x(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:18 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x1f, 0x5}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e20, 0xf5b, @remote, 0x3ff}}, 0x800, 0x7}, 0x88) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000000c0)=ANY=[@ANYRES32=r3, @ANYBLOB="ff0302e3f0ff0300"], 0xc) ioctl$sock_ifreq(r1, 0x8983, &(0x7f0000000180)={'nlmon0\x00', @ifru_flags}) 05:06:18 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:18 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00?\xa9[\x00', @ifru_flags=0x1}) 05:06:18 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 05:06:18 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000001c0), 0x4) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000040)=""/139) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000100)={0x0, 0x7}, 0x8) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8983, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x00', @ifru_flags}) 05:06:18 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:18 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:18 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 05:06:18 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:18 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:19 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:19 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:19 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00@\xa9[\x00', @ifru_flags=0x1}) 05:06:19 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:19 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 05:06:19 executing program 4: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x05\xa9[\x00', @ifru_flags=0x1}) 05:06:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 05:06:19 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 05:06:19 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:20 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 05:06:20 executing program 3: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 05:06:20 executing program 3: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 05:06:20 executing program 3: pipe(0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 05:06:20 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 05:06:20 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00A\xa9[\x00', @ifru_flags=0x1}) 05:06:20 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:20 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:20 executing program 4: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x05\xa9[\x00', @ifru_flags=0x1}) 05:06:20 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, 0x0) 05:06:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:21 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 05:06:21 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, 0x0) 05:06:21 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:22 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 05:06:22 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03D\xa9[\x00', @ifru_flags=0x1}) 05:06:22 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) accept4(r3, &(0x7f0000000000)=@hci, &(0x7f0000000080)=0x80, 0x80000) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:22 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:22 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, 0x0) 05:06:22 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 05:06:23 executing program 4: socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:23 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03I\xa9[\x00', @ifru_flags=0x1}) 05:06:23 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:23 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags}) 05:06:23 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 05:06:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:24 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:24 executing program 4: socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:24 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 05:06:24 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03P\xa9[\x00', @ifru_flags=0x1}) 05:06:24 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags}) 05:06:25 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:25 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 05:06:25 executing program 0: socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:25 executing program 4: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03I\xa9[\x00', @ifru_flags=0x1}) 05:06:26 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags}) 05:06:26 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:26 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x02T\xa9[\x00', @ifru_flags=0x1}) 05:06:26 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags}) 05:06:26 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:27 executing program 0: socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:27 executing program 4: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03D\xa9[\x00', @ifru_flags=0x1}) 05:06:27 executing program 5: pipe(&(0x7f0000000040)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 05:06:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000240)=0xffff, 0x2) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000040)="69df575b1e647a44be46c1aa626f877e78003fcdec68a8c5197f6ff1c8d464638843a5ab21d51f4d803ceaeb21ae4767b6d1216e2807e56318301cc9a65fd3122f268613050bf0a3c1b8c1e7913da91dd6e61e5695ddd63dfd3182d0269922f5dd6a0fd00d33d241a6fd1371e222d7376686804c2b2c9cbe1ccc654e20145494ed8d5ad964017885943645a3275132507e51b516e14f1b4c525544a3018faec8915cd2884ed267f918748d6cc44e00feddf9846b973b3fdb452ce1a7f34160a297272cbd3d5dc9a2995d5e2e7a47fc5e322cd54e062729bb08") ioctl$sock_ifreq(r0, 0x8983, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x00', @ifru_flags}) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video36\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40046432, &(0x7f00000001c0)=0x10000) 05:06:27 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:28 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\xf0\x03\xa9[\x00', @ifru_flags=0x1}) 05:06:28 executing program 2: pipe(&(0x7f0000000040)) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 05:06:28 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:29 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:29 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03U\xa9[\x00', @ifru_flags=0x1}) 05:06:29 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) getpeername$tipc(r0, &(0x7f0000000000)=@name, &(0x7f0000000040)=0x10) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:29 executing program 0: socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:29 executing program 4: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03D\xa9[\x00', @ifru_flags=0x1}) 05:06:29 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:30 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000000)) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:30 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:30 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\xf0\x03\xa9[\x00', @ifru_flags=0x1}) 05:06:31 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000100), 0x4) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x100) openat$ppp(0xffffffffffffff9c, &(0x7f0000006240)='/dev/ppp\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x6, 0x5, @tid=r1}, &(0x7f00000000c0)=0x0) timer_getoverrun(r2) write(0xffffffffffffffff, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 05:06:31 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:31 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:32 executing program 4: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03D\xa9[\x00', @ifru_flags=0x1}) 05:06:32 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03\\\xa9[\x00', @ifru_flags=0x1}) 05:06:32 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:32 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:32 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:32 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:32 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:33 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:33 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\xf0\x03\xa9[\x00', @ifru_flags=0x1}) 05:06:33 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:33 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:33 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:34 executing program 4: r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x141005, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000340)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000700)={{0x0, 0x1, 0x80, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r4, 0x7, 0x2, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x03\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00'], 0x4d, [], [0x3, 0x800000000000, 0x3, 0x8000000000100]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) getgid() r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, 0x0) dup2(r2, r2) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') timerfd_create(0x7, 0x80080000) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r7, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) timer_create(0x4, &(0x7f0000000180), &(0x7f00000001c0)) fcntl$getown(r8, 0x9) rt_sigqueueinfo(0x0, 0x25, &(0x7f0000000500)={0x3, 0xcb86}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r9 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r7, &(0x7f0000000280)={0xa, 0x0, 0x3, @ipv4={[], [], @remote}, 0x6}, 0x1c) connect$l2tp(r9, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}}}, 0x2e) sendmmsg(r9, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 05:06:34 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03a\xa9[\x00', @ifru_flags=0x1}) 05:06:34 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 05:06:34 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:34 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:34 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000100), 0x4) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x100) openat$ppp(0xffffffffffffff9c, &(0x7f0000006240)='/dev/ppp\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x6, 0x5, @tid=r2}, &(0x7f00000000c0)=0x0) timer_getoverrun(r3) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000001c0)=0x3) write(r4, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 05:06:34 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000180)={0xfffffffffffffff7, {{0x2, 0x4e21, @loopback}}}, 0x15) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:34 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:35 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 05:06:35 executing program 4: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00%\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:35 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x5) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x20000, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000080)={0x2, 0xb, 0x6}) [ 679.359151][T25928] input:  as /devices/virtual/input/input1037 05:06:35 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000100), 0x4) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x100) openat$ppp(0xffffffffffffff9c, &(0x7f0000006240)='/dev/ppp\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x6, 0x5, @tid=r2}, &(0x7f00000000c0)=0x0) timer_getoverrun(r3) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000001c0)=0x3) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x40) write(r4, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 05:06:36 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 05:06:36 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03h\xa9[\x00', @ifru_flags=0x1}) 05:06:36 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:36 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:36 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000100), 0x4) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x100) openat$ppp(0xffffffffffffff9c, &(0x7f0000006240)='/dev/ppp\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x6, 0x5, @tid=r2}, &(0x7f00000000c0)=0x0) timer_getoverrun(r3) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000001c0)=0x3) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x40) write(r4, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 05:06:37 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 05:06:37 executing program 4: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00%\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:37 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 05:06:37 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:37 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 05:06:38 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x01j\xa9[\x00', @ifru_flags=0x1}) 05:06:38 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:38 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:38 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8983, &(0x7f0000000180)={'eql\x00?