635.869224] kobject: 'rx-0' (000000000768ea11): kobject_uevent_env [ 635.875624] kobject: 'rx-0' (000000000768ea11): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 635.886083] kobject: 'rx-0' (000000000768ea11): auto cleanup kobject_del [ 635.892922] kobject: 'rx-0' (000000000768ea11): calling ktype release [ 635.899530] kobject: 'rx-0': free name [ 635.903436] kobject: 'tx-0' (000000005cc75452): kobject_cleanup, parent 00000000a57b5274 [ 635.911695] kobject: 'tx-0' (000000005cc75452): auto cleanup 'remove' event [ 635.918820] kobject: 'tx-0' (000000005cc75452): kobject_uevent_env [ 635.925187] kobject: 'tx-0' (000000005cc75452): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 635.935662] kobject: 'tx-0' (000000005cc75452): auto cleanup kobject_del [ 635.942516] kobject: 'tx-0' (000000005cc75452): calling ktype release [ 635.949118] kobject: 'tx-0': free name [ 635.953015] kobject: 'queues' (00000000a57b5274): kobject_cleanup, parent (null) [ 635.961441] kobject: 'queues' (00000000a57b5274): calling ktype release [ 635.968392] kobject: 'queues' (00000000a57b5274): kset_release [ 635.974413] kobject: 'queues': free name [ 635.978681] kobject: 'syz_tun' (0000000005ba09b0): kobject_uevent_env [ 635.985740] kobject: 'syz_tun' (0000000005ba09b0): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 636.053992] kobject: 'syz_tun' (0000000005ba09b0): kobject_cleanup, parent (null) [ 636.062528] kobject: 'syz_tun' (0000000005ba09b0): calling ktype release [ 636.069442] kobject: 'syz_tun': free name [ 636.127044] kobject: 'rx-0' (00000000af38afec): kobject_cleanup, parent 00000000870ddf76 [ 636.145296] kobject: 'rx-0' (00000000af38afec): auto cleanup 'remove' event [ 636.152439] kobject: 'rx-0' (00000000af38afec): kobject_uevent_env [ 636.158996] kobject: 'rx-0' (00000000af38afec): kobject_uevent_env: uevent_suppress caused the event to drop! [ 636.169158] kobject: 'rx-0' (00000000af38afec): auto cleanup kobject_del [ 636.176090] kobject: 'rx-0' (00000000af38afec): calling ktype release [ 636.182683] kobject: 'rx-0': free name [ 636.186723] kobject: 'tx-0' (00000000c4d56af3): kobject_cleanup, parent 00000000870ddf76 [ 636.195037] kobject: 'tx-0' (00000000c4d56af3): auto cleanup 'remove' event [ 636.202148] kobject: 'tx-0' (00000000c4d56af3): kobject_uevent_env [ 636.224145] kobject: 'tx-0' (00000000c4d56af3): kobject_uevent_env: uevent_suppress caused the event to drop! [ 636.243793] kobject: 'tx-0' (00000000c4d56af3): auto cleanup kobject_del [ 636.250705] kobject: 'tx-0' (00000000c4d56af3): calling ktype release [ 636.273792] kobject: 'tx-0': free name [ 636.277739] kobject: 'queues' (00000000870ddf76): kobject_cleanup, parent (null) [ 636.303789] kobject: 'queues' (00000000870ddf76): calling ktype release [ 636.310581] kobject: 'queues' (00000000870ddf76): kset_release [ 636.323788] kobject: 'queues': free name [ 636.328178] kobject: 'ip6gre0' (0000000073b5a140): kobject_uevent_env [ 636.343800] kobject: 'ip6gre0' (0000000073b5a140): kobject_uevent_env: uevent_suppress caused the event to drop! [ 636.375083] kobject: 'batman_adv' (000000008ecd4525): kobject_uevent_env [ 636.381968] kobject: 'batman_adv' (000000008ecd4525): kobject_uevent_env: filter function caused the event to drop! [ 636.406881] kobject: 'batman_adv' (000000008ecd4525): kobject_cleanup, parent (null) [ 636.429409] kobject: 'batman_adv' (000000008ecd4525): calling ktype release [ 636.449640] kobject: (000000008ecd4525): dynamic_kobj_release [ 636.458758] kobject: 'batman_adv': free name [ 636.471756] kobject: 'rx-0' (0000000086901580): kobject_cleanup, parent 000000005d309f46 [ 636.482909] kobject: 'rx-0' (0000000086901580): auto cleanup 'remove' event [ 636.490380] kobject: 'rx-0' (0000000086901580): kobject_uevent_env [ 636.498499] kobject: 'rx-0' (0000000086901580): kobject_uevent_env: uevent_suppress caused the event to drop! [ 636.508617] kobject: 'rx-0' (0000000086901580): auto cleanup kobject_del [ 636.515551] kobject: 'rx-0' (0000000086901580): calling ktype release [ 636.522126] kobject: 'rx-0': free name [ 636.526083] kobject: 'tx-0' (00000000abbfe3bc): kobject_cleanup, parent 000000005d309f46 [ 636.534333] kobject: 'tx-0' (00000000abbfe3bc): auto cleanup 'remove' event [ 636.541420] kobject: 'tx-0' (00000000abbfe3bc): kobject_uevent_env [ 636.547791] kobject: 'tx-0' (00000000abbfe3bc): kobject_uevent_env: uevent_suppress caused the event to drop! [ 636.557867] kobject: 'tx-0' (00000000abbfe3bc): auto cleanup kobject_del [ 636.564777] kobject: 'tx-0' (00000000abbfe3bc): calling ktype release [ 636.571357] kobject: 'tx-0': free name [ 636.575288] kobject: 'queues' (000000005d309f46): kobject_cleanup, parent (null) [ 636.583699] kobject: 'queues' (000000005d309f46): calling ktype release [ 636.590479] kobject: 'queues' (000000005d309f46): kset_release [ 636.596475] kobject: 'queues': free name [ 636.600740] kobject: 'ip6gretap0' (0000000080cb6046): kobject_uevent_env [ 636.607606] kobject: 'ip6gretap0' (0000000080cb6046): kobject_uevent_env: uevent_suppress caused the event to drop! [ 636.663950] kobject: 'ip6gre0' (0000000073b5a140): kobject_cleanup, parent (null) [ 636.672476] kobject: 'ip6gre0' (0000000073b5a140): auto cleanup 'remove' event [ 636.679948] kobject: 'ip6gre0' (0000000073b5a140): kobject_uevent_env [ 636.686581] kobject: 'ip6gre0' (0000000073b5a140): kobject_uevent_env: uevent_suppress caused the event to drop! [ 636.696942] kobject: 'ip6gre0' (0000000073b5a140): calling ktype release [ 636.703998] kobject: 'ip6gre0': free name [ 636.708165] kobject: 'ip6gretap0' (0000000080cb6046): kobject_cleanup, parent (null) [ 636.716947] kobject: 'ip6gretap0' (0000000080cb6046): auto cleanup 'remove' event [ 636.724600] kobject: 'ip6gretap0' (0000000080cb6046): kobject_uevent_env [ 636.731422] kobject: 'ip6gretap0' (0000000080cb6046): kobject_uevent_env: uevent_suppress caused the event to drop! [ 636.742024] kobject: 'ip6gretap0' (0000000080cb6046): calling ktype release [ 636.749185] kobject: 'ip6gretap0': free name [ 636.755907] kobject: 'rx-0' (00000000f74895fc): kobject_cleanup, parent 00000000cec2c30e [ 636.764182] kobject: 'rx-0' (00000000f74895fc): auto cleanup 'remove' event [ 636.771268] kobject: 'rx-0' (00000000f74895fc): kobject_uevent_env [ 636.777602] kobject: 'rx-0' (00000000f74895fc): kobject_uevent_env: uevent_suppress caused the event to drop! [ 636.787701] kobject: 'rx-0' (00000000f74895fc): auto cleanup kobject_del [ 636.794918] kobject: 'rx-0' (00000000f74895fc): calling ktype release [ 636.801507] kobject: 'rx-0': free name [ 636.805477] kobject: 'tx-0' (000000006f8f5703): kobject_cleanup, parent 00000000cec2c30e [ 636.813706] kobject: 'tx-0' (000000006f8f5703): auto cleanup 'remove' event [ 636.820850] kobject: 'tx-0' (000000006f8f5703): kobject_uevent_env [ 636.827195] kobject: 'tx-0' (000000006f8f5703): kobject_uevent_env: uevent_suppress caused the event to drop! [ 636.837268] kobject: 'tx-0' (000000006f8f5703): auto cleanup kobject_del [ 636.844179] kobject: 'tx-0' (000000006f8f5703): calling ktype release [ 636.850748] kobject: 'tx-0': free name [ 636.854680] kobject: 'queues' (00000000cec2c30e): kobject_cleanup, parent (null) [ 636.863095] kobject: 'queues' (00000000cec2c30e): calling ktype release [ 636.870064] kobject: 'queues' (00000000cec2c30e): kset_release [ 636.876081] kobject: 'queues': free name [ 636.880322] kobject: 'ip6tnl0' (000000001fa09917): kobject_uevent_env [ 636.886958] kobject: 'ip6tnl0' (000000001fa09917): kobject_uevent_env: uevent_suppress caused the event to drop! [ 636.933846] kobject: 'ip6tnl0' (000000001fa09917): kobject_cleanup, parent (null) [ 636.942354] kobject: 'ip6tnl0' (000000001fa09917): auto cleanup 'remove' event [ 636.951271] kobject: 'ip6tnl0' (000000001fa09917): kobject_uevent_env [ 636.957931] kobject: 'ip6tnl0' (000000001fa09917): kobject_uevent_env: uevent_suppress caused the event to drop! [ 636.968346] kobject: 'ip6tnl0' (000000001fa09917): calling ktype release [ 636.975271] kobject: 'ip6tnl0': free name [ 636.981138] kobject: 'rx-0' (00000000645cc0b2): kobject_cleanup, parent 0000000077894a0a [ 636.989871] kobject: 'rx-0' (00000000645cc0b2): auto cleanup 'remove' event [ 636.997008] kobject: 'rx-0' (00000000645cc0b2): kobject_uevent_env [ 637.003400] kobject: 'rx-0' (00000000645cc0b2): kobject_uevent_env: uevent_suppress caused the event to drop! [ 637.013832] kobject: 'rx-0' (00000000645cc0b2): auto cleanup kobject_del [ 637.020700] kobject: 'rx-0' (00000000645cc0b2): calling ktype release [ 637.027738] kobject: 'rx-0': free name [ 637.031639] kobject: 'tx-0' (00000000c1c74f9a): kobject_cleanup, parent 0000000077894a0a [ 637.040017] kobject: 'tx-0' (00000000c1c74f9a): auto cleanup 'remove' event [ 637.047139] kobject: 'tx-0' (00000000c1c74f9a): kobject_uevent_env [ 637.053454] kobject: 'tx-0' (00000000c1c74f9a): kobject_uevent_env: uevent_suppress caused the event to drop! [ 637.063542] kobject: 'tx-0' (00000000c1c74f9a): auto cleanup kobject_del [ 637.070438] kobject: 'tx-0' (00000000c1c74f9a): calling ktype release [ 637.077040] kobject: 'tx-0': free name [ 637.080935] kobject: 'queues' (0000000077894a0a): kobject_cleanup, parent (null) [ 637.089368] kobject: 'queues' (0000000077894a0a): calling ktype release [ 637.096157] kobject: 'queues' (0000000077894a0a): kset_release [ 637.102306] kobject: 'queues': free name [ 637.106705] kobject: 'sit0' (000000001f36165e): kobject_uevent_env [ 637.113024] kobject: 'sit0' (000000001f36165e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 637.153856] kobject: 'sit0' (000000001f36165e): kobject_cleanup, parent (null) [ 637.162116] kobject: 'sit0' (000000001f36165e): auto cleanup 'remove' event [ 637.170787] kobject: 'sit0' (000000001f36165e): kobject_uevent_env [ 637.177141] kobject: 'sit0' (000000001f36165e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 637.187254] kobject: 'sit0' (000000001f36165e): calling ktype release [ 637.193912] kobject: 'sit0': free name [ 637.199193] kobject: 'rx-0' (00000000dd16f273): kobject_cleanup, parent 