\x00\xa9[\x00', @ifru_flags}) 05:06:38 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 05:06:38 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:38 executing program 4: r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x141005, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000340)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000700)={{0x0, 0x1, 0x80, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r4, 0x7, 0x2, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x03\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00'], 0x4d, [], [0x3, 0x800000000000, 0x3, 0x8000000000100]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) getgid() r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, 0x0) dup2(r2, r2) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') timerfd_create(0x7, 0x80080000) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r7, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) timer_create(0x4, &(0x7f0000000180), &(0x7f00000001c0)) fcntl$getown(r8, 0x9) rt_sigqueueinfo(0x0, 0x25, &(0x7f0000000500)={0x3, 0xcb86}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r9 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r7, &(0x7f0000000280)={0xa, 0x0, 0x3, @ipv4={[], [], @remote}, 0x6}, 0x1c) connect$l2tp(r9, 0x0, 0x0) sendmmsg(r9, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 05:06:38 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000100), 0x4) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x100) openat$ppp(0xffffffffffffff9c, &(0x7f0000006240)='/dev/ppp\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x6, 0x5, @tid=r2}, &(0x7f00000000c0)=0x0) timer_getoverrun(r3) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000001c0)=0x3) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x40) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000100)=0x80000000) write(r4, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 05:06:39 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8983, &(0x7f0000000180)={'\x06\x00\x00\x00\x00\x00\xa9[\x00', @ifru_flags}) 05:06:39 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03m\xa9[\x00', @ifru_flags=0x1}) 05:06:39 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:39 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:39 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000100), 0x4) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x100) openat$ppp(0xffffffffffffff9c, &(0x7f0000006240)='/dev/ppp\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x6, 0x5, @tid=r2}, &(0x7f00000000c0)=0x0) timer_getoverrun(r3) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000001c0)=0x3) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x40) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000100)=0x80000000) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 05:06:39 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 05:06:39 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000100), 0x4) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x100) openat$ppp(0xffffffffffffff9c, &(0x7f0000006240)='/dev/ppp\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x6, 0x5, @tid=r2}, &(0x7f00000000c0)=0x0) timer_getoverrun(r3) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000001c0)=0x3) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x40) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000100)=0x80000000) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) syz_open_pts(r4, 0x0) write(r4, &(0x7f0000c34fff), 0xffffff0b) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 05:06:40 executing program 4: r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x141005, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000340)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000700)={{0x0, 0x1, 0x80, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r4, 0x7, 0x2, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x03\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00'], 0x4d, [], [0x3, 0x800000000000, 0x3, 0x8000000000100]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) getgid() r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, 0x0) dup2(r2, r2) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') timerfd_create(0x7, 0x80080000) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r7, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) timer_create(0x4, &(0x7f0000000180), &(0x7f00000001c0)) fcntl$getown(r8, 0x9) rt_sigqueueinfo(0x0, 0x25, &(0x7f0000000500)={0x3, 0xcb86}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r9 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r7, &(0x7f0000000280)={0xa, 0x0, 0x3, @ipv4={[], [], @remote}, 0x6}, 0x1c) connect$l2tp(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r9, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 05:06:40 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 05:06:40 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:40 executing program 5: r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x141005, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000340)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000700)={{0x0, 0x1, 0x80, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r4, 0x7, 0x2, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x03\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00'], 0x4d, [], [0x3, 0x800000000000, 0x3, 0x8000000000100]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) getgid() r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="00bc0800000000000000c90700005b101288878df3f85a0f06990100000024f45264499347e31632e80a971034903c3fffb00000dbcb4669e4cc67f518a55c923b8034280a64d2f0864d89978495b1cd8cf464d3744822b7dca780ae181ebd023699a1179a784157bb5f70a3f5a887977f991dc24ab0e2775d2ed16bb81091589e00021c1ea4870900000000000000eb6a6beeb89e7eae0c0f5f5731f96ebde59d21db03aca20188928d135ff0b83acfdae902d1d2d17f32257b8c5c19482ccbab150760201efd893196e8eb1cc5fc6a037e91920e60df120cf09dbd1716ea577c1c74676bca920ea6fed777b08b221714d46267c44df82c68f1e3df22619e2c2a30120000c5010062010000000000004570d991920000a1d3063a6f4c5d6723b210f2f8ecbf4f2b1a60196fb0a6bfbe719b96db91d27b1a1eb9e5b5078ddbcd8f3622c23160cb26c529eaeed5d0c51522e2dc24b2b7daebb90369d71e35d198984390b71bad688a91fa0089c70d1393c695f7f513d945dded5561b1cb7bf0d9be7e8ba177dba713ecf4068e0e024f469f8529803305192ab774622cf8ed18d50cd18418d0fd5d183b5e632d44939c78b452c583c8fe7273553e634097c6024530537d4b2d1e9cbcc972072eab23184086547094da67f33a70cf47ecf10d0fb05a9967b793e2e28b1840cf8f603ca587470f9f485791099dcaaf10a8fffbbe1fecafa60dca858e1e44ed399ef6618a01bedebee1c82a9869b966049eab1aaf55d3f0c91e0eeb70db5148c2ca2f85d4f47e6d393d9dc45b0a5f23a3a572f475f49867ae2983176ae54a9158d6e82d"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, 0x0) dup2(r2, r2) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') timerfd_create(0x7, 0x80080000) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r7, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) timer_create(0x4, &(0x7f0000000180), &(0x7f00000001c0)) fcntl$getown(r8, 0x9) rt_sigqueueinfo(0x0, 0x25, &(0x7f0000000500)={0x3, 0xcb86}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r9 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r7, &(0x7f0000000280)={0xa, 0x0, 0x3, @ipv4={[], [], @remote}, 0x6}, 0x1c) connect$l2tp(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r9, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 05:06:41 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:41 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:41 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x02r\xa9[\x00', @ifru_flags=0x1}) 05:06:41 executing program 5: r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x141005, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000340)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000700)={{0x0, 0x1, 0x80, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r4, 0x7, 0x2, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x03\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00'], 0x4d, [], [0x3, 0x800000000000, 0x3, 0x8000000000100]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) getgid() r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, 0x0) dup2(r2, r2) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') timerfd_create(0x7, 0x80080000) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r7, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) timer_create(0x4, &(0x7f0000000180), &(0x7f00000001c0)) fcntl$getown(r8, 0x9) rt_sigqueueinfo(0x0, 0x25, &(0x7f0000000500)={0x3, 0xcb86}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r9 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r7, &(0x7f0000000280)={0xa, 0x0, 0x3, @ipv4={[], [], @remote}}, 0x1c) connect$l2tp(r9, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r9, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 05:06:41 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000100), 0x4) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x100) openat$ppp(0xffffffffffffff9c, &(0x7f0000006240)='/dev/ppp\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x6, 0x5, @tid=r2}, &(0x7f00000000c0)=0x0) timer_getoverrun(r3) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000001c0)=0x3) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x40) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000100)=0x80000000) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) syz_open_pts(r4, 0x0) sched_setscheduler(r2, 0x6, &(0x7f00000002c0)=0xb1d) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 05:06:41 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:41 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 05:06:42 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:42 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000100), 0x4) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x100) openat$ppp(0xffffffffffffff9c, &(0x7f0000006240)='/dev/ppp\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x6, 0x5, @tid=r2}, &(0x7f00000000c0)=0x0) timer_getoverrun(r3) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000001c0)=0x3) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x40) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000100)=0x80000000) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) syz_open_pts(r4, 0x0) sched_setscheduler(r2, 0x6, &(0x7f00000002c0)=0xb1d) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 05:06:42 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x402c5828, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x00', @ifru_flags}) 05:06:42 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:42 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000100), 0x4) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x100) openat$ppp(0xffffffffffffff9c, &(0x7f0000006240)='/dev/ppp\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x6, 0x5, @tid=r2}, &(0x7f00000000c0)=0x0) timer_getoverrun(r3) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000001c0)=0x3) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x40) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000100)=0x80000000) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) syz_open_pts(r4, 0x0) sched_setscheduler(r2, 0x6, &(0x7f00000002c0)=0xb1d) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 05:06:43 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\xa4\x01\xa9[\x00', @ifru_flags=0x1}) 05:06:43 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:43 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03t\xa9[\x00', @ifru_flags=0x1}) 05:06:43 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:43 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89a1, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x00', @ifru_flags}) 05:06:44 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x8dffffff00000000) 05:06:44 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:44 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89a0, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x00', @ifru_flags}) 05:06:44 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:44 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x02w\xa9[\x00', @ifru_flags=0x1}) 05:06:45 executing program 5: r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x141005, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000340)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000700)={{0x0, 0x1, 0x80, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r4, 0x7, 0x2, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x03\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00'], 0x4d, [], [0x3, 0x800000000000, 0x3, 0x8000000000100]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) getgid() r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="00bc0800000000000000c90700005b101288878df3f85a0f06990100000024f45264499347e31632e80a971034903c3fffb00000dbcb4669e4cc67f518a55c923b8034280a64d2f0864d89978495b1cd8cf464d3744822b7dca780ae181ebd023699a1179a784157bb5f70a3f5a887977f991dc24ab0e2775d2ed16bb81091589e00021c1ea4870900000000000000eb6a6beeb89e7eae0c0f5f5731f96ebde59d21db03aca20188928d135ff0b83acfdae902d1d2d17f32257b8c5c19482ccbab150760201efd893196e8eb1cc5fc6a037e91920e60df120cf09dbd1716ea577c1c74676bca920ea6fed777b08b221714d46267c44df82c68f1e3df22619e2c2a30120000c5010062010000000000004570d991920000a1d3063a6f4c5d6723b210f2f8ecbf4f2b1a60196fb0a6bfbe719b96db91d27b1a1eb9e5b5078ddbcd8f3622c23160cb26c529eaeed5d0c51522e2dc24b2b7daebb90369d71e35d198984390b71bad688a91fa0089c70d1393c695f7f513d945dded5561b1cb7bf0d9be7e8ba177dba713ecf4068e0e024f469f8529803305192ab774622cf8ed18d50cd18418d0fd5d183b5e632d44939c78b452c583c8fe7273553e634097c6024530537d4b2d1e9cbcc972072eab23184086547094da67f33a70cf47ecf10d0fb05a9967b793e2e28b1840cf8f603ca587470f9f485791099dcaaf10a8fffbbe1fecafa60dca858e1e44ed399ef6618a01bedebee1c82a9869b966049eab1aaf55d3f0c91e0eeb70db5148c2ca2f85d4f47e6d393d9dc45b0a5f23a3a572f475f49867ae2983176ae54a9158d6e82d"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, 0x0) dup2(r2, r2) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') timerfd_create(0x7, 0x80080000) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r7, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) timer_create(0x4, &(0x7f0000000180), &(0x7f00000001c0)) fcntl$getown(r8, 0x9) rt_sigqueueinfo(0x0, 0x25, &(0x7f0000000500)={0x3, 0xcb86}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r9 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r7, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}, 0x6}, 0x1c) connect$l2tp(r9, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r9, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 05:06:45 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:45 executing program 4: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03t\xa9[\x00', @ifru_flags=0x1}) 05:06:45 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000100), 0x4) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x100) openat$ppp(0xffffffffffffff9c, &(0x7f0000006240)='/dev/ppp\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x6, 0x5, @tid=r2}, &(0x7f00000000c0)=0x0) timer_getoverrun(r3) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000001c0)=0x3) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x40) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000100)=0x80000000) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) syz_open_pts(r4, 0x0) sched_setscheduler(r2, 0x6, &(0x7f00000002c0)=0xb1d) write(r4, &(0x7f0000c34fff), 0xffffff0b) dup3(0xffffffffffffffff, r1, 0xfffffffffffffffc) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000140)={0x5, 0x5, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x9}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 05:06:45 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:45 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:45 executing program 3: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00=\x01\xa9[\x00', @ifru_flags=0x1}) 05:06:46 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:46 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000100), 0x4) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x100) openat$ppp(0xffffffffffffff9c, &(0x7f0000006240)='/dev/ppp\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x6, 0x5, @tid=r2}, &(0x7f00000000c0)=0x0) timer_getoverrun(r3) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000001c0)=0x3) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x40) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000100)=0x80000000) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) syz_open_pts(r4, 0x0) sched_setscheduler(r2, 0x6, &(0x7f00000002c0)=0xb1d) write(r4, &(0x7f0000c34fff), 0xffffff0b) r5 = dup3(0xffffffffffffffff, r1, 0xfffffffffffffffc) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000140)={0x5, 0x5, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x9}) ioctl$VIDIOC_QUERYCAP(r5, 0x80685600, &(0x7f0000000300)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 05:06:46 executing program 4: r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x141005, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000340)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000700)={{0x0, 0x1, 0x80, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r4, 0x7, 0x2, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x03\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00'], 0x4d, [], [0x3, 0x800000000000, 0x3, 0x8000000000100]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) getgid() r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, 0x0) dup2(r2, r2) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') timerfd_create(0x7, 0x80080000) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r7, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) timer_create(0x4, &(0x7f0000000180), &(0x7f00000001c0)) fcntl$getown(r8, 0x9) rt_sigqueueinfo(0x0, 0x25, &(0x7f0000000500)={0x3, 0xcb86}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r9 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r7, 0x0, 0x0) connect$l2tp(r9, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r9, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 05:06:46 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x02x\xa9[\x00', @ifru_flags=0x1}) 05:06:46 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 690.417504][T26174] Dead loop on virtual device ip6_vti0, fix it urgently! [ 690.439011][T26174] Dead loop on virtual device ip6_vti0, fix it urgently! [ 690.455400][T26174] Dead loop on virtual device ip6_vti0, fix it urgently! [ 690.479536][T26174] Dead loop on virtual device ip6_vti0, fix it urgently! [ 690.493006][T26174] Dead loop on virtual device ip6_vti0, fix it urgently! [ 690.516683][T26174] Dead loop on virtual device ip6_vti0, fix it urgently! 05:06:47 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000100), 0x4) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x100) openat$ppp(0xffffffffffffff9c, &(0x7f0000006240)='/dev/ppp\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000280)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x6, 0x5, @tid=r2}, &(0x7f00000000c0)=0x0) timer_getoverrun(r3) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000180)) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000001c0)=0x3) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x40) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000100)=0x80000000) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) syz_open_pts(r4, 0x0) sched_setscheduler(r2, 0x6, &(0x7f00000002c0)=0xb1d) write(r4, &(0x7f0000c34fff), 0xffffff0b) r5 = dup3(0xffffffffffffffff, r1, 0xfffffffffffffffc) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000140)={0x5, 0x5, 0x0, 0x3, 0x4, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x9}) ioctl$VIDIOC_QUERYCAP(r5, 0x80685600, &(0x7f0000000300)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) 05:06:47 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\xf4\x00\xa9[\x00', @ifru_flags=0x1}) 05:06:47 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:47 executing program 3: r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x141005, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000340)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000700)={{0x0, 0x1, 0x80, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r4, 0x7, 0x2, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x03\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00'], 0x4d, [], [0x3, 0x800000000000, 0x3, 0x8000000000100]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) getgid() r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, 0x0) dup2(r2, r2) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') timerfd_create(0x7, 0x80080000) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r7, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) timer_create(0x4, &(0x7f0000000180), &(0x7f00000001c0)) fcntl$getown(r8, 0x9) rt_sigqueueinfo(0x0, 0x25, &(0x7f0000000500)={0x3, 0xcb86}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r9 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r7, 0x0, 0x0) connect$l2tp(r9, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r9, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$can_raw(0x1d, 0x3, 0x1) [ 691.927124][T26196] Dead loop on virtual device ip6_vti0, fix it urgently! [ 691.963572][T26196] Dead loop on virtual device ip6_vti0, fix it urgently! [ 691.993585][T26196] Dead loop on virtual device ip6_vti0, fix it urgently! [ 692.034052][T26196] Dead loop on virtual device ip6_vti0, fix it urgently! 05:06:48 executing program 4: r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x141005, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000340)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000700)={{0x0, 0x1, 0x80, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r4, 0x7, 0x2, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x03\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00'], 0x4d, [], [0x3, 0x800000000000, 0x3, 0x8000000000100]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) getgid() r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, 0x0) dup2(r2, r2) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') timerfd_create(0x7, 0x80080000) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r7, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) timer_create(0x4, &(0x7f0000000180), &(0x7f00000001c0)) fcntl$getown(r8, 0x9) rt_sigqueueinfo(0x0, 0x25, &(0x7f0000000500)={0x3, 0xcb86}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r9 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x3, @ipv4={[], [], @remote}, 0x6}, 0x1c) connect$l2tp(r9, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r9, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 05:06:48 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:48 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x02\x84\xa9[\x00', @ifru_flags=0x1}) 05:06:48 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:48 executing program 3: r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x141005, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000340)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000700)={{0x0, 0x1, 0x80, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r4, 0x7, 0x2, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x03\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00'], 0x4d, [], [0x3, 0x800000000000, 0x3, 0x8000000000100]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) getgid() r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="00bc0800000000000000c90700005b101288878df3f85a0f06990100000024f45264499347e31632e80a971034903c3fffb00000dbcb4669e4cc67f518a55c923b8034280a64d2f0864d89978495b1cd8cf464d3744822b7dca780ae181ebd023699a1179a784157bb5f70a3f5a887977f991dc24ab0e2775d2ed16bb81091589e00021c1ea4870900000000000000eb6a6beeb89e7eae0c0f5f5731f96ebde59d21db03aca20188928d135ff0b83acfdae902d1d2d17f32257b8c5c19482ccbab150760201efd893196e8eb1cc5fc6a037e91920e60df120cf09dbd1716ea577c1c74676bca920ea6fed777b08b221714d46267c44df82c68f1e3df22619e2c2a30120000c5010062010000000000004570d991920000a1d3063a6f4c5d6723b210f2f8ecbf4f2b1a60196fb0a6bfbe719b96db91d27b1a1eb9e5b5078ddbcd8f3622c23160cb26c529eaeed5d0c51522e2dc24b2b7daebb90369d71e35d198984390b71bad688a91fa0089c70d1393c695f7f513d945dded5561b1cb7bf0d9be7e8ba177dba713ecf4068e0e024f469f8529803305192ab774622cf8ed18d50cd18418d0fd5d183b5e632d44939c78b452c583c8fe7273553e634097c6024530537d4b2d1e9cbcc972072eab23184086547094da67f33a70cf47ecf10d0fb05a9967b793e2e28b1840cf8f603ca587470f9f485791099dcaaf10a8fffbbe1fecafa60dca858e1e44ed399ef6618a01bedebee1c82a9869b966049eab1aaf55d3f0c91e0eeb70db5148c2ca2f85d4f47e6d393d9dc45b0a5f23a3a572f475f49867ae2983176ae54a9158d6e82d"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, 0x0) dup2(r2, r2) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') timerfd_create(0x7, 0x80080000) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r7, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) timer_create(0x4, &(0x7f0000000180), &(0x7f00000001c0)) fcntl$getown(r8, 0x9) rt_sigqueueinfo(0x0, 0x25, &(0x7f0000000500)={0x3, 0xcb86}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r9 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r7, 0x0, 0x0) connect$l2tp(r9, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r9, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 05:06:49 executing program 4: r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x141005, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000340)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000700)={{0x0, 0x1, 0x80, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r4, 0x7, 0x2, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x03\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00'], 0x4d, [], [0x3, 0x800000000000, 0x3, 0x8000000000100]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) getgid() r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, 0x0) dup2(r2, r2) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') timerfd_create(0x7, 0x80080000) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r7, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) timer_create(0x4, &(0x7f0000000180), &(0x7f00000001c0)) fcntl$getown(r8, 0x9) rt_sigqueueinfo(0x0, 0x25, &(0x7f0000000500)={0x3, 0xcb86}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r9 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x3, @ipv4={[], [], @remote}, 0x6}, 0x1c) connect$l2tp(r9, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r9, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 05:06:49 executing program 5: r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x141005, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000340)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000700)={{0x0, 0x1, 0x80, 0x46, '\x00', 0x1}, 0x0, 0x20000160, 0x9, r4, 0x7, 0x2, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x03\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00'], 0x4d, [], [0x3, 0x800000000000, 0x3, 0x8000000000100]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000002c0)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) getgid() r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, 0x0) dup2(r2, r2) setsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000001c0)={r6, @loopback, @rand_addr=0x1cb}, 0xc) syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') timerfd_create(0x7, 0x80080000) r7 = socket$inet6_udp(0xa, 0x2, 0x0) r8 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r7, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) timer_create(0x4, &(0x7f0000000180), &(0x7f00000001c0)) fcntl$getown(r8, 0x9) rt_sigqueueinfo(0x0, 0x25, &(0x7f0000000500)={0x3, 0xcb86}) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r9 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x3, @ipv4={[], [], @remote}, 0x6}, 0x1c) connect$l2tp(r9, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r9, &(0x7f0000005fc0), 0x800000000000059, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 05:06:49 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:49 executing program 3 (fault-call:6 fault-nth:0): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 693.359707][T26232] FAULT_INJECTION: forcing a failure. [ 693.359707][T26232] name failslab, interval 1, probability 0, space 0, times 0 [ 693.476133][T26232] CPU: 0 PID: 26232 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 693.484085][T26232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.494147][T26232] Call Trace: [ 693.497459][T26232] dump_stack+0x172/0x1f0 [ 693.501808][T26232] should_fail.cold+0xa/0x15 [ 693.506426][T26232] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 693.512249][T26232] ? ___might_sleep+0x163/0x280 [ 693.517118][T26232] __should_failslab+0x121/0x190 [ 693.522081][T26232] should_failslab+0x9/0x14 [ 693.526595][T26232] __kmalloc+0x2dc/0x740 [ 693.530849][T26232] ? __local_bh_enable_ip+0x15a/0x270 [ 693.536230][T26232] ? lock_sock_nested+0xe2/0x120 [ 693.541176][T26232] ? __local_bh_enable_ip+0x15a/0x270 [ 693.546564][T26232] ? lockdep_hardirqs_on+0x418/0x5d0 [ 693.551858][T26232] ? lock_sock_nested+0x9a/0x120 [ 693.556801][T26232] ? sock_kmalloc+0xc6/0x120 [ 693.561406][T26232] sock_kmalloc+0xc6/0x120 [ 693.565837][T26232] hash_alloc_result.part.0+0x95/0x110 [ 693.571901][T26232] hash_sendpage+0x7b3/0x9e0 [ 693.576509][T26232] kernel_sendpage+0x95/0xf0 [ 693.581129][T26232] ? hash_sendmsg+0xad0/0xad0 [ 693.585818][T26232] sock_sendpage+0x8b/0xc0 [ 693.590332][T26232] ? lockdep_hardirqs_on+0x418/0x5d0 [ 693.595629][T26232] pipe_to_sendpage+0x299/0x370 [ 693.600486][T26232] ? kernel_sendpage+0xf0/0xf0 [ 693.605257][T26232] ? direct_splice_actor+0x1a0/0x1a0 [ 693.610546][T26232] ? __put_page+0x92/0xd0 [ 693.614883][T26232] ? anon_pipe_buf_release+0x1c6/0x270 [ 693.620337][T26232] __splice_from_pipe+0x395/0x7d0 [ 693.625347][T26232] ? direct_splice_actor+0x1a0/0x1a0 [ 693.630616][T26232] ? direct_splice_actor+0x1a0/0x1a0 [ 693.635892][T26232] splice_from_pipe+0x108/0x170 [ 693.640739][T26232] ? splice_shrink_spd+0xd0/0xd0 [ 693.645689][T26232] ? apparmor_file_permission+0x25/0x30 [ 693.651221][T26232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.657489][T26232] ? security_file_permission+0x94/0x380 [ 693.663139][T26232] generic_splice_sendpage+0x3c/0x50 [ 693.668438][T26232] ? splice_from_pipe+0x170/0x170 [ 693.673456][T26232] do_splice+0x70a/0x13c0 [ 693.677806][T26232] ? opipe_prep.part.0+0x2d0/0x2d0 [ 693.682924][T26232] ? __fget_light+0x1a9/0x230 [ 693.687612][T26232] __ia32_sys_splice+0x2c4/0x330 [ 693.692557][T26232] do_fast_syscall_32+0x281/0xc98 [ 693.697591][T26232] entry_SYSENTER_compat+0x70/0x7f [ 693.702690][T26232] RIP: 0023:0xf7fb8869 [ 693.706755][T26232] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 693.726362][T26232] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 693.734789][T26232] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 693.742747][T26232] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 693.750707][T26232] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 693.758670][T26232] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 693.766665][T26232] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:06:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:50 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x86\xa9[\x00', @ifru_flags=0x1}) 05:06:50 executing program 5 (fault-call:5 fault-nth:0): socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:50 executing program 3 (fault-call:6 fault-nth:1): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 694.237183][T26250] FAULT_INJECTION: forcing a failure. [ 694.237183][T26250] name failslab, interval 1, probability 0, space 0, times 0 [ 694.259252][T26250] CPU: 0 PID: 26250 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 694.267180][T26250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.277254][T26250] Call Trace: [ 694.280558][T26250] dump_stack+0x172/0x1f0 [ 694.284889][T26250] should_fail.cold+0xa/0x15 [ 694.289475][T26250] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 694.295290][T26250] ? ___might_sleep+0x163/0x280 [ 694.300127][T26250] __should_failslab+0x121/0x190 [ 694.305048][T26250] should_failslab+0x9/0x14 [ 694.309529][T26250] __kmalloc+0x2dc/0x740 [ 694.314012][T26250] ? __local_bh_enable_ip+0x15a/0x270 [ 694.319365][T26250] ? lock_sock_nested+0xe2/0x120 [ 694.324281][T26250] ? __local_bh_enable_ip+0x15a/0x270 [ 694.329652][T26250] ? lockdep_hardirqs_on+0x418/0x5d0 [ 694.334914][T26250] ? lock_sock_nested+0x9a/0x120 [ 694.339826][T26250] ? sock_kmalloc+0xc6/0x120 [ 694.344398][T26250] sock_kmalloc+0xc6/0x120 [ 694.348798][T26250] hash_alloc_result.part.0+0x95/0x110 [ 694.354239][T26250] hash_sendpage+0x7b3/0x9e0 [ 694.358812][T26250] kernel_sendpage+0x95/0xf0 [ 694.363404][T26250] ? hash_sendmsg+0xad0/0xad0 [ 