00000000794e67fd [ 637.207481] kobject: 'rx-0' (00000000dd16f273): auto cleanup 'remove' event [ 637.214697] kobject: 'rx-0' (00000000dd16f273): kobject_uevent_env [ 637.221011] kobject: 'rx-0' (00000000dd16f273): kobject_uevent_env: uevent_suppress caused the event to drop! [ 637.231097] kobject: 'rx-0' (00000000dd16f273): auto cleanup kobject_del [ 637.238178] kobject: 'rx-0' (00000000dd16f273): calling ktype release [ 637.244801] kobject: 'rx-0': free name [ 637.248712] kobject: 'tx-0' (0000000028dc2395): kobject_cleanup, parent 00000000794e67fd [ 637.256986] kobject: 'tx-0' (0000000028dc2395): auto cleanup 'remove' event [ 637.264474] kobject: 'tx-0' (0000000028dc2395): kobject_uevent_env [ 637.270793] kobject: 'tx-0' (0000000028dc2395): kobject_uevent_env: uevent_suppress caused the event to drop! [ 637.280879] kobject: 'tx-0' (0000000028dc2395): auto cleanup kobject_del [ 637.287786] kobject: 'tx-0' (0000000028dc2395): calling ktype release [ 637.294881] kobject: 'tx-0': free name [ 637.298781] kobject: 'queues' (00000000794e67fd): kobject_cleanup, parent (null) [ 637.307213] kobject: 'queues' (00000000794e67fd): calling ktype release [ 637.314004] kobject: 'queues' (00000000794e67fd): kset_release [ 637.319976] kobject: 'queues': free name [ 637.324391] kobject: 'ip6_vti0' (00000000c55867f0): kobject_uevent_env [ 637.331057] kobject: 'ip6_vti0' (00000000c55867f0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 637.383952] kobject: 'ip6_vti0' (00000000c55867f0): kobject_cleanup, parent (null) [ 637.392568] kobject: 'ip6_vti0' (00000000c55867f0): auto cleanup 'remove' event [ 637.400368] kobject: 'ip6_vti0' (00000000c55867f0): kobject_uevent_env [ 637.407110] kobject: 'ip6_vti0' (00000000c55867f0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 637.417542] kobject: 'ip6_vti0' (00000000c55867f0): calling ktype release [ 637.424547] kobject: 'ip6_vti0': free name [ 637.430289] kobject: 'rx-0' (00000000330895dc): kobject_cleanup, parent 000000000ddc26ee [ 637.438579] kobject: 'rx-0' (00000000330895dc): auto cleanup 'remove' event [ 637.445743] kobject: 'rx-0' (00000000330895dc): kobject_uevent_env [ 637.452076] kobject: 'rx-0' (00000000330895dc): kobject_uevent_env: uevent_suppress caused the event to drop! [ 637.462168] kobject: 'rx-0' (00000000330895dc): auto cleanup kobject_del [ 637.469300] kobject: 'rx-0' (00000000330895dc): calling ktype release [ 637.475925] kobject: 'rx-0': free name [ 637.479835] kobject: 'tx-0' (00000000410a5ca4): kobject_cleanup, parent 000000000ddc26ee [ 637.488151] kobject: 'tx-0' (00000000410a5ca4): auto cleanup 'remove' event [ 637.496367] kobject: 'tx-0' (00000000410a5ca4): kobject_uevent_env [ 637.502750] kobject: 'tx-0' (00000000410a5ca4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 637.513100] kobject: 'tx-0' (00000000410a5ca4): auto cleanup kobject_del [ 637.520213] kobject: 'tx-0' (00000000410a5ca4): calling ktype release [ 637.527479] kobject: 'tx-0': free name [ 637.531393] kobject: 'queues' (000000000ddc26ee): kobject_cleanup, parent (null) [ 637.540071] kobject: 'queues' (000000000ddc26ee): calling ktype release [ 637.547040] kobject: 'queues' (000000000ddc26ee): kset_release [ 637.553016] kobject: 'queues': free name [ 637.557629] kobject: 'ip_vti0' (0000000067d5a9ca): kobject_uevent_env [ 637.557735] IPVS: ftp: loaded support on port[0] = 21 [ 637.564461] kobject: 'ip_vti0' (0000000067d5a9ca): kobject_uevent_env: uevent_suppress caused the event to drop! [ 637.580195] kobject: 'lo' (000000000ffacd71): kobject_add_internal: parent: 'net', set: 'devices' [ 637.590015] kobject: 'lo' (000000000ffacd71): kobject_uevent_env [ 637.596261] kobject: 'lo' (000000000ffacd71): fill_kobj_path: path = '/devices/virtual/net/lo' [ 637.605143] kobject: 'queues' (0000000021892e93): kobject_add_internal: parent: 'lo', set: '' [ 637.614369] kobject: 'queues' (0000000021892e93): kobject_uevent_env [ 637.620862] kobject: 'queues' (0000000021892e93): kobject_uevent_env: filter function caused the event to drop! [ 637.631120] kobject: 'rx-0' (0000000015b3d56e): kobject_add_internal: parent: 'queues', set: 'queues' [ 637.640556] kobject: 'rx-0' (0000000015b3d56e): kobject_uevent_env [ 637.646919] kobject: 'rx-0' (0000000015b3d56e): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 637.656943] kobject: 'tx-0' (000000009ca47ef6): kobject_add_internal: parent: 'queues', set: 'queues' [ 637.666429] kobject: 'tx-0' (000000009ca47ef6): kobject_uevent_env [ 637.672762] kobject: 'tx-0' (000000009ca47ef6): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 637.683359] kobject: 'ip_vti0' (0000000067d5a9ca): kobject_cleanup, parent (null) [ 637.683517] kobject: 'tunl0' (000000006a870ca8): kobject_add_internal: parent: 'net', set: 'devices' [ 637.694606] kobject: 'ip_vti0' (0000000067d5a9ca): auto cleanup 'remove' event [ 637.701707] kobject: 'tunl0' (000000006a870ca8): kobject_uevent_env [ 637.710375] kobject: 'ip_vti0' (0000000067d5a9ca): kobject_uevent_env [ 637.714977] kobject: 