694.368070][T26250] sock_sendpage+0x8b/0xc0 [ 694.372466][T26250] ? lockdep_hardirqs_on+0x418/0x5d0 [ 694.377729][T26250] pipe_to_sendpage+0x299/0x370 [ 694.382560][T26250] ? kernel_sendpage+0xf0/0xf0 [ 694.387301][T26250] ? direct_splice_actor+0x1a0/0x1a0 [ 694.392570][T26250] ? __put_page+0x92/0xd0 [ 694.396880][T26250] ? anon_pipe_buf_release+0x1c6/0x270 [ 694.402333][T26250] __splice_from_pipe+0x395/0x7d0 [ 694.407338][T26250] ? direct_splice_actor+0x1a0/0x1a0 [ 694.412625][T26250] ? direct_splice_actor+0x1a0/0x1a0 [ 694.417886][T26250] splice_from_pipe+0x108/0x170 [ 694.422716][T26250] ? splice_shrink_spd+0xd0/0xd0 [ 694.427637][T26250] ? apparmor_file_permission+0x25/0x30 [ 694.433162][T26250] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 694.439381][T26250] ? security_file_permission+0x94/0x380 [ 694.444998][T26250] generic_splice_sendpage+0x3c/0x50 [ 694.450260][T26250] ? splice_from_pipe+0x170/0x170 [ 694.455279][T26250] do_splice+0x70a/0x13c0 [ 694.459596][T26250] ? opipe_prep.part.0+0x2d0/0x2d0 [ 694.464690][T26250] ? __fget_light+0x1a9/0x230 [ 694.469348][T26250] __ia32_sys_splice+0x2c4/0x330 [ 694.474289][T26250] do_fast_syscall_32+0x281/0xc98 [ 694.479297][T26250] entry_SYSENTER_compat+0x70/0x7f [ 694.484389][T26250] RIP: 0023:0xf7fb8869 [ 694.488441][T26250] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 694.508032][T26250] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 694.516424][T26250] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 694.524378][T26250] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 694.532346][T26250] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 694.540299][T26250] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 694.548248][T26250] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:06:51 executing program 4 (fault-call:6 fault-nth:0): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 694.957119][T26246] FAULT_INJECTION: forcing a failure. [ 694.957119][T26246] name fail_futex, interval 1, probability 0, space 0, times 1 [ 694.986554][T26246] CPU: 0 PID: 26246 Comm: syz-executor.5 Not tainted 5.1.0-rc1 #28 [ 694.994516][T26246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.004566][T26246] Call Trace: [ 695.007863][T26246] dump_stack+0x172/0x1f0 [ 695.012204][T26246] should_fail.cold+0xa/0x15 [ 695.016811][T26246] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 695.022731][T26246] get_futex_key+0xba3/0x1660 [ 695.027430][T26246] ? unqueue_me_pi+0xc0/0xc0 [ 695.032022][T26246] ? __lock_acquire+0x548/0x3fb0 [ 695.036986][T26246] futex_wake+0xf9/0x4d0 [ 695.041238][T26246] ? get_futex_key+0x1660/0x1660 [ 695.046174][T26246] ? __lock_acquire+0x548/0x3fb0 [ 695.051112][T26246] ? __lock_acquire+0x548/0x3fb0 [ 695.056073][T26246] do_futex+0x324/0x1df0 [ 695.060322][T26246] ? __lock_acquire+0x548/0x3fb0 [ 695.065318][T26246] ? __might_fault+0x12b/0x1e0 [ 695.070092][T26246] ? exit_robust_list+0x290/0x290 [ 695.075114][T26246] ? __might_fault+0x12b/0x1e0 [ 695.079879][T26246] ? find_held_lock+0x35/0x130 [ 695.084648][T26246] ? __might_fault+0x12b/0x1e0 [ 695.089422][T26246] ? lock_downgrade+0x880/0x880 [ 695.094285][T26246] mm_release+0x33d/0x490 [ 695.098623][T26246] do_exit+0x417/0x2fa0 [ 695.102851][T26246] ? get_signal+0x331/0x1d50 [ 695.107448][T26246] ? find_held_lock+0x35/0x130 [ 695.112214][T26246] ? mm_update_next_owner+0x640/0x640 [ 695.117600][T26246] ? kasan_check_write+0x14/0x20 [ 695.122546][T26246] ? _raw_spin_unlock_irq+0x28/0x90 [ 695.127747][T26246] ? get_signal+0x331/0x1d50 [ 695.132342][T26246] ? _raw_spin_unlock_irq+0x28/0x90 [ 695.137546][T26246] do_group_exit+0x135/0x370 [ 695.142255][T26246] get_signal+0x399/0x1d50 [ 695.146742][T26246] do_signal+0x87/0x1940 [ 695.150994][T26246] ? sock_unregister+0xa0/0xa0 [ 695.155754][T26246] ? setup_sigcontext+0x7d0/0x7d0 [ 695.160780][T26246] ? kick_process+0xef/0x180 [ 695.165416][T26246] ? task_work_add+0x9c/0x110 [ 695.170094][T26246] ? exit_to_usermode_loop+0x43/0x2c0 [ 695.175644][T26246] ? do_fast_syscall_32+0xa9d/0xc98 [ 695.180867][T26246] ? exit_to_usermode_loop+0x43/0x2c0 [ 695.186245][T26246] ? lockdep_hardirqs_on+0x418/0x5d0 [ 695.191533][T26246] ? trace_hardirqs_on+0x67/0x230 [ 695.196564][T26246] exit_to_usermode_loop+0x244/0x2c0 [ 695.201854][T26246] do_fast_syscall_32+0xa9d/0xc98 [ 695.206882][T26246] entry_SYSENTER_compat+0x70/0x7f [ 695.212165][T26246] RIP: 0023:0xf7f6d869 [ 695.216315][T26246] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 695.236010][T26246] RSP: 002b:00000000f5d480cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 695.244425][T26246] RAX: ffffffffffffffed RBX: 0000000000000005 RCX: 0000000000008914 05:06:51 executing program 3 (fault-call:6 fault-nth:2): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 695.252661][T26246] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 695.260634][T26246] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 695.268774][T26246] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 695.276763][T26246] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:06:51 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) [ 695.368646][T26262] FAULT_INJECTION: forcing a failure. [ 695.368646][T26262] name failslab, interval 1, probability 0, space 0, times 0 [ 695.400697][T26262] CPU: 0 PID: 26262 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 695.408647][T26262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.408655][T26262] Call Trace: [ 695.408689][T26262] dump_stack+0x172/0x1f0 [ 695.408714][T26262] should_fail.cold+0xa/0x15 [ 695.408734][T26262] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 695.408755][T26262] ? ___might_sleep+0x163/0x280 [ 695.408777][T26262] __should_failslab+0x121/0x190 [ 695.408797][T26262] should_failslab+0x9/0x14 [ 695.408812][T26262] __kmalloc+0x2dc/0x740 [ 695.408826][T26262] ? __local_bh_enable_ip+0x15a/0x270 [ 695.408841][T26262] ? lock_sock_nested+0xe2/0x120 05:06:51 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 695.408855][T26262] ? __local_bh_enable_ip+0x15a/0x270 [ 695.408873][T26262] ? lockdep_hardirqs_on+0x418/0x5d0 [ 695.408886][T26262] ? lock_sock_nested+0x9a/0x120 [ 695.408897][T26262] ? sock_kmalloc+0xc6/0x120 [ 695.408916][T26262] sock_kmalloc+0xc6/0x120 [ 695.408940][T26262] hash_alloc_result.part.0+0x95/0x110 [ 695.436998][T26262] hash_sendpage+0x7b3/0x9e0 [ 695.437021][T26262] kernel_sendpage+0x95/0xf0 [ 695.437034][T26262] ? hash_sendmsg+0xad0/0xad0 [ 695.437051][T26262] sock_sendpage+0x8b/0xc0 [ 695.437067][T26262] ? lockdep_hardirqs_on+0x418/0x5d0 [ 695.437087][T26262] pipe_to_sendpage+0x299/0x370 [ 695.437101][T26262] ? kernel_sendpage+0xf0/0xf0 [ 695.437122][T26262] ? direct_splice_actor+0x1a0/0x1a0 [ 695.446953][T26262] ? __put_page+0x92/0xd0 [ 695.446974][T26262] ? anon_pipe_buf_release+0x1c6/0x270 [ 695.446994][T26262] __splice_from_pipe+0x395/0x7d0 [ 695.447011][T26262] ? direct_splice_actor+0x1a0/0x1a0 [ 695.447033][T26262] ? direct_splice_actor+0x1a0/0x1a0 [ 695.447047][T26262] splice_from_pipe+0x108/0x170 [ 695.447064][T26262] ? splice_shrink_spd+0xd0/0xd0 [ 695.447087][T26262] ? apparmor_file_permission+0x25/0x30 [ 695.455822][T26262] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.455842][T26262] ? security_file_permission+0x94/0x380 [ 695.455865][T26262] generic_splice_sendpage+0x3c/0x50 [ 695.455880][T26262] ? splice_from_pipe+0x170/0x170 [ 695.455909][T26262] do_splice+0x70a/0x13c0 [ 695.466308][T26262] ? opipe_prep.part.0+0x2d0/0x2d0 [ 695.466330][T26262] ? __fget_light+0x1a9/0x230 [ 695.466350][T26262] __ia32_sys_splice+0x2c4/0x330 [ 695.466375][T26262] do_fast_syscall_32+0x281/0xc98 [ 695.466405][T26262] entry_SYSENTER_compat+0x70/0x7f [ 695.477036][T26262] RIP: 0023:0xf7fe7869 [ 695.477052][T26262] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 695.477060][T26262] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 695.477074][T26262] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 695.477083][T26262] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 695.477092][T26262] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 695.477100][T26262] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 695.477109][T26262] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 695.560312][T26270] FAULT_INJECTION: forcing a failure. [ 695.560312][T26270] name failslab, interval 1, probability 0, space 0, times 0 [ 695.576511][T26270] CPU: 0 PID: 26270 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 695.584346][T26270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.584354][T26270] Call Trace: [ 695.584381][T26270] dump_stack+0x172/0x1f0 [ 695.584414][T26270] should_fail.cold+0xa/0x15 [ 695.584435][T26270] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 695.584458][T26270] ? ___might_sleep+0x163/0x280 [ 695.584479][T26270] __should_failslab+0x121/0x190 [ 695.584499][T26270] should_failslab+0x9/0x14 [ 695.584520][T26270] __kmalloc+0x2dc/0x740 [ 695.600460][T26270] ? __local_bh_enable_ip+0x15a/0x270 [ 695.600475][T26270] ? lock_sock_nested+0xe2/0x120 [ 695.600487][T26270] ? __local_bh_enable_ip+0x15a/0x270 [ 695.600504][T26270] ? lockdep_hardirqs_on+0x418/0x5d0 [ 695.600517][T26270] ? lock_sock_nested+0x9a/0x120 [ 695.600529][T26270] ? sock_kmalloc+0xc6/0x120 [ 695.600548][T26270] sock_kmalloc+0xc6/0x120 [ 695.609974][T26270] hash_alloc_result.part.0+0x95/0x110 [ 695.609990][T26270] hash_sendpage+0x7b3/0x9e0 [ 695.610010][T26270] kernel_sendpage+0x95/0xf0 [ 695.610022][T26270] ? hash_sendmsg+0xad0/0xad0 [ 695.610038][T26270] sock_sendpage+0x8b/0xc0 [ 695.610060][T26270] ? lockdep_hardirqs_on+0x418/0x5d0 [ 695.610079][T26270] pipe_to_sendpage+0x299/0x370 [ 695.610095][T26270] ? kernel_sendpage+0xf0/0xf0 [ 695.610111][T26270] ? direct_splice_actor+0x1a0/0x1a0 [ 695.610132][T26270] ? __put_page+0x92/0xd0 [ 695.624743][T26270] ? anon_pipe_buf_release+0x1c6/0x270 [ 695.857591][T26270] __splice_from_pipe+0x395/0x7d0 [ 695.862644][T26270] ? direct_splice_actor+0x1a0/0x1a0 [ 695.867947][T26270] ? direct_splice_actor+0x1a0/0x1a0 [ 695.873240][T26270] splice_from_pipe+0x108/0x170 [ 695.878105][T26270] ? splice_shrink_spd+0xd0/0xd0 [ 695.883070][T26270] ? apparmor_file_permission+0x25/0x30 [ 695.888629][T26270] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.894888][T26270] ? security_file_permission+0x94/0x380 [ 695.900538][T26270] generic_splice_sendpage+0x3c/0x50 [ 695.905832][T26270] ? splice_from_pipe+0x170/0x170 [ 695.910874][T26270] do_splice+0x70a/0x13c0 [ 695.915239][T26270] ? opipe_prep.part.0+0x2d0/0x2d0 [ 695.920360][T26270] ? __fget_light+0x1a9/0x230 [ 695.925081][T26270] __ia32_sys_splice+0x2c4/0x330 [ 695.930042][T26270] do_fast_syscall_32+0x281/0xc98 [ 695.935104][T26270] entry_SYSENTER_compat+0x70/0x7f [ 695.940227][T26270] RIP: 0023:0xf7fb8869 [ 695.944298][T26270] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 05:06:52 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x02\x90\xa9[\x00', @ifru_flags=0x1}) [ 695.963914][T26270] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 695.972343][T26270] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 695.980329][T26270] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 695.988303][T26270] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 695.988312][T26270] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 695.988320][T26270] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:06:52 executing program 4 (fault-call:6 fault-nth:1): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:52 executing program 3 (fault-call:6 fault-nth:3): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 696.205189][T26282] FAULT_INJECTION: forcing a failure. [ 696.205189][T26282] name failslab, interval 1, probability 0, space 0, times 0 [ 696.243341][T26282] CPU: 0 PID: 26282 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 696.251296][T26282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.261361][T26282] Call Trace: [ 696.264661][T26282] dump_stack+0x172/0x1f0 [ 696.268993][T26282] should_fail.cold+0xa/0x15 [ 696.273579][T26282] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 696.279399][T26282] ? ___might_sleep+0x163/0x280 [ 696.284265][T26282] __should_failslab+0x121/0x190 [ 696.289265][T26282] should_failslab+0x9/0x14 [ 696.293765][T26282] __kmalloc+0x2dc/0x740 [ 696.298007][T26282] ? __local_bh_enable_ip+0x15a/0x270 [ 696.303389][T26282] ? lock_sock_nested+0xe2/0x120 [ 696.308324][T26282] ? __local_bh_enable_ip+0x15a/0x270 [ 696.313690][T26282] ? lockdep_hardirqs_on+0x418/0x5d0 [ 696.318974][T26282] ? lock_sock_nested+0x9a/0x120 [ 696.323917][T26282] ? sock_kmalloc+0xc6/0x120 [ 696.328511][T26282] sock_kmalloc+0xc6/0x120 [ 696.332944][T26282] hash_alloc_result.part.0+0x95/0x110 [ 696.338420][T26282] hash_sendpage+0x7b3/0x9e0 [ 696.343033][T26282] kernel_sendpage+0x95/0xf0 [ 696.347646][T26282] ? hash_sendmsg+0xad0/0xad0 [ 696.352349][T26282] sock_sendpage+0x8b/0xc0 [ 696.356762][T26282] ? lockdep_hardirqs_on+0x418/0x5d0 [ 696.362067][T26282] pipe_to_sendpage+0x299/0x370 [ 696.366924][T26282] ? kernel_sendpage+0xf0/0xf0 [ 696.371700][T26282] ? direct_splice_actor+0x1a0/0x1a0 [ 696.376999][T26282] ? __put_page+0x92/0xd0 [ 696.381340][T26282] ? anon_pipe_buf_release+0x1c6/0x270 [ 696.386801][T26282] __splice_from_pipe+0x395/0x7d0 [ 696.391809][T26282] ? direct_splice_actor+0x1a0/0x1a0 [ 696.397082][T26282] ? direct_splice_actor+0x1a0/0x1a0 [ 696.402364][T26282] splice_from_pipe+0x108/0x170 [ 696.407220][T26282] ? splice_shrink_spd+0xd0/0xd0 [ 696.412146][T26282] ? apparmor_file_permission+0x25/0x30 [ 696.417688][T26282] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.424018][T26282] ? security_file_permission+0x94/0x380 [ 696.429668][T26282] generic_splice_sendpage+0x3c/0x50 [ 696.434949][T26282] ? splice_from_pipe+0x170/0x170 [ 696.439970][T26282] do_splice+0x70a/0x13c0 [ 696.444325][T26282] ? opipe_prep.part.0+0x2d0/0x2d0 [ 696.449438][T26282] ? __fget_light+0x1a9/0x230 [ 696.454110][T26282] __ia32_sys_splice+0x2c4/0x330 [ 696.459054][T26282] do_fast_syscall_32+0x281/0xc98 [ 696.464135][T26282] entry_SYSENTER_compat+0x70/0x7f [ 696.469235][T26282] RIP: 0023:0xf7fe7869 [ 696.473307][T26282] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 696.492930][T26282] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 696.501345][T26282] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 696.509328][T26282] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 696.517294][T26282] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 696.525257][T26282] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 696.533212][T26282] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 696.546573][T26285] FAULT_INJECTION: forcing a failure. [ 696.546573][T26285] name failslab, interval 1, probability 0, space 0, times 0 [ 696.570996][T26285] CPU: 1 PID: 26285 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 696.578935][T26285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.589037][T26285] Call Trace: [ 696.592354][T26285] dump_stack+0x172/0x1f0 [ 696.596710][T26285] should_fail.cold+0xa/0x15 [ 696.601402][T26285] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 696.607200][T26285] ? ___might_sleep+0x163/0x280 [ 696.612045][T26285] __should_failslab+0x121/0x190 [ 696.616974][T26285] should_failslab+0x9/0x14 [ 696.621505][T26285] __kmalloc+0x2dc/0x740 [ 