'tunl0' (000000006a870ca8): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 637.722767] kobject: 'ip_vti0' (0000000067d5a9ca): kobject_uevent_env: uevent_suppress caused the event to drop! [ 637.730900] kobject: 'queues' (00000000f354d750): kobject_add_internal: parent: 'tunl0', set: '' [ 637.744491] kobject: 'ip_vti0' (0000000067d5a9ca): calling ktype release [ 637.750653] kobject: 'queues' (00000000f354d750): kobject_uevent_env [ 637.760118] kobject: 'ip_vti0': free name [ 637.764443] kobject: 'queues' (00000000f354d750): kobject_uevent_env: filter function caused the event to drop! [ 637.778466] kobject: 'rx-0' (000000002a389737): kobject_add_internal: parent: 'queues', set: 'queues' [ 637.787911] kobject: 'rx-0' (000000002a389737): kobject_uevent_env [ 637.794294] kobject: 'rx-0' (000000002a389737): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 637.804723] kobject: 'tx-0' (000000003c0086fd): kobject_add_internal: parent: 'queues', set: 'queues' [ 637.814228] kobject: 'tx-0' (000000003c0086fd): kobject_uevent_env [ 637.820561] kobject: 'tx-0' (000000003c0086fd): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 637.831574] kobject: 'gre0' (000000006bf1ddd1): kobject_add_internal: parent: 'net', set: 'devices' [ 637.841404] kobject: 'gre0' (000000006bf1ddd1): kobject_uevent_env [ 637.847793] kobject: 'gre0' (000000006bf1ddd1): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 637.857207] kobject: 'queues' (00000000917b0ef7): kobject_add_internal: parent: 'gre0', set: '' [ 637.866617] kobject: 'queues' (00000000917b0ef7): kobject_uevent_env [ 637.873111] kobject: 'queues' (00000000917b0ef7): kobject_uevent_env: filter function caused the event to drop! [ 637.883382] kobject: 'rx-0' (00000000ab09b3c6): kobject_add_internal: parent: 'queues', set: 'queues' [ 637.892809] kobject: 'rx-0' (00000000ab09b3c6): kobject_uevent_env [ 637.899185] kobject: 'rx-0' (00000000ab09b3c6): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 637.909428] kobject: 'tx-0' (0000000090724d7b): kobject_add_internal: parent: 'queues', set: 'queues' [ 637.918927] kobject: 'tx-0' (0000000090724d7b): kobject_uevent_env [ 637.925304] kobject: 'tx-0' (0000000090724d7b): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 637.938124] kobject: 'batman_adv' (000000000bf80744): kobject_uevent_env [ 637.944990] kobject: 'batman_adv' (000000000bf80744): kobject_uevent_env: filter function caused the event to drop! [ 637.955854] kobject: 'batman_adv' (000000000bf80744): kobject_cleanup, parent (null) [ 637.964655] kobject: 'batman_adv' (000000000bf80744): calling ktype release [ 637.971786] kobject: (000000000bf80744): dynamic_kobj_release [ 637.977715] kobject: 'batman_adv': free name [ 637.982218] kobject: 'rx-0' (00000000707925e5): kobject_cleanup, parent 00000000f0fdaebc [ 637.990470] kobject: 'rx-0' (00000000707925e5): auto cleanup 'remove' event [ 637.997596] kobject: 'rx-0' (00000000707925e5): kobject_uevent_env [ 638.003937] kobject: 'rx-0' (00000000707925e5): kobject_uevent_env: uevent_suppress caused the event to drop! [ 638.014018] kobject: 'rx-0' (00000000707925e5): auto cleanup kobject_del [ 638.021110] kobject: 'rx-0' (00000000707925e5): calling ktype release [ 638.027710] kobject: 'rx-0': free name [ 638.031616] kobject: 'tx-0' (00000000547574d9): kobject_cleanup, parent 00000000f0fdaebc [ 638.039855] kobject: 'tx-0' (00000000547574d9): auto cleanup 'remove' event [ 638.046970] kobject: 'tx-0' (00000000547574d9): kobject_uevent_env [ 638.053268] kobject: 'tx-0' (00000000547574d9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 638.063333] kobject: 'tx-0' (00000000547574d9): auto cleanup kobject_del [ 638.070201] kobject: 'tx-0' (00000000547574d9): calling ktype release [ 638.076799] kobject: 'tx-0': free name [ 638.080704] kobject: 'queues' (00000000f0fdaebc): kobject_cleanup, parent (null) [ 638.089119] kobject: 'queues' (00000000f0fdaebc): calling ktype release [ 638.096007] kobject: 'queues' (00000000f0fdaebc): kset_release [ 638.101977] kobject: 'queues': free name [ 638.106519] kobject: 'erspan0' (0000000055c9ac22): kobject_uevent_env [ 638.113105] kobject: 'erspan0' (0000000055c9ac22): kobject_uevent_env: uevent_suppress caused the event to drop! [ 638.123715] kobject: 'gretap0' (0000000079e364ef): kobject_add_internal: parent: 'net', set: 'devices' [ 638.133515] kobject: 'gretap0' (0000000079e364ef): kobject_uevent_env [ 638.140176] kobject: 'gretap0' (0000000079e364ef): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 638.149857] kobject: 'queues' (0000000064090817): kobject_add_internal: parent: 'gretap0', set: '' [ 638.159510] kobject: 'queues' (0000000064090817): kobject_uevent_env [ 638.166019] kobject: 'queues' (0000000064090817): kobject_uevent_env: filter function caused the event to drop! [ 638.176283] kobject: 'rx-0' (0000000087bea10c): kobject_add_internal: parent: 'queues', set: 'queues' [ 638.185691] kobject: 'rx-0' (0000000087bea10c): kobject_uevent_env [ 638.192048] kobject: 