696.625819][T26285] ? __local_bh_enable_ip+0x15a/0x270 [ 696.631185][T26285] ? lock_sock_nested+0xe2/0x120 [ 696.636122][T26285] ? __local_bh_enable_ip+0x15a/0x270 [ 696.641534][T26285] ? lockdep_hardirqs_on+0x418/0x5d0 [ 696.647155][T26285] ? lock_sock_nested+0x9a/0x120 [ 696.652080][T26285] ? sock_kmalloc+0xc6/0x120 [ 696.656666][T26285] sock_kmalloc+0xc6/0x120 [ 696.661086][T26285] hash_alloc_result.part.0+0x95/0x110 [ 696.666550][T26285] hash_sendpage+0x7b3/0x9e0 [ 696.671150][T26285] kernel_sendpage+0x95/0xf0 [ 696.675747][T26285] ? hash_sendmsg+0xad0/0xad0 [ 696.680427][T26285] sock_sendpage+0x8b/0xc0 [ 696.684831][T26285] ? lockdep_hardirqs_on+0x418/0x5d0 [ 696.690115][T26285] pipe_to_sendpage+0x299/0x370 [ 696.695046][T26285] ? kernel_sendpage+0xf0/0xf0 [ 696.699812][T26285] ? direct_splice_actor+0x1a0/0x1a0 [ 696.705102][T26285] ? __put_page+0x92/0xd0 [ 696.709420][T26285] ? anon_pipe_buf_release+0x1c6/0x270 [ 696.714872][T26285] __splice_from_pipe+0x395/0x7d0 [ 696.719892][T26285] ? direct_splice_actor+0x1a0/0x1a0 [ 696.725178][T26285] ? direct_splice_actor+0x1a0/0x1a0 [ 696.730454][T26285] splice_from_pipe+0x108/0x170 [ 696.735301][T26285] ? splice_shrink_spd+0xd0/0xd0 [ 696.740230][T26285] ? apparmor_file_permission+0x25/0x30 [ 696.745760][T26285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.752009][T26285] ? security_file_permission+0x94/0x380 [ 696.757643][T26285] generic_splice_sendpage+0x3c/0x50 [ 696.762948][T26285] ? splice_from_pipe+0x170/0x170 [ 696.767971][T26285] do_splice+0x70a/0x13c0 [ 696.772297][T26285] ? opipe_prep.part.0+0x2d0/0x2d0 [ 696.777410][T26285] ? __fget_light+0x1a9/0x230 [ 696.782079][T26285] __ia32_sys_splice+0x2c4/0x330 [ 696.787009][T26285] do_fast_syscall_32+0x281/0xc98 [ 696.792023][T26285] entry_SYSENTER_compat+0x70/0x7f [ 696.797130][T26285] RIP: 0023:0xf7fb8869 [ 696.801190][T26285] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 696.820792][T26285] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 696.829312][T26285] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 696.837283][T26285] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 696.845249][T26285] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 696.853207][T26285] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 696.861159][T26285] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:06:53 executing program 4 (fault-call:6 fault-nth:2): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:53 executing program 3 (fault-call:6 fault-nth:4): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 697.096341][T26292] FAULT_INJECTION: forcing a failure. [ 697.096341][T26292] name failslab, interval 1, probability 0, space 0, times 0 [ 697.157137][T26292] CPU: 1 PID: 26292 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 697.165089][T26292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.175148][T26292] Call Trace: [ 697.178436][T26292] dump_stack+0x172/0x1f0 [ 697.182765][T26292] should_fail.cold+0xa/0x15 [ 697.187345][T26292] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 697.193138][T26292] ? ___might_sleep+0x163/0x280 [ 697.197974][T26292] __should_failslab+0x121/0x190 [ 697.202928][T26292] should_failslab+0x9/0x14 [ 697.207423][T26292] __kmalloc+0x2dc/0x740 [ 697.211649][T26292] ? __local_bh_enable_ip+0x15a/0x270 [ 697.217022][T26292] ? lock_sock_nested+0xe2/0x120 [ 697.221970][T26292] ? __local_bh_enable_ip+0x15a/0x270 [ 697.223060][T26295] FAULT_INJECTION: forcing a failure. [ 697.223060][T26295] name failslab, interval 1, probability 0, space 0, times 0 [ 697.227366][T26292] ? lockdep_hardirqs_on+0x418/0x5d0 [ 697.245244][T26292] ? lock_sock_nested+0x9a/0x120 [ 697.250198][T26292] ? sock_kmalloc+0xc6/0x120 [ 697.254799][T26292] sock_kmalloc+0xc6/0x120 [ 697.259226][T26292] hash_alloc_result.part.0+0x95/0x110 [ 697.264695][T26292] hash_sendpage+0x7b3/0x9e0 [ 697.269307][T26292] kernel_sendpage+0x95/0xf0 [ 697.273908][T26292] ? hash_sendmsg+0xad0/0xad0 [ 697.278596][T26292] sock_sendpage+0x8b/0xc0 [ 697.283016][T26292] ? lockdep_hardirqs_on+0x418/0x5d0 [ 697.288306][T26292] pipe_to_sendpage+0x299/0x370 [ 697.293163][T26292] ? kernel_sendpage+0xf0/0xf0 [ 697.298114][T26292] ? direct_splice_actor+0x1a0/0x1a0 [ 697.303407][T26292] ? __put_page+0x92/0xd0 [ 697.307749][T26292] ? anon_pipe_buf_release+0x1c6/0x270 [ 697.313223][T26292] __splice_from_pipe+0x395/0x7d0 [ 697.318259][T26292] ? direct_splice_actor+0x1a0/0x1a0 [ 697.323570][T26292] ? direct_splice_actor+0x1a0/0x1a0 [ 697.328862][T26292] splice_from_pipe+0x108/0x170 [ 697.333726][T26292] ? splice_shrink_spd+0xd0/0xd0 [ 697.338676][T26292] ? apparmor_file_permission+0x25/0x30 [ 697.344236][T26292] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.350489][T26292] ? security_file_permission+0x94/0x380 [ 697.356141][T26292] generic_splice_sendpage+0x3c/0x50 [ 697.361447][T26292] ? splice_from_pipe+0x170/0x170 [ 697.366940][T26292] do_splice+0x70a/0x13c0 [ 697.371295][T26292] ? opipe_prep.part.0+0x2d0/0x2d0 [ 697.376416][T26292] ? __fget_light+0x1a9/0x230 [ 697.381109][T26292] __ia32_sys_splice+0x2c4/0x330 [ 697.386153][T26292] do_fast_syscall_32+0x281/0xc98 [ 697.391194][T26292] entry_SYSENTER_compat+0x70/0x7f [ 697.396307][T26292] RIP: 0023:0xf7fe7869 [ 697.400385][T26292] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 697.419998][T26292] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 697.428424][T26292] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 697.436406][T26292] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 697.444394][T26292] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 697.452398][T26292] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 697.460474][T26292] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 697.468511][T26295] CPU: 0 PID: 26295 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 697.476421][T26295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.486461][T26295] Call Trace: [ 697.489742][T26295] dump_stack+0x172/0x1f0 [ 697.494060][T26295] should_fail.cold+0xa/0x15 [ 697.498638][T26295] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 697.504466][T26295] ? ___might_sleep+0x163/0x280 [ 697.509324][T26295] __should_failslab+0x121/0x190 [ 697.514251][T26295] should_failslab+0x9/0x14 [ 697.518765][T26295] __kmalloc+0x2dc/0x740 [ 697.522997][T26295] ? __local_bh_enable_ip+0x15a/0x270 [ 697.528365][T26295] ? lock_sock_nested+0xe2/0x120 [ 697.533292][T26295] ? __local_bh_enable_ip+0x15a/0x270 [ 697.538676][T26295] ? lockdep_hardirqs_on+0x418/0x5d0 [ 697.543961][T26295] ? lock_sock_nested+0x9a/0x120 [ 697.548883][T26295] ? sock_kmalloc+0xc6/0x120 [ 697.553483][T26295] sock_kmalloc+0xc6/0x120 [ 697.557906][T26295] hash_alloc_result.part.0+0x95/0x110 [ 697.563469][T26295] hash_sendpage+0x7b3/0x9e0 [ 697.568079][T26295] kernel_sendpage+0x95/0xf0 [ 697.572653][T26295] ? hash_sendmsg+0xad0/0xad0 [ 697.577318][T26295] sock_sendpage+0x8b/0xc0 [ 697.581725][T26295] ? lockdep_hardirqs_on+0x418/0x5d0 [ 697.586995][T26295] pipe_to_sendpage+0x299/0x370 [ 697.591848][T26295] ? kernel_sendpage+0xf0/0xf0 [ 697.596598][T26295] ? direct_splice_actor+0x1a0/0x1a0 [ 697.601869][T26295] ? __put_page+0x92/0xd0 [ 697.606186][T26295] ? anon_pipe_buf_release+0x1c6/0x270 [ 697.611636][T26295] __splice_from_pipe+0x395/0x7d0 [ 697.616677][T26295] ? direct_splice_actor+0x1a0/0x1a0 [ 697.621963][T26295] ? direct_splice_actor+0x1a0/0x1a0 [ 697.627468][T26295] splice_from_pipe+0x108/0x170 [ 697.632353][T26295] ? splice_shrink_spd+0xd0/0xd0 [ 697.637320][T26295] ? apparmor_file_permission+0x25/0x30 [ 697.642855][T26295] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.649178][T26295] ? security_file_permission+0x94/0x380 [ 697.654812][T26295] generic_splice_sendpage+0x3c/0x50 [ 697.660106][T26295] ? splice_from_pipe+0x170/0x170 [ 697.665142][T26295] do_splice+0x70a/0x13c0 [ 697.681214][T26295] ? opipe_prep.part.0+0x2d0/0x2d0 [ 697.686334][T26295] ? __fget_light+0x1a9/0x230 [ 697.691028][T26295] __ia32_sys_splice+0x2c4/0x330 [ 697.696124][T26295] do_fast_syscall_32+0x281/0xc98 [ 697.701175][T26295] entry_SYSENTER_compat+0x70/0x7f [ 697.706390][T26295] RIP: 0023:0xf7fb8869 [ 697.710467][T26295] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 697.730276][T26295] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 697.738731][T26295] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 697.746965][T26295] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 05:06:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 697.754939][T26295] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 697.762999][T26295] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 697.770981][T26295] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:06:54 executing program 4 (fault-call:6 fault-nth:3): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:54 executing program 3 (fault-call:6 fault-nth:5): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 697.962428][T26303] FAULT_INJECTION: forcing a failure. [ 697.962428][T26303] name failslab, interval 1, probability 0, space 0, times 0 [ 698.008783][T26303] CPU: 1 PID: 26303 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 698.016726][T26303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.026799][T26303] Call Trace: [ 698.030114][T26303] dump_stack+0x172/0x1f0 [ 698.034469][T26303] should_fail.cold+0xa/0x15 [ 698.039074][T26303] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 698.044889][T26303] ? ___might_sleep+0x163/0x280 [ 698.049783][T26303] __should_failslab+0x121/0x190 [ 698.054748][T26303] should_failslab+0x9/0x14 [ 698.059266][T26303] __kmalloc+0x2dc/0x740 [ 698.063529][T26303] ? __local_bh_enable_ip+0x15a/0x270 [ 698.068925][T26303] ? lock_sock_nested+0xe2/0x120 [ 698.073868][T26303] ? __local_bh_enable_ip+0x15a/0x270 [ 698.079247][T26303] ? lockdep_hardirqs_on+0x418/0x5d0 [ 698.084552][T26303] ? lock_sock_nested+0x9a/0x120 [ 698.089486][T26303] ? sock_kmalloc+0xc6/0x120 [ 698.094085][T26303] sock_kmalloc+0xc6/0x120 [ 698.098525][T26303] hash_alloc_result.part.0+0x95/0x110 [ 698.103991][T26303] hash_sendpage+0x7b3/0x9e0 [ 698.108601][T26303] kernel_sendpage+0x95/0xf0 [ 698.113227][T26303] ? hash_sendmsg+0xad0/0xad0 [ 698.114494][T26307] FAULT_INJECTION: forcing a failure. [ 698.114494][T26307] name failslab, interval 1, probability 0, space 0, times 0 [ 698.117925][T26303] sock_sendpage+0x8b/0xc0 [ 698.117967][T26303] ? lockdep_hardirqs_on+0x418/0x5d0 [ 698.117988][T26303] pipe_to_sendpage+0x299/0x370 [ 698.118004][T26303] ? kernel_sendpage+0xf0/0xf0 [ 698.118019][T26303] ? direct_splice_actor+0x1a0/0x1a0 [ 698.118043][T26303] ? __put_page+0x92/0xd0 [ 698.159532][T26303] ? anon_pipe_buf_release+0x1c6/0x270 [ 698.165001][T26303] __splice_from_pipe+0x395/0x7d0 [ 698.170035][T26303] ? direct_splice_actor+0x1a0/0x1a0 [ 698.175335][T26303] ? direct_splice_actor+0x1a0/0x1a0 [ 698.180629][T26303] splice_from_pipe+0x108/0x170 [ 698.185496][T26303] ? splice_shrink_spd+0xd0/0xd0 [ 698.190458][T26303] ? apparmor_file_permission+0x25/0x30 [ 698.196012][T26303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.202267][T26303] ? security_file_permission+0x94/0x380 [ 698.208007][T26303] generic_splice_sendpage+0x3c/0x50 [ 698.213569][T26303] ? splice_from_pipe+0x170/0x170 [ 698.218615][T26303] do_splice+0x70a/0x13c0 [ 698.222970][T26303] ? opipe_prep.part.0+0x2d0/0x2d0 [ 698.228096][T26303] ? __fget_light+0x1a9/0x230 [ 698.232791][T26303] __ia32_sys_splice+0x2c4/0x330 [ 698.237745][T26303] do_fast_syscall_32+0x281/0xc98 [ 698.242791][T26303] entry_SYSENTER_compat+0x70/0x7f [ 698.247959][T26303] RIP: 0023:0xf7fe7869 [ 698.252041][T26303] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 698.271743][T26303] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 698.280201][T26303] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 698.288191][T26303] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 698.296176][T26303] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 698.304158][T26303] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 698.312140][T26303] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 698.320177][T26307] CPU: 0 PID: 26307 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 698.328080][T26307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.338134][T26307] Call Trace: [ 698.341419][T26307] dump_stack+0x172/0x1f0 [ 698.345731][T26307] should_fail.cold+0xa/0x15 [ 698.350301][T26307] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 698.356111][T26307] ? ___might_sleep+0x163/0x280 [ 698.360948][T26307] __should_failslab+0x121/0x190 [ 698.365890][T26307] should_failslab+0x9/0x14 [ 698.370432][T26307] __kmalloc+0x2dc/0x740 [ 698.374658][T26307] ? __local_bh_enable_ip+0x15a/0x270 [ 698.380054][T26307] ? lock_sock_nested+0xe2/0x120 [ 698.385003][T26307] ? __local_bh_enable_ip+0x15a/0x270 [ 698.390382][T26307] ? lockdep_hardirqs_on+0x418/0x5d0 [ 698.395677][T26307] ? lock_sock_nested+0x9a/0x120 [ 698.400634][T26307] ? sock_kmalloc+0xc6/0x120 [ 698.405267][T26307] sock_kmalloc+0xc6/0x120 [ 698.409703][T26307] hash_alloc_result.part.0+0x95/0x110 [ 698.415182][T26307] hash_sendpage+0x7b3/0x9e0 [ 698.419780][T26307] kernel_sendpage+0x95/0xf0 [ 698.424377][T26307] ? hash_sendmsg+0xad0/0xad0 [ 698.429064][T26307] sock_sendpage+0x8b/0xc0 [ 698.433481][T26307] ? lockdep_hardirqs_on+0x418/0x5d0 [ 698.438769][T26307] pipe_to_sendpage+0x299/0x370 [ 698.443625][T26307] ? kernel_sendpage+0xf0/0xf0 [ 698.448388][T26307] ? direct_splice_actor+0x1a0/0x1a0 [ 698.453697][T26307] ? __put_page+0x92/0xd0 [ 698.458030][T26307] ? anon_pipe_buf_release+0x1c6/0x270 [ 698.463503][T26307] __splice_from_pipe+0x395/0x7d0 [ 698.468556][T26307] ? direct_splice_actor+0x1a0/0x1a0 [ 698.473857][T26307] ? direct_splice_actor+0x1a0/0x1a0 [ 698.479144][T26307] splice_from_pipe+0x108/0x170 [ 698.483995][T26307] ? splice_shrink_spd+0xd0/0xd0 [ 698.488948][T26307] ? apparmor_file_permission+0x25/0x30 [ 698.494504][T26307] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.500751][T26307] ? security_file_permission+0x94/0x380 [ 698.506390][T26307] generic_splice_sendpage+0x3c/0x50 [ 698.511680][T26307] ? splice_from_pipe+0x170/0x170 [ 698.516699][T26307] do_splice+0x70a/0x13c0 [ 698.521037][T26307] ? opipe_prep.part.0+0x2d0/0x2d0 [ 698.526153][T26307] ? __fget_light+0x1a9/0x230 [ 698.530835][T26307] __ia32_sys_splice+0x2c4/0x330 [ 698.535781][T26307] do_fast_syscall_32+0x281/0xc98 [ 698.540809][T26307] entry_SYSENTER_compat+0x70/0x7f [ 698.545935][T26307] RIP: 0023:0xf7fb8869 [ 698.550003][T26307] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 698.569611][T26307] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 698.578028][T26307] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 698.586004][T26307] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 698.593980][T26307] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 698.601945][T26307] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 698.609912][T26307] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:06:54 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:54 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x2, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:54 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x02\x9a\xa9[\x00', @ifru_flags=0x1}) 05:06:54 executing program 4 (fault-call:6 