'rx-0' (0000000087bea10c): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 638.202567] kobject: 'tx-0' (000000003ae12003): kobject_add_internal: parent: 'queues', set: 'queues' [ 638.212059] kobject: 'tx-0' (000000003ae12003): kobject_uevent_env [ 638.218452] kobject: 'tx-0' (000000003ae12003): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 638.229319] kobject: 'batman_adv' (0000000031ae02c5): kobject_add_internal: parent: 'gretap0', set: '' [ 638.239766] kobject: 'erspan0' (00000000a117e270): kobject_add_internal: parent: 'net', set: 'devices' [ 638.249811] kobject: 'erspan0' (00000000a117e270): kobject_uevent_env [ 638.256456] kobject: 'erspan0' (00000000a117e270): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 638.266278] kobject: 'queues' (0000000019355c0e): kobject_add_internal: parent: 'erspan0', set: '' [ 638.275951] kobject: 'queues' (0000000019355c0e): kobject_uevent_env [ 638.282537] kobject: 'queues' (0000000019355c0e): kobject_uevent_env: filter function caused the event to drop! [ 638.292856] kobject: 'rx-0' (00000000b7ee2269): kobject_add_internal: parent: 'queues', set: 'queues' [ 638.302291] kobject: 'rx-0' (00000000b7ee2269): kobject_uevent_env [ 638.308698] kobject: 'rx-0' (00000000b7ee2269): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 638.319206] kobject: 'tx-0' (000000007830d7b6): kobject_add_internal: parent: 'queues', set: 'queues' [ 638.328726] kobject: 'tx-0' (000000007830d7b6): kobject_uevent_env [ 638.335134] kobject: 'tx-0' (000000007830d7b6): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 638.346223] kobject: 'batman_adv' (000000000b3c58f2): kobject_add_internal: parent: 'erspan0', set: '' [ 638.356498] kobject: 'erspan0' (0000000055c9ac22): kobject_cleanup, parent (null) [ 638.356659] kobject: 'ip_vti0' (00000000e1bf7b20): kobject_add_internal: parent: 'net', set: 'devices' [ 638.365779] kobject: 'erspan0' (0000000055c9ac22): auto cleanup 'remove' event [ 638.375168] kobject: 'ip_vti0' (00000000e1bf7b20): kobject_uevent_env [ 638.384756] kobject: 'erspan0' (0000000055c9ac22): kobject_uevent_env [ 638.388653] kobject: 'ip_vti0' (00000000e1bf7b20): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 638.395853] kobject: 'erspan0' (0000000055c9ac22): kobject_uevent_env: uevent_suppress caused the event to drop! [ 638.407737] kobject: 'queues' (000000001065cffc): kobject_add_internal: parent: 'ip_vti0', set: '' [ 638.420227] kobject: 'erspan0' (0000000055c9ac22): calling ktype release [ 638.428758] kobject: 'queues' (000000001065cffc): kobject_uevent_env [ 638.432331] kobject: 'erspan0': free name [ 638.438512] kobject: 'queues' (000000001065cffc): kobject_uevent_env: filter function caused the event to drop! [ 638.438539] kobject: 'rx-0' (000000001ec1c0bf): kobject_add_internal: parent: 'queues', set: 'queues' [ 638.438587] kobject: 'rx-0' (000000001ec1c0bf): kobject_uevent_env [ 638.469053] kobject: 'rx-0' (000000001ec1c0bf): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 638.479552] kobject: 'tx-0' (000000000d6ab3c3): kobject_add_internal: parent: 'queues', set: 'queues' [ 638.489007] kobject: 'tx-0' (000000000d6ab3c3): kobject_uevent_env [ 638.495384] kobject: 'tx-0' (000000000d6ab3c3): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 638.508335] kobject: 'batman_adv' (000000009374713b): kobject_uevent_env [ 638.515281] kobject: 'batman_adv' (000000009374713b): kobject_uevent_env: filter function caused the event to drop! [ 638.525937] kobject: 'batman_adv' (000000009374713b): kobject_cleanup, parent (null) [ 638.534744] kobject: 'batman_adv' (000000009374713b): calling ktype release [ 638.541837] kobject: (000000009374713b): dynamic_kobj_release [ 638.548064] kobject: 'batman_adv': free name [ 638.552571] kobject: 'rx-0' (000000009eb7a839): kobject_cleanup, parent 00000000a7109317 [ 638.560834] kobject: 'rx-0' (000000009eb7a839): auto cleanup 'remove' event [ 638.568129] kobject: 'rx-0' (000000009eb7a839): kobject_uevent_env [ 638.574903] kobject: 'rx-0' (000000009eb7a839): kobject_uevent_env: uevent_suppress caused the event to drop! [ 638.585009] kobject: 'rx-0' (000000009eb7a839): auto cleanup kobject_del [ 638.591860] kobject: 'rx-0' (000000009eb7a839): calling ktype release [ 638.598480] kobject: 'rx-0': free name [ 638.602392] kobject: 'tx-0' (00000000698f61c6): kobject_cleanup, parent 00000000a7109317 [ 638.610680] kobject: 'tx-0' (00000000698f61c6): auto cleanup 'remove' event [ 638.617798] kobject: 'tx-0' (00000000698f61c6): kobject_uevent_env [ 638.624150] kobject: 'tx-0' (00000000698f61c6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 638.634229] kobject: 'tx-0' (00000000698f61c6): auto cleanup kobject_del [ 638.641077] kobject: 'tx-0' (00000000698f61c6): calling ktype release [ 638.647678] kobject: 'tx-0': free name [ 638.651595] kobject: 'queues' (00000000a7109317): kobject_cleanup, parent (null) [ 638.660034] kobject: 'queues' (00000000a7109317): calling ktype release [ 638.666811] kobject: 'queues' (00000000a7109317): kset_release [ 638.672768] kobject: 