fault-nth:4): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:55 executing program 2: socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:55 executing program 3 (fault-call:6 fault-nth:6): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 698.899490][T26328] FAULT_INJECTION: forcing a failure. [ 698.899490][T26328] name failslab, interval 1, probability 0, space 0, times 0 [ 698.921373][T26328] CPU: 0 PID: 26328 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 698.929305][T26328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.939369][T26328] Call Trace: [ 698.942685][T26328] dump_stack+0x172/0x1f0 [ 698.947038][T26328] should_fail.cold+0xa/0x15 [ 698.951646][T26328] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 698.957474][T26328] ? ___might_sleep+0x163/0x280 [ 698.962341][T26328] __should_failslab+0x121/0x190 [ 698.967292][T26328] should_failslab+0x9/0x14 [ 698.971801][T26328] __kmalloc+0x2dc/0x740 [ 698.976060][T26328] ? __local_bh_enable_ip+0x15a/0x270 [ 698.981439][T26328] ? lock_sock_nested+0xe2/0x120 [ 698.986390][T26328] ? __local_bh_enable_ip+0x15a/0x270 [ 698.991779][T26328] ? lockdep_hardirqs_on+0x418/0x5d0 [ 698.997070][T26328] ? lock_sock_nested+0x9a/0x120 [ 699.002014][T26328] ? sock_kmalloc+0xc6/0x120 [ 699.006624][T26328] sock_kmalloc+0xc6/0x120 [ 699.009077][T26333] FAULT_INJECTION: forcing a failure. [ 699.009077][T26333] name failslab, interval 1, probability 0, space 0, times 0 [ 699.011050][T26328] hash_alloc_result.part.0+0x95/0x110 [ 699.011066][T26328] hash_sendpage+0x7b3/0x9e0 [ 699.011090][T26328] kernel_sendpage+0x95/0xf0 [ 699.011104][T26328] ? hash_sendmsg+0xad0/0xad0 [ 699.011121][T26328] sock_sendpage+0x8b/0xc0 [ 699.011145][T26328] ? lockdep_hardirqs_on+0x418/0x5d0 [ 699.052690][T26328] pipe_to_sendpage+0x299/0x370 [ 699.057560][T26328] ? kernel_sendpage+0xf0/0xf0 [ 699.062346][T26328] ? direct_splice_actor+0x1a0/0x1a0 [ 699.067640][T26328] ? __put_page+0x92/0xd0 [ 699.072071][T26328] ? anon_pipe_buf_release+0x1c6/0x270 [ 699.077541][T26328] __splice_from_pipe+0x395/0x7d0 [ 699.082590][T26328] ? direct_splice_actor+0x1a0/0x1a0 [ 699.087894][T26328] ? direct_splice_actor+0x1a0/0x1a0 [ 699.093185][T26328] splice_from_pipe+0x108/0x170 [ 699.098052][T26328] ? splice_shrink_spd+0xd0/0xd0 [ 699.103007][T26328] ? apparmor_file_permission+0x25/0x30 [ 699.108561][T26328] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.114817][T26328] ? security_file_permission+0x94/0x380 [ 699.120471][T26328] generic_splice_sendpage+0x3c/0x50 [ 699.125765][T26328] ? splice_from_pipe+0x170/0x170 [ 699.130794][T26328] do_splice+0x70a/0x13c0 [ 699.135138][T26328] ? opipe_prep.part.0+0x2d0/0x2d0 [ 699.140261][T26328] ? __fget_light+0x1a9/0x230 [ 699.144952][T26328] __ia32_sys_splice+0x2c4/0x330 [ 699.149909][T26328] do_fast_syscall_32+0x281/0xc98 [ 699.154953][T26328] entry_SYSENTER_compat+0x70/0x7f [ 699.160069][T26328] RIP: 0023:0xf7fe7869 [ 699.164141][T26328] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 699.183786][T26328] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 699.192294][T26328] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 699.200276][T26328] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 699.208256][T26328] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 699.216237][T26328] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 699.224214][T26328] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 699.234667][T26333] CPU: 1 PID: 26333 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 699.242589][T26333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.252753][T26333] Call Trace: [ 699.256038][T26333] dump_stack+0x172/0x1f0 [ 699.260378][T26333] should_fail.cold+0xa/0x15 [ 699.264981][T26333] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 699.270806][T26333] ? ___might_sleep+0x163/0x280 [ 699.275677][T26333] __should_failslab+0x121/0x190 [ 699.280638][T26333] should_failslab+0x9/0x14 [ 699.285151][T26333] __kmalloc+0x2dc/0x740 [ 699.289410][T26333] ? __local_bh_enable_ip+0x15a/0x270 [ 699.294791][T26333] ? lock_sock_nested+0xe2/0x120 [ 699.299739][T26333] ? __local_bh_enable_ip+0x15a/0x270 [ 699.305129][T26333] ? lockdep_hardirqs_on+0x418/0x5d0 [ 699.310426][T26333] ? lock_sock_nested+0x9a/0x120 [ 699.315380][T26333] ? sock_kmalloc+0xc6/0x120 [ 699.319983][T26333] sock_kmalloc+0xc6/0x120 [ 699.324415][T26333] hash_alloc_result.part.0+0x95/0x110 [ 699.329889][T26333] hash_sendpage+0x7b3/0x9e0 [ 699.334506][T26333] kernel_sendpage+0x95/0xf0 [ 699.339105][T26333] ? hash_sendmsg+0xad0/0xad0 [ 699.343798][T26333] sock_sendpage+0x8b/0xc0 [ 699.348225][T26333] ? lockdep_hardirqs_on+0x418/0x5d0 [ 699.353567][T26333] pipe_to_sendpage+0x299/0x370 [ 699.358431][T26333] ? kernel_sendpage+0xf0/0xf0 [ 699.363213][T26333] ? direct_splice_actor+0x1a0/0x1a0 [ 699.368514][T26333] ? __put_page+0x92/0xd0 [ 699.372870][T26333] ? anon_pipe_buf_release+0x1c6/0x270 [ 699.378358][T26333] __splice_from_pipe+0x395/0x7d0 [ 699.383399][T26333] ? direct_splice_actor+0x1a0/0x1a0 [ 699.388705][T26333] ? direct_splice_actor+0x1a0/0x1a0 [ 699.394016][T26333] splice_from_pipe+0x108/0x170 [ 699.398975][T26333] ? splice_shrink_spd+0xd0/0xd0 [ 699.403927][T26333] ? apparmor_file_permission+0x25/0x30 [ 699.409464][T26333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.415698][T26333] ? security_file_permission+0x94/0x380 [ 699.421388][T26333] generic_splice_sendpage+0x3c/0x50 [ 699.426678][T26333] ? splice_from_pipe+0x170/0x170 [ 699.431704][T26333] do_splice+0x70a/0x13c0 [ 699.436024][T26333] ? opipe_prep.part.0+0x2d0/0x2d0 [ 699.441136][T26333] ? __fget_light+0x1a9/0x230 [ 699.446083][T26333] __ia32_sys_splice+0x2c4/0x330 [ 699.451347][T26333] do_fast_syscall_32+0x281/0xc98 [ 699.456363][T26333] entry_SYSENTER_compat+0x70/0x7f [ 699.461457][T26333] RIP: 0023:0xf7fb8869 [ 699.465525][T26333] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 699.485129][T26333] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 699.493546][T26333] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 699.501508][T26333] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 699.509466][T26333] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 699.517424][T26333] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 699.525526][T26333] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:06:55 executing program 4 (fault-call:6 fault-nth:5): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:06:56 executing program 3 (fault-call:6 fault-nth:7): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 699.830115][T26338] FAULT_INJECTION: forcing a failure. [ 699.830115][T26338] name failslab, interval 1, probability 0, space 0, times 0 [ 699.855422][T26338] CPU: 1 PID: 26338 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 699.863362][T26338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.873428][T26338] Call Trace: [ 699.876753][T26338] dump_stack+0x172/0x1f0 [ 699.881108][T26338] should_fail.cold+0xa/0x15 [ 699.885718][T26338] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 699.891538][T26338] ? ___might_sleep+0x163/0x280 [ 699.896404][T26338] __should_failslab+0x121/0x190 [ 699.901351][T26338] should_failslab+0x9/0x14 [ 699.905868][T26338] __kmalloc+0x2dc/0x740 [ 699.910120][T26338] ? __local_bh_enable_ip+0x15a/0x270 [ 699.915550][T26338] ? lock_sock_nested+0xe2/0x120 [ 699.920488][T26338] ? __local_bh_enable_ip+0x15a/0x270 [ 699.925871][T26338] ? lockdep_hardirqs_on+0x418/0x5d0 [ 699.931168][T26338] ? lock_sock_nested+0x9a/0x120 [ 699.936117][T26338] ? sock_kmalloc+0xc6/0x120 [ 699.940728][T26338] sock_kmalloc+0xc6/0x120 [ 699.945165][T26338] hash_alloc_result.part.0+0x95/0x110 [ 699.950661][T26338] hash_sendpage+0x7b3/0x9e0 [ 699.955269][T26338] kernel_sendpage+0x95/0xf0 [ 699.959865][T26338] ? hash_sendmsg+0xad0/0xad0 [ 699.964588][T26338] sock_sendpage+0x8b/0xc0 [ 699.969013][T26338] ? lockdep_hardirqs_on+0x418/0x5d0 [ 699.974313][T26338] pipe_to_sendpage+0x299/0x370 [ 699.979182][T26338] ? kernel_sendpage+0xf0/0xf0 [ 699.983957][T26338] ? direct_splice_actor+0x1a0/0x1a0 [ 699.989251][T26338] ? __put_page+0x92/0xd0 [ 699.993593][T26338] ? anon_pipe_buf_release+0x1c6/0x270 [ 699.999073][T26338] __splice_from_pipe+0x395/0x7d0 [ 700.004115][T26338] ? direct_splice_actor+0x1a0/0x1a0 [ 700.009418][T26338] ? direct_splice_actor+0x1a0/0x1a0 [ 700.014712][T26338] splice_from_pipe+0x108/0x170 [ 700.019577][T26338] ? splice_shrink_spd+0xd0/0xd0 [ 700.024525][T26338] ? apparmor_file_permission+0x25/0x30 [ 700.030086][T26338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.036438][T26338] ? security_file_permission+0x94/0x380 [ 700.042096][T26338] generic_splice_sendpage+0x3c/0x50 [ 700.047398][T26338] ? splice_from_pipe+0x170/0x170 [ 700.052432][T26338] do_splice+0x70a/0x13c0 [ 700.056776][T26338] ? opipe_prep.part.0+0x2d0/0x2d0 [ 700.061905][T26338] ? __fget_light+0x1a9/0x230 [ 700.066602][T26338] __ia32_sys_splice+0x2c4/0x330 [ 700.071562][T26338] do_fast_syscall_32+0x281/0xc98 [ 700.076599][T26338] entry_SYSENTER_compat+0x70/0x7f [ 700.081711][T26338] RIP: 0023:0xf7fe7869 [ 700.085789][T26338] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 700.105399][T26338] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 700.113829][T26338] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 700.121810][T26338] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 700.129794][T26338] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 700.137773][T26338] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 700.145760][T26338] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 700.211115][T26341] FAULT_INJECTION: forcing a failure. [ 700.211115][T26341] name failslab, interval 1, probability 0, space 0, times 0 [ 700.268836][T26341] CPU: 1 PID: 26341 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 700.276782][T26341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.286851][T26341] Call Trace: [ 700.290169][T26341] dump_stack+0x172/0x1f0 [ 700.294519][T26341] should_fail.cold+0xa/0x15 [ 700.299132][T26341] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 700.304957][T26341] ? ___might_sleep+0x163/0x280 [ 700.309829][T26341] __should_failslab+0x121/0x190 [ 700.314790][T26341] should_failslab+0x9/0x14 [ 700.319302][T26341] __kmalloc+0x2dc/0x740 [ 700.323554][T26341] ? __local_bh_enable_ip+0x15a/0x270 [ 700.328943][T26341] ? lock_sock_nested+0xe2/0x120 [ 700.333886][T26341] ? __local_bh_enable_ip+0x15a/0x270 [ 700.339277][T26341] ? lockdep_hardirqs_on+0x418/0x5d0 [ 700.344578][T26341] ? lock_sock_nested+0x9a/0x120 [ 700.349513][T26341] ? sock_kmalloc+0xc6/0x120 [ 700.354118][T26341] sock_kmalloc+0xc6/0x120 [ 700.358552][T26341] hash_alloc_result.part.0+0x95/0x110 [ 700.364024][T26341] hash_sendpage+0x7b3/0x9e0 [ 700.368665][T26341] kernel_sendpage+0x95/0xf0 [ 700.373266][T26341] ? hash_sendmsg+0xad0/0xad0 [ 700.377949][T26341] sock_sendpage+0x8b/0xc0 [ 700.382369][T26341] ? lockdep_hardirqs_on+0x418/0x5d0 [ 700.387663][T26341] pipe_to_sendpage+0x299/0x370 [ 700.392523][T26341] ? kernel_sendpage+0xf0/0xf0 [ 700.397294][T26341] ? direct_splice_actor+0x1a0/0x1a0 [ 700.402586][T26341] ? __put_page+0x92/0xd0 [ 700.406928][T26341] ? anon_pipe_buf_release+0x1c6/0x270 [ 700.412391][T26341] __splice_from_pipe+0x395/0x7d0 [ 700.417422][T26341] ? direct_splice_actor+0x1a0/0x1a0 [ 700.422724][T26341] ? direct_splice_actor+0x1a0/0x1a0 [ 700.428013][T26341] splice_from_pipe+0x108/0x170 [ 700.432880][T26341] ? splice_shrink_spd+0xd0/0xd0 [ 700.437838][T26341] ? apparmor_file_permission+0x25/0x30 [ 700.443388][T26341] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.449661][T26341] ? security_file_permission+0x94/0x380 [ 700.455305][T26341] generic_splice_sendpage+0x3c/0x50 [ 700.460601][T26341] ? splice_from_pipe+0x170/0x170 [ 700.465633][T26341] do_splice+0x70a/0x13c0 [ 700.469981][T26341] ? opipe_prep.part.0+0x2d0/0x2d0 [ 700.475103][T26341] ? __fget_light+0x1a9/0x230 [ 700.479805][T26341] __ia32_sys_splice+0x2c4/0x330 [ 700.484757][T26341] do_fast_syscall_32+0x281/0xc98 [ 700.489804][T26341] entry_SYSENTER_compat+0x70/0x7f [ 700.494916][T26341] RIP: 0023:0xf7fb8869 [ 700.498974][T26341] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 05:06:56 executing program 4 (fault-call:6 fault-nth:6): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 700.518582][T26341] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 700.526994][T26341] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 700.534981][T26341] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 700.542963][T26341] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 700.551036][T26341] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 700.559020][T26341] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 700.691558][T26345] FAULT_INJECTION: forcing a failure. [ 700.691558][T26345] name failslab, interval 1, probability 0, space 0, times 0 [ 700.711546][T26345] CPU: 1 PID: 26345 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 700.719471][T26345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.729539][T26345] Call Trace: [ 700.732853][T26345] dump_stack+0x172/0x1f0 [ 700.737202][T26345] should_fail.cold+0xa/0x15 [ 700.741814][T26345] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 700.747636][T26345] ? ___might_sleep+0x163/0x280 [ 700.752503][T26345] __should_failslab+0x121/0x190 [ 700.757450][T26345] should_failslab+0x9/0x14 [ 700.761959][T26345] __kmalloc+0x2dc/0x740 [ 700.766206][T26345] ? __local_bh_enable_ip+0x15a/0x270 [ 700.771587][T26345] ? lock_sock_nested+0xe2/0x120 [ 700.776531][T26345] ? __local_bh_enable_ip+0x15a/0x270 [ 700.781919][T26345] ? lockdep_hardirqs_on+0x418/0x5d0 [ 700.787214][T26345] ? lock_sock_nested+0x9a/0x120 [ 700.792180][T26345] ? sock_kmalloc+0xc6/0x120 [ 700.796779][T26345] sock_kmalloc+0xc6/0x120 [ 700.801212][T26345] hash_alloc_result.part.0+0x95/0x110 [ 700.806685][T26345] hash_sendpage+0x7b3/0x9e0 [ 700.811289][T26345] kernel_sendpage+0x95/0xf0 [ 700.815891][T26345] ? hash_sendmsg+0xad0/0xad0 [ 700.820585][T26345] sock_sendpage+0x8b/0xc0 [ 700.825015][T26345] ? lockdep_hardirqs_on+0x418/0x5d0 [ 700.830321][T26345] pipe_to_sendpage+0x299/0x370 [ 700.835187][T26345] ? kernel_sendpage+0xf0/0xf0 [ 700.839945][T26345] ? direct_splice_actor+0x1a0/0x1a0 [ 700.845226][T26345] ? __put_page+0x92/0xd0 [ 700.849541][T26345] ? anon_pipe_buf_release+0x1c6/0x270 [ 700.854986][T26345] __splice_from_pipe+0x395/0x7d0 [ 700.859998][T26345] ? direct_splice_actor+0x1a0/0x1a0 [ 700.865271][T26345] ? direct_splice_actor+0x1a0/0x1a0 [ 700.870578][T26345] splice_from_pipe+0x108/0x170 [ 700.875421][T26345] ? splice_shrink_spd+0xd0/0xd0 [ 700.880349][T26345] ? apparmor_file_permission+0x25/0x30 [ 700.885906][T26345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.892136][T26345] ? security_file_permission+0x94/0x380 [ 700.897754][T26345] generic_splice_sendpage+0x3c/0x50 [ 700.903285][T26345] ? splice_from_pipe+0x170/0x170 [ 700.908296][T26345] do_splice+0x70a/0x13c0 [ 700.912620][T26345] ? opipe_prep.part.0+0x2d0/0x2d0 [ 700.917725][T26345] ? __fget_light+0x1a9/0x230 [ 700.922501][T26345] __ia32_sys_splice+0x2c4/0x330 [ 700.927445][T26345] do_fast_syscall_32+0x281/0xc98 [ 700.932471][T26345] entry_SYSENTER_compat+0x70/0x7f [ 700.937579][T26345] RIP: 0023:0xf7fe7869 [ 700.941649][T26345] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 700.961240][T26345] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 700.969647][T26345] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 700.977623][T26345] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 05:06:57 executing program 3 (fault-call:6 fault-nth:8): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 700.985597][T26345] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 700.993580][T26345] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 701.001538][T26345] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 701.127914][T26349] FAULT_INJECTION: forcing a failure. [ 701.127914][T26349] name failslab, interval 1, probability 0, space 0, times 0 [ 701.142185][T26349] CPU: 1 PID: 26349 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 701.150095][T26349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.160159][T26349] Call Trace: [ 701.163475][T26349] dump_stack+0x172/0x1f0 [ 701.167835][T26349] should_fail.cold+0xa/0x15 [ 701.172449][T26349] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 701.178265][T26349] ? ___might_sleep+0x163/0x280 [ 701.183125][T26349] __should_failslab+0x121/0x190 [ 701.188079][T26349] should_failslab+0x9/0x14 [ 701.192590][T26349] __kmalloc+0x2dc/0x740 [ 701.196835][T26349] ? __local_bh_enable_ip+0x15a/0x270 [ 701.202206][T26349] ? lock_sock_nested+0xe2/0x120 [ 701.207143][T26349] ? __local_bh_enable_ip+0x15a/0x270 [ 701.212518][T26349] ? lockdep_hardirqs_on+0x418/0x5d0 [ 701.217811][T26349] ? lock_sock_nested+0x9a/0x120 [ 701.222748][T26349] ? sock_kmalloc+0xc6/0x120 [ 701.227345][T26349] sock_kmalloc+0xc6/0x120 [ 701.231773][T26349] hash_alloc_result.part.0+0x95/0x110 [ 701.237237][T26349] hash_sendpage+0x7b3/0x9e0 [ 701.241848][T26349] kernel_sendpage+0x95/0xf0 [ 701.246421][T26349] ? hash_sendmsg+0xad0/0xad0 [ 701.251097][T26349] sock_sendpage+0x8b/0xc0 [ 701.255526][T26349] ? lockdep_hardirqs_on+0x418/0x5d0 [ 701.260803][T26349] pipe_to_sendpage+0x299/0x370 [ 701.265631][T26349] ? kernel_sendpage+0xf0/0xf0 [ 701.270384][T26349] ? direct_splice_actor+0x1a0/0x1a0 [ 701.275660][T26349] ? __put_page+0x92/0xd0 [ 701.279977][T26349] ? anon_pipe_buf_release+0x1c6/0x270 [ 701.285427][T26349] __splice_from_pipe+0x395/0x7d0 [ 701.290470][T26349] ? direct_splice_actor+0x1a0/0x1a0 [ 701.295752][T26349] ? direct_splice_actor+0x1a0/0x1a0 [ 701.301015][T26349] splice_from_pipe+0x108/0x170 [ 701.305847][T26349] ? splice_shrink_spd+0xd0/0xd0 [ 701.310782][T26349] ? apparmor_file_permission+0x25/0x30 [ 701.316323][T26349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.322545][T26349] ? security_file_permission+0x94/0x380 [ 701.328160][T26349] generic_splice_sendpage+0x3c/0x50 [ 701.333438][T26349] ? splice_from_pipe+0x170/0x170 [ 701.338486][T26349] do_splice+0x70a/0x13c0 [ 701.342803][T26349] ? opipe_prep.part.0+0x2d0/0x2d0 [ 701.347893][T26349] ? __fget_light+0x1a9/0x230 [ 701.352571][T26349] __ia32_sys_splice+0x2c4/0x330 [ 701.357507][T26349] do_fast_syscall_32+0x281/0xc98 [ 701.362517][T26349] entry_SYSENTER_compat+0x70/0x7f [ 701.367613][T26349] RIP: 0023:0xf7fb8869 [ 701.371671][T26349] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 701.391278][T26349] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 701.399709][T26349] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 701.407669][T26349] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 701.415624][T26349] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:06:57 executing program 4 (fault-call:6 fault-nth:7): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 701.423592][T26349] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 701.431554][T26349] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:06:57 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x5411, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:06:57 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:06:57 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x01\x9e\xa9[\x00', @ifru_flags=0x1}) 05:06:57 executing program 2: socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 701.662816][T26363] FAULT_INJECTION: forcing a failure. [ 701.662816][T26363] name failslab, interval 1, probability 0, space 0, times 0 [ 701.685511][T26363] CPU: 1 PID: 26363 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 701.693452][T26363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.703523][T26363] Call Trace: [ 701.706837][T26363] dump_stack+0x172/0x1f0 [ 701.711203][T26363] should_fail.cold+0xa/0x15 [ 701.715914][T26363] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 701.721745][T26363] ? ___might_sleep+0x163/0x280 [ 701.726616][T26363] __should_failslab+0x121/0x190 [ 701.731572][T26363] should_failslab+0x9/0x14 [ 701.736091][T26363] __kmalloc+0x2dc/0x740 [ 701.740341][T26363] ? __local_bh_enable_ip+0x15a/0x270 [ 701.740358][T26363] ? lock_sock_nested+0xe2/0x120 [ 701.740374][T26363] ? __local_bh_enable_ip+0x15a/0x270 [ 701.740392][T26363] ? lockdep_hardirqs_on+0x418/0x5d0 [ 701.740405][T26363] ? lock_sock_nested+0x9a/0x120 [ 701.740416][T26363] ? sock_kmalloc+0xc6/0x120 [ 701.740433][T26363] sock_kmalloc+0xc6/0x120 [ 701.740454][T26363] hash_alloc_result.part.0+0x95/0x110 [ 701.740470][T26363] hash_sendpage+0x7b3/0x9e0 [ 701.740493][T26363] kernel_sendpage+0x95/0xf0 [ 701.740507][T26363] ? hash_sendmsg+0xad0/0xad0 [ 701.740529][T26363] sock_sendpage+0x8b/0xc0 [ 701.761600][T26363] ? lockdep_hardirqs_on+0x418/0x5d0 [ 701.771113][T26363] pipe_to_sendpage+0x299/0x370 [ 701.771133][T26363] ? kernel_sendpage+0xf0/0xf0 [ 701.771150][T26363] ? direct_splice_actor+0x1a0/0x1a0 [ 701.771163][T26363] ? __put_page+0x92/0xd0 [ 701.771180][T26363] ? anon_pipe_buf_release+0x1c6/0x270 [ 701.771197][T26363] __splice_from_pipe+0x395/0x7d0 [ 701.771212][T26363] ? direct_splice_actor+0x1a0/0x1a0 [ 701.771233][T26363] ? direct_splice_actor+0x1a0/0x1a0 [ 701.771248][T26363] splice_from_pipe+0x108/0x170 [ 701.771270][T26363] ? splice_shrink_spd+0xd0/0xd0 [ 701.785714][T26363] ? apparmor_file_permission+0x25/0x30 05:06:58 executing program 3 (fault-call:6 fault-nth:9): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 701.785734][T26363] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.785752][T26363] ? security_file_permission+0x94/0x380 [ 701.785773][T26363] generic_splice_sendpage+0x3c/0x50 [ 701.785793][T26363] ? splice_from_pipe+0x170/0x170 [ 701.795056][T26363] do_splice+0x70a/0x13c0 [ 701.795084][T26363] ? opipe_prep.part.0+0x2d0/0x2d0 [ 701.795105][T26363] ? __fget_light+0x1a9/0x230 [ 701.795124][T26363] __ia32_sys_splice+0x2c4/0x330 [ 701.795148][T26363] do_fast_syscall_32+0x281/0xc98 [ 701.804942][T26363] entry_SYSENTER_compat+0x70/0x7f [ 701.804955][T26363] RIP: 0023:0xf7fe7869 [ 701.804972][T26363] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 701.804979][T26363] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 701.805000][T26363] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 701.814586][T26363] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 701.814595][T26363] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 701.814603][T26363] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 701.814612][T26363] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 701.981807][T26375] FAULT_INJECTION: forcing a failure. [ 701.981807][T26375] name failslab, interval 1, probability 0, space 0, times 0 [ 702.004477][T26375] CPU: 1 PID: 26375 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 702.012489][T26375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.012495][T26375] Call Trace: [ 702.012521][T26375] dump_stack+0x172/0x1f0 [ 702.012543][T26375] should_fail.cold+0xa/0x15 [ 702.012562][T26375] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 702.012581][T26375] ? ___might_sleep+0x163/0x280 [ 702.012599][T26375] __should_failslab+0x121/0x190 [ 702.012617][T26375] should_failslab+0x9/0x14 [ 702.012631][T26375] __kmalloc+0x2dc/0x740 [ 702.012645][T26375] ? __local_bh_enable_ip+0x15a/0x270 [ 702.012658][T26375] ? lock_sock_nested+0xe2/0x120 [ 702.012680][T26375] ? __local_bh_enable_ip+0x15a/0x270 [ 702.026042][T26375] ? lockdep_hardirqs_on+0x418/0x5d0 [ 702.026067][T26375] ? lock_sock_nested+0x9a/0x120 [ 702.026080][T26375] ? sock_kmalloc+0xc6/0x120 [ 702.026098][T26375] sock_kmalloc+0xc6/0x120 [ 702.026127][T26375] hash_alloc_result.part.0+0x95/0x110 [ 702.035034][T26375] hash_sendpage+0x7b3/0x9e0 [ 702.035068][T26375] kernel_sendpage+0x95/0xf0 [ 702.035083][T26375] ? hash_sendmsg+0xad0/0xad0 [ 702.035100][T26375] sock_sendpage+0x8b/0xc0 [ 702.035122][T26375] ? lockdep_hardirqs_on+0x418/0x5d0 [ 702.045770][T26375] pipe_to_sendpage+0x299/0x370 [ 702.045789][T26375] ? kernel_sendpage+0xf0/0xf0 [ 702.045806][T26375] ? direct_splice_actor+0x1a0/0x1a0 [ 702.045821][T26375] ? __put_page+0x92/0xd0 [ 702.045839][T26375] ? anon_pipe_buf_release+0x1c6/0x270 [ 702.045859][T26375] __splice_from_pipe+0x395/0x7d0 [ 702.152719][T26375] ? direct_splice_actor+0x1a0/0x1a0 [ 702.158002][T26375] ? direct_splice_actor+0x1a0/0x1a0 [ 702.163296][T26375] splice_from_pipe+0x108/0x170 [ 702.168167][T26375] ? splice_shrink_spd+0xd0/0xd0 [ 702.173103][T26375] ? apparmor_file_permission+0x25/0x30 [ 702.178645][T26375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.184891][T26375] ? security_file_permission+0x94/0x380 [ 702.190555][T26375] generic_splice_sendpage+0x3c/0x50 [ 702.195846][T26375] ? splice_from_pipe+0x170/0x170 [ 702.200877][T26375] do_splice+0x70a/0x13c0 [ 702.205211][T26375] ? opipe_prep.part.0+0x2d0/0x2d0 [ 702.210328][T26375] ? __fget_light+0x1a9/0x230 [ 702.215026][T26375] __ia32_sys_splice+0x2c4/0x330 [ 702.219970][T26375] do_fast_syscall_32+0x281/0xc98 [ 702.224994][T26375] entry_SYSENTER_compat+0x70/0x7f [ 702.230102][T26375] RIP: 0023:0xf7fb8869 [ 702.234161][T26375] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 702.253755][T26375] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 702.262167][T26375] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 702.270143][T26375] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 702.278103][T26375] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 702.286064][T26375] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 702.294025][T26375] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:06:58 executing program 4 (fault-call:6 fault-nth:8): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 702.484167][T26381] FAULT_INJECTION: forcing a failure. [ 702.484167][T26381] name failslab, interval 1, probability 0, space 0, times 0 [ 702.503409][T26381] CPU: 0 PID: 26381 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 702.511341][T26381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.521401][T26381] Call Trace: [ 702.524702][T26381] dump_stack+0x172/0x1f0 [ 702.529033][T26381] should_fail.cold+0xa/0x15 [ 702.533636][T26381] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 702.539534][T26381] ? ___might_sleep+0x163/0x280 [ 702.544387][T26381] __should_failslab+0x121/0x190 [ 702.549333][T26381] should_failslab+0x9/0x14 [ 702.553840][T26381] __kmalloc+0x2dc/0x740 [ 702.558089][T26381] ? __local_bh_enable_ip+0x15a/0x270 [ 702.563463][T26381] ? lock_sock_nested+0xe2/0x120 [ 702.568401][T26381] ? __local_bh_enable_ip+0x15a/0x270 [ 702.573782][T26381] ? lockdep_hardirqs_on+0x418/0x5d0 [ 702.579075][T26381] ? lock_sock_nested+0x9a/0x120 [ 702.584014][T26381] ? sock_kmalloc+0xc6/0x120 [ 702.588616][T26381] sock_kmalloc+0xc6/0x120 [ 702.593042][T26381] hash_alloc_result.part.0+0x95/0x110 [ 702.598515][T26381] hash_sendpage+0x7b3/0x9e0 [ 702.603116][T26381] kernel_sendpage+0x95/0xf0 [ 702.607703][T26381] ? hash_sendmsg+0xad0/0xad0 [ 702.612384][T26381] sock_sendpage+0x8b/0xc0 [ 702.616809][T26381] ? lockdep_hardirqs_on+0x418/0x5d0 [ 702.622104][T26381] pipe_to_sendpage+0x299/0x370 [ 702.626955][T26381] ? kernel_sendpage+0xf0/0xf0 [ 702.631721][T26381] ? direct_splice_actor+0x1a0/0x1a0 [ 702.637004][T26381] ? __put_page+0x92/0xd0 [ 702.641341][T26381] ? anon_pipe_buf_release+0x1c6/0x270 [ 702.646818][T26381] __splice_from_pipe+0x395/0x7d0 [ 702.651847][T26381] ? direct_splice_actor+0x1a0/0x1a0 [ 702.657138][T26381] ? direct_splice_actor+0x1a0/0x1a0 [ 702.662428][T26381] splice_from_pipe+0x108/0x170 [ 702.667290][T26381] ? splice_shrink_spd+0xd0/0xd0 [ 702.672236][T26381] ? apparmor_file_permission+0x25/0x30 [ 702.679185][T26381] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.685439][T26381] ? security_file_permission+0x94/0x380 [ 702.691082][T26381] generic_splice_sendpage+0x3c/0x50 [ 702.696379][T26381] ? splice_from_pipe+0x170/0x170 [ 702.701444][T26381] do_splice+0x70a/0x13c0 [ 702.705790][T26381] ? opipe_prep.part.0+0x2d0/0x2d0 [ 702.710913][T26381] ? __fget_light+0x1a9/0x230 [ 702.715603][T26381] __ia32_sys_splice+0x2c4/0x330 [ 702.720554][T26381] do_fast_syscall_32+0x281/0xc98 [ 702.725592][T26381] entry_SYSENTER_compat+0x70/0x7f [ 702.730701][T26381] RIP: 0023:0xf7fe7869 [ 702.734770][T26381] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 702.754379][T26381] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 702.762805][T26381] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 702.770780][T26381] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 05:06:59 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x541b, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 702.778834][T26381] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 702.786803][T26381] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 702.794781][T26381] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:06:59 executing program 3 (fault-call:6 fault-nth:10): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 702.937267][T26388] FAULT_INJECTION: forcing a failure. [ 702.937267][T26388] name failslab, interval 1, probability 0, space 0, times 0 [ 702.951682][T26388] CPU: 1 PID: 26388 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 702.959683][T26388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.969838][T26388] Call Trace: [ 702.973149][T26388] dump_stack+0x172/0x1f0 [ 702.977500][T26388] should_fail.cold+0xa/0x15 [ 702.982106][T26388] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 702.987940][T26388] ? ___might_sleep+0x163/0x280 [ 702.992805][T26388] __should_failslab+0x121/0x190 [ 702.997757][T26388] should_failslab+0x9/0x14 [ 703.002277][T26388] __kmalloc+0x2dc/0x740 [ 703.006529][T26388] ? __local_bh_enable_ip+0x15a/0x270 [ 703.011998][T26388] ? lock_sock_nested+0xe2/0x120 [ 703.016947][T26388] ? __local_bh_enable_ip+0x15a/0x270 [ 703.022332][T26388] ? lockdep_hardirqs_on+0x418/0x5d0 [ 703.027626][T26388] ? lock_sock_nested+0x9a/0x120 [ 703.032599][T26388] ? sock_kmalloc+0xc6/0x120 [ 703.037214][T26388] sock_kmalloc+0xc6/0x120 [ 703.041650][T26388] hash_alloc_result.part.0+0x95/0x110 [ 703.047128][T26388] hash_sendpage+0x7b3/0x9e0 [ 703.051737][T26388] kernel_sendpage+0x95/0xf0 [ 703.056344][T26388] ? hash_sendmsg+0xad0/0xad0 [ 703.061067][T26388] sock_sendpage+0x8b/0xc0 [ 703.065494][T26388] ? lockdep_hardirqs_on+0x418/0x5d0 [ 703.070795][T26388] pipe_to_sendpage+0x299/0x370 [ 703.075827][T26388] ? kernel_sendpage+0xf0/0xf0 [ 703.080603][T26388] ? direct_splice_actor+0x1a0/0x1a0 [ 703.085907][T26388] ? __put_page+0x92/0xd0 [ 703.090253][T26388] ? anon_pipe_buf_release+0x1c6/0x270 [ 703.095812][T26388] __splice_from_pipe+0x395/0x7d0 [ 