'queues': free name [ 638.677141] kobject: 'gretap0' (00000000f0159acb): kobject_uevent_env [ 638.683710] kobject: 'gretap0' (00000000f0159acb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 638.694500] kobject: 'ip6_vti0' (00000000d86b7a60): kobject_add_internal: parent: 'net', set: 'devices' [ 638.704705] kobject: 'ip6_vti0' (00000000d86b7a60): kobject_uevent_env [ 638.711386] kobject: 'ip6_vti0' (00000000d86b7a60): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 638.721276] kobject: 'queues' (000000009844ee8e): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 638.731034] kobject: 'queues' (000000009844ee8e): kobject_uevent_env [ 638.737553] kobject: 'queues' (000000009844ee8e): kobject_uevent_env: filter function caused the event to drop! [ 638.747823] kobject: 'rx-0' (000000005bed53fb): kobject_add_internal: parent: 'queues', set: 'queues' [ 638.757251] kobject: 'rx-0' (000000005bed53fb): kobject_uevent_env [ 638.763588] kobject: 'rx-0' (000000005bed53fb): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 638.774166] kobject: 'tx-0' (0000000037538a42): kobject_add_internal: parent: 'queues', set: 'queues' [ 638.783586] kobject: 'tx-0' (0000000037538a42): kobject_uevent_env [ 638.789977] kobject: 'tx-0' (0000000037538a42): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 638.800974] kobject: 'gretap0' (00000000f0159acb): kobject_cleanup, parent (null) [ 638.801087] kobject: 'sit0' (000000009909eeec): kobject_add_internal: parent: 'net', set: 'devices' [ 638.812453] kobject: 'gretap0' (00000000f0159acb): auto cleanup 'remove' event [ 638.819260] kobject: 'sit0' (000000009909eeec): kobject_uevent_env [ 638.829288] kobject: 'gretap0' (00000000f0159acb): kobject_uevent_env [ 638.832454] kobject: 'sit0' (000000009909eeec): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 638.839234] kobject: 'gretap0' (00000000f0159acb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 638.848227] kobject: 'queues' (000000000a9c65d5): kobject_add_internal: parent: 'sit0', set: '' [ 638.867285] kobject: 'gretap0' (00000000f0159acb): calling ktype release [ 638.871345] kobject: 'queues' (000000000a9c65d5): kobject_uevent_env [ 638.877454] kobject: 'gretap0': free name [ 638.881389] kobject: 'queues' (000000000a9c65d5): kobject_uevent_env: filter function caused the event to drop! [ 638.896337] kobject: 'rx-0' (00000000abf6ccb9): kobject_add_internal: parent: 'queues', set: 'queues' [ 638.905837] kobject: 'rx-0' (00000000abf6ccb9): kobject_uevent_env [ 638.912168] kobject: 'rx-0' (00000000abf6ccb9): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 638.922403] kobject: 'tx-0' (0000000006378027): kobject_add_internal: parent: 'queues', set: 'queues' [ 638.931890] kobject: 'tx-0' (0000000006378027): kobject_uevent_env [ 638.938262] kobject: 'tx-0' (0000000006378027): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' [ 638.950303] kobject: 'rx-0' (00000000faf54d81): kobject_cleanup, parent 00000000656a99ba [ 638.958578] kobject: 'rx-0' (00000000faf54d81): auto cleanup 'remove' event [ 638.965718] kobject: 'rx-0' (00000000faf54d81): kobject_uevent_env [ 638.972034] kobject: 'rx-0' (00000000faf54d81): kobject_uevent_env: uevent_suppress caused the event to drop! [ 638.982111] kobject: 'rx-0' (00000000faf54d81): auto cleanup kobject_del [ 638.988988] kobject: 'rx-0' (00000000faf54d81): calling ktype release [ 638.995606] kobject: 'rx-0': free name [ 638.999517] kobject: 'tx-0' (00000000eb0b7af1): kobject_cleanup, parent 00000000656a99ba [ 639.007764] kobject: 'tx-0' (00000000eb0b7af1): auto cleanup 'remove' event [ 639.014882] kobject: 'tx-0' (00000000eb0b7af1): kobject_uevent_env [ 639.021181] kobject: 'tx-0' (00000000eb0b7af1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 639.031254] kobject: 'tx-0' (00000000eb0b7af1): auto cleanup kobject_del [ 639.038124] kobject: 'tx-0' (00000000eb0b7af1): calling ktype release [ 639.044732] kobject: 'tx-0': free name [ 639.048630] kobject: 'queues' (00000000656a99ba): kobject_cleanup, parent (null) [ 639.057093] kobject: 'queues' (00000000656a99ba): calling ktype release [ 639.063888] kobject: 'queues' (00000000656a99ba): kset_release [ 639.069855] kobject: 'queues': free name [ 639.074524] kobject: 'gre0' (0000000034cd08b4): kobject_uevent_env [ 639.080840] kobject: 'gre0' (0000000034cd08b4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 639.091227] kobject: 'ip6tnl0' (00000000ed2f2e64): kobject_add_internal: parent: 'net', set: 'devices' [ 639.101044] kobject: 'ip6tnl0' (00000000ed2f2e64): kobject_uevent_env [ 639.107691] kobject: 'ip6tnl0' (00000000ed2f2e64): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0' [ 639.117391] kobject: 'queues' (000000002b9f30e9): kobject_add_internal: parent: 'ip6tnl0', set: '' [ 639.127052] kobject: 'queues' (000000002b9f30e9): kobject_uevent_env [ 639.133539] kobject: 'queues' (000000002b9f30e9): kobject_uevent_env: filter function caused the event to drop! [ 639.143816] kobject: 'rx-0' (000000001f1a783f): kobject_add_internal: parent: 'queues', set: 'queues' [ 639.153197] kobject: 'rx-0' (000000001f1a783f): kobject_uevent_env [ 639.159579] kobject: 'rx-0' (000000001f1a783f): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0' [ 639.170055] kobject: 'tx-0' (00000000d2e3a0ea): kobject_add_internal: parent: 'queues', set: 'queues' [ 639.179555] kobject: 'tx-0' (00000000d2e3a0ea): kobject_uevent_env [ 639.185911] kobject: 'tx-0' (00000000d2e3a0ea): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0' [ 639.197053] kobject: 'ip6gre0' (000000003cff92eb): kobject_add_internal: parent: 'net', set: 'devices' [ 639.206821] kobject: 'ip6gre0' (000000003cff92eb): kobject_uevent_env [ 639.213414] kobject: 'ip6gre0' (000000003cff92eb): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' [ 639.224411] kobject: 'queues' (00000000c8982451): kobject_add_internal: parent: 'ip6gre0', set: '' [ 639.234100] kobject: 'queues' (00000000c8982451): kobject_uevent_env [ 639.240600] kobject: 'queues' (00000000c8982451): kobject_uevent_env: filter function caused the event to drop! [ 639.250914] kobject: 'rx-0' (0000000029ca26e3): kobject_add_internal: parent: 'queues', set: 'queues' [ 639.260321] kobject: 'rx-0' (0000000029ca26e3): kobject_uevent_env [ 639.266697] kobject: 'rx-0' (0000000029ca26e3): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0' [ 639.277174] kobject: 'tx-0' (0000000076ad5820): kobject_add_internal: parent: 'queues', set: 'queues' [ 639.286681] kobject: 'tx-0' (0000000076ad5820): kobject_uevent_env [ 639.293031] kobject: 'tx-0' (0000000076ad5820): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0' [ 639.304320] kobject: 'gre0' (0000000034cd08b4): kobject_cleanup, parent (null) [ 639.305152] kobject: 'syz_tun' (000000007afa7ee4): kobject_add_internal: parent: 'net', set: 'devices' [ 639.312567] kobject: 'gre0' (0000000034cd08b4): auto cleanup 'remove' event [ 639.322733] kobject: 'syz_tun' (000000007afa7ee4): kobject_uevent_env [ 639.332442] kobject: 'gre0' (0000000034cd08b4): kobject_uevent_env [ 639.335842] kobject: 'syz_tun' (000000007afa7ee4): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 639.342220] kobject: 'gre0' (0000000034cd08b4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 639.351861] kobject: 'queues' (000000002287f08e): kobject_add_internal: parent: 'syz_tun', set: '' [ 639.365226] kobject: 'gre0' (0000000034cd08b4): calling ktype release [ 639.371565] kobject: 'queues' (000000002287f08e): kobject_uevent_env [ 639.381996] kobject: 'gre0': free name [ 639.384705] kobject: 'queues' (000000002287f08e): kobject_uevent_env: filter function caused the event to drop! [ 639.398840] kobject: 'rx-0' (00000000bc12f376): kobject_add_internal: parent: 'queues', set: 'queues' [ 639.408293] kobject: 'rx-0' (00000000bc12f376): kobject_uevent_env [ 639.414645] kobject: 'rx-0' (00000000bc12f376): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 639.425151] kobject: 'tx-0' (00000000cb5e5991): kobject_add_internal: parent: 'queues', set: 'queues' [ 639.434587] kobject: 'tx-0' (00000000cb5e5991): kobject_uevent_env [ 639.440924] kobject: 'tx-0' (00000000cb5e5991): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 639.451830] kobject: 'batman_adv' (0000000092ab41af): kobject_add_internal: parent: 'syz_tun', set: '' [ 639.465129] kobject: 'rx-0' (0000000045505e70): kobject_cleanup, parent 0000000089e8848d [ 639.473365] kobject: 'rx-0' (0000000045505e70): auto cleanup 'remove' event [ 639.480499] kobject: 'rx-0' (0000000045505e70): kobject_uevent_env [ 639.486842] kobject: 'rx-0' (0000000045505e70): kobject_uevent_env: uevent_suppress caused the event to drop! [ 639.496914] kobject: 'rx-0' (0000000045505e70): auto cleanup kobject_del [ 639.504226] kobject: 'rx-0' (0000000045505e70): calling ktype release [ 639.510797] kobject: 'rx-0': free name [ 639.514757] kobject: 'tx-0' (0000000057701897): kobject_cleanup, parent 0000000089e8848d [ 639.522986] kobject: 'tx-0' (0000000057701897): auto cleanup 'remove' event [ 639.530114] kobject: 'tx-0' (0000000057701897): kobject_uevent_env [ 639.536473] kobject: 'tx-0' (0000000057701897): kobject_uevent_env: uevent_suppress caused the event to drop! [ 639.546746] kobject: 'tx-0' (0000000057701897): auto cleanup kobject_del [ 639.553600] kobject: 'tx-0' (0000000057701897): calling ktype release [ 639.560205] kobject: 'tx-0': free name [ 639.564137] kobject: 'queues' (0000000089e8848d): kobject_cleanup, parent (null) [ 639.572570] kobject: 'queues' (0000000089e8848d): calling ktype release [ 639.579366] kobject: 'queues' (0000000089e8848d): kset_release [ 639.585725] kobject: 'queues': free name [ 639.589979] kobject: 'tunl0' (00000000d4d2864c): kobject_uevent_env [ 639.596421] kobject: 'tunl0' (00000000d4d2864c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 639.608883] kobject: 'ip6gretap0' (0000000024a3d4ad): kobject_add_internal: parent: 'net', set: 'devices' [ 639.619221] kobject: 'ip6gretap0' (0000000024a3d4ad): kobject_uevent_env [ 639.626229] kobject: 'ip6gretap0' (0000000024a3d4ad): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0' [ 639.636493] kobject: 'queues' (000000006c8def4f): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 639.646410] kobject: 'queues' (000000006c8def4f): kobject_uevent_env [ 639.652889] kobject: 'queues' (000000006c8def4f): kobject_uevent_env: filter function caused the event to drop! [ 639.663179] kobject: 'rx-0' (0000000091306a19): kobject_add_internal: parent: 'queues', set: 'queues' [ 639.672608] kobject: 'rx-0' (0000000091306a19): kobject_uevent_env [ 639.679060] kobject: 'rx-0' (0000000091306a19): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/rx-0' [ 639.689793] kobject: 'tx-0' (00000000548f36f4): kobject_add_internal: parent: 'queues', set: 'queues' [ 639.699276] kobject: 'tx-0' (00000000548f36f4): kobject_uevent_env [ 639.705628] kobject: 'tx-0' (00000000548f36f4): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/tx-0' [ 639.716954] kobject: 'batman_adv' (000000003a3c2c6f): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 639.727713] kobject: 'tunl0' (00000000d4d2864c): kobject_cleanup, parent (null) [ 639.728196] kobject: 'bridge0' (000000002aeb7a50): kobject_add_internal: parent: 'net', set: 'devices' [ 639.739207] kobject: 'tunl0' (00000000d4d2864c): auto cleanup 'remove' event [ 639.746177] kobject: 'bridge0' (000000002aeb7a50): kobject_uevent_env [ 639.752891] kobject: 'tunl0' (00000000d4d2864c): kobject_uevent_env [ 639.759716] kobject: 'bridge0' (000000002aeb7a50): fill_kobj_path: path = '/devices/virtual/net/bridge0' [ 639.769170] kobject: 'tunl0' (00000000d4d2864c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 639.775711] kobject: 'queues' (000000006fc83cd8): kobject_add_internal: parent: 'bridge0', set: '' [ 639.789068] kobject: 'tunl0' (00000000d4d2864c): calling ktype release [ 639.795487] kobject: 'queues' (000000006fc83cd8): kobject_uevent_env [ 639.802243] kobject: 'tunl0': free name [ 639.808646] kobject: 'queues' (000000006fc83cd8): kobject_uevent_env: filter function caused the event to drop! [ 639.808684] kobject: 'rx-0' (000000007c428a0a): kobject_add_internal: parent: 'queues', set: 'queues' [ 639.808735] kobject: 'rx-0' (000000007c428a0a): kobject_uevent_env [ 639.838815] kobject: 'rx-0' (000000007c428a0a): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/rx-0' [ 639.849338] kobject: 'tx-0' (00000000c89a9eee): kobject_add_internal: parent: 'queues', set: 'queues' [ 639.858879] kobject: 'tx-0' (00000000c89a9eee): kobject_uevent_env [ 639.865271] kobject: 'tx-0' (00000000c89a9eee): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/tx-0' [ 639.876643] kobject: 'brif' (00000000d0242278): kobject_add_internal: parent: 'bridge0', set: '' [ 639.886302] kobject: 'batman_adv' (00000000ff82fe65): kobject_add_internal: parent: 'bridge0', set: '' [ 639.896651] kobject: 'mesh' (000000002c00f667): kobject_uevent_env [ 639.903078] kobject: 'mesh' (000000002c00f667): kobject_uevent_env: filter function caused the event to drop! [ 639.913986] device bridge_slave_1 left promiscuous mode [ 639.919424] bridge0: port 2(bridge_slave_1) entered disabled state [ 639.964332] kobject: 'brport' (000000009d9a3bbb): kobject_uevent_env [ 639.970849] kobject: 'brport' (000000009d9a3bbb): kobject_uevent_env: filter function caused the event to drop! [ 639.981256] device bridge_slave_0 left promiscuous mode [ 639.986726] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.043846] kobject: 'brport' (000000009d9a3bbb): kobject_cleanup, parent (null) [ 640.052279] kobject: 'brport' (000000009d9a3bbb): calling ktype release [ 640.059070] kobject: 'brport': free name [ 640.063778] kobject: 'brport' (00000000b88cc8bf): kobject_uevent_env [ 640.070282] kobject: 'brport' (00000000b88cc8bf): kobject_uevent_env: filter function caused the event to drop! [ 640.080733] kobject: 'brif' (00000000a8e1a093): kobject_cleanup, parent 000000009bff6222 [ 640.088997] kobject: 'brif' (00000000a8e1a093): auto cleanup kobject_del [ 640.095865] kobject: 'brif' (00000000a8e1a093): calling ktype release [ 640.102445] kobject: (00000000a8e1a093): dynamic_kobj_release [ 640.108352] kobject: 'brif': free name [ 640.127428] kobject: 'vlan0' (00000000de8851bf): kobject_uevent_env [ 640.133891] kobject: 'vlan0' (00000000de8851bf): kobject_uevent_env: attempted to send uevent without kset! [ 640.143828] kobject: 'mesh' (000000002c00f667): kobject_cleanup, parent (null) [ 640.152053] kobject: 'mesh' (000000002c00f667): calling ktype release [ 640.158644] kobject: (000000002c00f667): dynamic_kobj_release [ 640.164561] kobject: 'mesh': free name [ 640.168443] kobject: 'vlan0' (00000000de8851bf): kobject_cleanup, parent (null) [ 640.176779] kobject: 'vlan0' (00000000de8851bf): calling ktype release [ 640.183436] kobject: (00000000de8851bf): dynamic_kobj_release [ 640.189340] kobject: 'vlan0': free name [ 640.197780] kobject: 'batman_adv' (00000000e86a9fa7): kobject_uevent_env [ 640.204702] kobject: 'batman_adv' (00000000e86a9fa7): kobject_uevent_env: filter