703.100852][T26388] ? direct_splice_actor+0x1a0/0x1a0 [ 703.106164][T26388] ? direct_splice_actor+0x1a0/0x1a0 [ 703.111552][T26388] splice_from_pipe+0x108/0x170 [ 703.116420][T26388] ? splice_shrink_spd+0xd0/0xd0 [ 703.121380][T26388] ? apparmor_file_permission+0x25/0x30 [ 703.126953][T26388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.133211][T26388] ? security_file_permission+0x94/0x380 [ 703.138871][T26388] generic_splice_sendpage+0x3c/0x50 [ 703.144173][T26388] ? splice_from_pipe+0x170/0x170 [ 703.149197][T26388] do_splice+0x70a/0x13c0 [ 703.153547][T26388] ? opipe_prep.part.0+0x2d0/0x2d0 [ 703.158674][T26388] ? __fget_light+0x1a9/0x230 [ 703.163370][T26388] __ia32_sys_splice+0x2c4/0x330 [ 703.168334][T26388] do_fast_syscall_32+0x281/0xc98 [ 703.173411][T26388] entry_SYSENTER_compat+0x70/0x7f [ 703.178546][T26388] RIP: 0023:0xf7fb8869 [ 703.182623][T26388] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 703.202216][T26388] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 703.210625][T26388] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 703.218622][T26388] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 703.226759][T26388] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:06:59 executing program 2: socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 703.234731][T26388] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 703.242864][T26388] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:06:59 executing program 4 (fault-call:6 fault-nth:9): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 703.404503][T26399] FAULT_INJECTION: forcing a failure. [ 703.404503][T26399] name failslab, interval 1, probability 0, space 0, times 0 [ 703.424216][T26399] CPU: 1 PID: 26399 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 703.432140][T26399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.442202][T26399] Call Trace: [ 703.445517][T26399] dump_stack+0x172/0x1f0 [ 703.449864][T26399] should_fail.cold+0xa/0x15 [ 703.454473][T26399] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 703.460293][T26399] ? ___might_sleep+0x163/0x280 [ 703.465158][T26399] __should_failslab+0x121/0x190 [ 703.470095][T26399] should_failslab+0x9/0x14 [ 703.474585][T26399] __kmalloc+0x2dc/0x740 [ 703.478821][T26399] ? __local_bh_enable_ip+0x15a/0x270 [ 703.484176][T26399] ? lock_sock_nested+0xe2/0x120 [ 703.489108][T26399] ? __local_bh_enable_ip+0x15a/0x270 [ 703.494481][T26399] ? lockdep_hardirqs_on+0x418/0x5d0 [ 703.499772][T26399] ? lock_sock_nested+0x9a/0x120 [ 703.504694][T26399] ? sock_kmalloc+0xc6/0x120 [ 703.509302][T26399] sock_kmalloc+0xc6/0x120 [ 703.513711][T26399] hash_alloc_result.part.0+0x95/0x110 [ 703.519156][T26399] hash_sendpage+0x7b3/0x9e0 [ 703.523849][T26399] kernel_sendpage+0x95/0xf0 [ 703.528448][T26399] ? hash_sendmsg+0xad0/0xad0 [ 703.533132][T26399] sock_sendpage+0x8b/0xc0 [ 703.537554][T26399] ? lockdep_hardirqs_on+0x418/0x5d0 [ 703.542867][T26399] pipe_to_sendpage+0x299/0x370 [ 703.547706][T26399] ? kernel_sendpage+0xf0/0xf0 [ 703.552457][T26399] ? direct_splice_actor+0x1a0/0x1a0 [ 703.557726][T26399] ? __put_page+0x92/0xd0 [ 703.562045][T26399] ? anon_pipe_buf_release+0x1c6/0x270 [ 703.568228][T26399] __splice_from_pipe+0x395/0x7d0 [ 703.573243][T26399] ? direct_splice_actor+0x1a0/0x1a0 [ 703.578525][T26399] ? direct_splice_actor+0x1a0/0x1a0 [ 703.583808][T26399] splice_from_pipe+0x108/0x170 [ 703.588670][T26399] ? splice_shrink_spd+0xd0/0xd0 [ 703.593618][T26399] ? apparmor_file_permission+0x25/0x30 [ 703.599173][T26399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.605491][T26399] ? security_file_permission+0x94/0x380 [ 703.611115][T26399] generic_splice_sendpage+0x3c/0x50 [ 703.616387][T26399] ? splice_from_pipe+0x170/0x170 [ 703.621401][T26399] do_splice+0x70a/0x13c0 [ 703.625724][T26399] ? opipe_prep.part.0+0x2d0/0x2d0 [ 703.630821][T26399] ? __fget_light+0x1a9/0x230 [ 703.635486][T26399] __ia32_sys_splice+0x2c4/0x330 [ 703.640416][T26399] do_fast_syscall_32+0x281/0xc98 [ 703.645533][T26399] entry_SYSENTER_compat+0x70/0x7f [ 703.651327][T26399] RIP: 0023:0xf7fe7869 [ 703.655383][T26399] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 703.674977][T26399] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 703.683384][T26399] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 703.691344][T26399] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 05:06:59 executing program 3 (fault-call:6 fault-nth:11): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 703.699336][T26399] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 703.707303][T26399] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 703.715264][T26399] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:00 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) [ 703.898881][T26408] FAULT_INJECTION: forcing a failure. [ 703.898881][T26408] name failslab, interval 1, probability 0, space 0, times 0 [ 703.921527][T26408] CPU: 1 PID: 26408 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 703.929458][T26408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.939532][T26408] Call Trace: [ 703.942850][T26408] dump_stack+0x172/0x1f0 [ 703.947226][T26408] should_fail.cold+0xa/0x15 [ 703.951833][T26408] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 703.957656][T26408] ? ___might_sleep+0x163/0x280 [ 703.962521][T26408] __should_failslab+0x121/0x190 [ 703.967476][T26408] should_failslab+0x9/0x14 [ 703.971992][T26408] __kmalloc+0x2dc/0x740 [ 703.976249][T26408] ? __local_bh_enable_ip+0x15a/0x270 [ 703.981627][T26408] ? lock_sock_nested+0xe2/0x120 [ 703.986574][T26408] ? __local_bh_enable_ip+0x15a/0x270 [ 703.991961][T26408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 703.997260][T26408] ? lock_sock_nested+0x9a/0x120 [ 704.002205][T26408] ? sock_kmalloc+0xc6/0x120 [ 704.006810][T26408] sock_kmalloc+0xc6/0x120 [ 704.011244][T26408] hash_alloc_result.part.0+0x95/0x110 [ 704.016713][T26408] hash_sendpage+0x7b3/0x9e0 [ 704.021319][T26408] kernel_sendpage+0x95/0xf0 [ 704.025922][T26408] ? hash_sendmsg+0xad0/0xad0 [ 704.030613][T26408] sock_sendpage+0x8b/0xc0 [ 704.035039][T26408] ? lockdep_hardirqs_on+0x418/0x5d0 [ 704.040355][T26408] pipe_to_sendpage+0x299/0x370 [ 704.045215][T26408] ? kernel_sendpage+0xf0/0xf0 [ 704.049996][T26408] ? direct_splice_actor+0x1a0/0x1a0 [ 704.055298][T26408] ? __put_page+0x92/0xd0 [ 704.059645][T26408] ? anon_pipe_buf_release+0x1c6/0x270 [ 704.065120][T26408] __splice_from_pipe+0x395/0x7d0 [ 704.070156][T26408] ? direct_splice_actor+0x1a0/0x1a0 [ 704.075457][T26408] ? direct_splice_actor+0x1a0/0x1a0 [ 704.080748][T26408] splice_from_pipe+0x108/0x170 [ 704.085614][T26408] ? splice_shrink_spd+0xd0/0xd0 [ 704.090572][T26408] ? apparmor_file_permission+0x25/0x30 [ 704.090599][T26408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.102392][T26408] ? security_file_permission+0x94/0x380 [ 704.102413][T26408] generic_splice_sendpage+0x3c/0x50 [ 704.102426][T26408] ? splice_from_pipe+0x170/0x170 [ 704.102438][T26408] do_splice+0x70a/0x13c0 [ 704.102460][T26408] ? opipe_prep.part.0+0x2d0/0x2d0 [ 704.102478][T26408] ? __fget_light+0x1a9/0x230 [ 704.102498][T26408] __ia32_sys_splice+0x2c4/0x330 [ 704.118434][T26408] do_fast_syscall_32+0x281/0xc98 [ 704.118457][T26408] entry_SYSENTER_compat+0x70/0x7f 05:07:00 executing program 4 (fault-call:6 fault-nth:10): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 704.118479][T26408] RIP: 0023:0xf7fb8869 [ 704.127910][T26408] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 704.127920][T26408] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 704.137523][T26408] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 704.137533][T26408] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 704.137541][T26408] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 704.137550][T26408] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 704.137565][T26408] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:00 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x02\xa0\xa9[\x00', @ifru_flags=0x1}) [ 704.300117][T26413] FAULT_INJECTION: forcing a failure. [ 704.300117][T26413] name failslab, interval 1, probability 0, space 0, times 0 [ 704.319635][T26413] CPU: 0 PID: 26413 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 704.327572][T26413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.337630][T26413] Call Trace: [ 704.340946][T26413] dump_stack+0x172/0x1f0 [ 704.345295][T26413] should_fail.cold+0xa/0x15 [ 704.349892][T26413] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 704.356061][T26413] ? ___might_sleep+0x163/0x280 [ 704.360924][T26413] __should_failslab+0x121/0x190 [ 704.365879][T26413] should_failslab+0x9/0x14 [ 704.370388][T26413] __kmalloc+0x2dc/0x740 [ 704.374650][T26413] ? __local_bh_enable_ip+0x15a/0x270 [ 704.380027][T26413] ? lock_sock_nested+0xe2/0x120 [ 704.384972][T26413] ? __local_bh_enable_ip+0x15a/0x270 [ 704.390378][T26413] ? lockdep_hardirqs_on+0x418/0x5d0 [ 704.395678][T26413] ? lock_sock_nested+0x9a/0x120 [ 704.400632][T26413] ? sock_kmalloc+0xc6/0x120 [ 704.405229][T26413] sock_kmalloc+0xc6/0x120 [ 704.409661][T26413] hash_alloc_result.part.0+0x95/0x110 [ 704.415128][T26413] hash_sendpage+0x7b3/0x9e0 [ 704.419732][T26413] kernel_sendpage+0x95/0xf0 [ 704.424327][T26413] ? hash_sendmsg+0xad0/0xad0 [ 704.429018][T26413] sock_sendpage+0x8b/0xc0 [ 704.433442][T26413] ? lockdep_hardirqs_on+0x418/0x5d0 [ 704.438732][T26413] pipe_to_sendpage+0x299/0x370 [ 704.443599][T26413] ? kernel_sendpage+0xf0/0xf0 [ 704.448371][T26413] ? direct_splice_actor+0x1a0/0x1a0 [ 704.453669][T26413] ? __put_page+0x92/0xd0 [ 704.458016][T26413] ? anon_pipe_buf_release+0x1c6/0x270 [ 704.463489][T26413] __splice_from_pipe+0x395/0x7d0 [ 704.468526][T26413] ? direct_splice_actor+0x1a0/0x1a0 [ 704.473836][T26413] ? direct_splice_actor+0x1a0/0x1a0 [ 704.479127][T26413] splice_from_pipe+0x108/0x170 [ 704.483987][T26413] ? splice_shrink_spd+0xd0/0xd0 [ 704.488943][T26413] ? apparmor_file_permission+0x25/0x30 [ 704.494515][T26413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.500778][T26413] ? security_file_permission+0x94/0x380 [ 704.506529][T26413] generic_splice_sendpage+0x3c/0x50 [ 704.511815][T26413] ? splice_from_pipe+0x170/0x170 [ 704.516915][T26413] do_splice+0x70a/0x13c0 [ 704.521255][T26413] ? opipe_prep.part.0+0x2d0/0x2d0 [ 704.526488][T26413] ? __fget_light+0x1a9/0x230 [ 704.531156][T26413] __ia32_sys_splice+0x2c4/0x330 [ 704.536119][T26413] do_fast_syscall_32+0x281/0xc98 [ 704.541134][T26413] entry_SYSENTER_compat+0x70/0x7f [ 704.546237][T26413] RIP: 0023:0xf7fe7869 [ 704.550326][T26413] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 704.569978][T26413] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 704.578381][T26413] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 704.586368][T26413] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 05:07:00 executing program 3 (fault-call:6 fault-nth:12): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 704.594387][T26413] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 704.602701][T26413] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 704.610665][T26413] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 704.779486][T26421] FAULT_INJECTION: forcing a failure. [ 704.779486][T26421] name failslab, interval 1, probability 0, space 0, times 0 [ 704.839125][T26421] CPU: 1 PID: 26421 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 704.847075][T26421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.857138][T26421] Call Trace: [ 704.860538][T26421] dump_stack+0x172/0x1f0 [ 704.864906][T26421] should_fail.cold+0xa/0x15 [ 704.869524][T26421] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 704.875357][T26421] ? ___might_sleep+0x163/0x280 [ 704.880228][T26421] __should_failslab+0x121/0x190 [ 704.885173][T26421] should_failslab+0x9/0x14 [ 704.889694][T26421] __kmalloc+0x2dc/0x740 [ 704.894731][T26421] ? __local_bh_enable_ip+0x15a/0x270 [ 704.900111][T26421] ? lock_sock_nested+0xe2/0x120 [ 704.905066][T26421] ? __local_bh_enable_ip+0x15a/0x270 [ 704.910448][T26421] ? lockdep_hardirqs_on+0x418/0x5d0 [ 704.915743][T26421] ? lock_sock_nested+0x9a/0x120 [ 704.920706][T26421] ? sock_kmalloc+0xc6/0x120 [ 704.925309][T26421] sock_kmalloc+0xc6/0x120 [ 704.929735][T26421] hash_alloc_result.part.0+0x95/0x110 [ 704.935200][T26421] hash_sendpage+0x7b3/0x9e0 [ 704.939807][T26421] kernel_sendpage+0x95/0xf0 [ 704.944399][T26421] ? hash_sendmsg+0xad0/0xad0 [ 704.949094][T26421] sock_sendpage+0x8b/0xc0 [ 704.953522][T26421] ? lockdep_hardirqs_on+0x418/0x5d0 [ 704.958819][T26421] pipe_to_sendpage+0x299/0x370 [ 704.963680][T26421] ? kernel_sendpage+0xf0/0xf0 [ 704.968456][T26421] ? direct_splice_actor+0x1a0/0x1a0 [ 704.973750][T26421] ? __put_page+0x92/0xd0 [ 704.978097][T26421] ? anon_pipe_buf_release+0x1c6/0x270 [ 704.983569][T26421] __splice_from_pipe+0x395/0x7d0 [ 704.988604][T26421] ? direct_splice_actor+0x1a0/0x1a0 [ 704.993911][T26421] ? direct_splice_actor+0x1a0/0x1a0 [ 704.999203][T26421] splice_from_pipe+0x108/0x170 [ 705.004075][T26421] ? splice_shrink_spd+0xd0/0xd0 [ 705.009029][T26421] ? apparmor_file_permission+0x25/0x30 [ 705.014593][T26421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.020854][T26421] ? security_file_permission+0x94/0x380 [ 705.026513][T26421] generic_splice_sendpage+0x3c/0x50 [ 705.031813][T26421] ? splice_from_pipe+0x170/0x170 [ 705.036854][T26421] do_splice+0x70a/0x13c0 [ 705.041217][T26421] ? opipe_prep.part.0+0x2d0/0x2d0 [ 705.046368][T26421] ? __fget_light+0x1a9/0x230 [ 705.051078][T26421] __ia32_sys_splice+0x2c4/0x330 [ 705.056039][T26421] do_fast_syscall_32+0x281/0xc98 [ 705.061187][T26421] entry_SYSENTER_compat+0x70/0x7f [ 705.066306][T26421] RIP: 0023:0xf7fb8869 [ 705.070384][T26421] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 05:07:01 executing program 4 (fault-call:6 fault-nth:11): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 705.090002][T26421] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 705.098441][T26421] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 705.106429][T26421] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 705.114592][T26421] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 705.122598][T26421] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 705.130586][T26421] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:01 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x5421, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 705.251709][T26426] FAULT_INJECTION: forcing a failure. [ 705.251709][T26426] name failslab, interval 1, probability 0, space 0, times 0 [ 705.265600][T26426] CPU: 0 PID: 26426 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 705.273525][T26426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.283627][T26426] Call Trace: [ 705.286929][T26426] dump_stack+0x172/0x1f0 [ 705.286952][T26426] should_fail.cold+0xa/0x15 [ 705.286971][T26426] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 705.286993][T26426] ? ___might_sleep+0x163/0x280 [ 705.287013][T26426] __should_failslab+0x121/0x190 [ 705.287032][T26426] should_failslab+0x9/0x14 [ 705.287054][T26426] __kmalloc+0x2dc/0x740 [ 705.296001][T26426] ? __local_bh_enable_ip+0x15a/0x270 [ 705.325705][T26426] ? lock_sock_nested+0xe2/0x120 [ 705.330680][T26426] ? __local_bh_enable_ip+0x15a/0x270 [ 705.336155][T26426] ? lockdep_hardirqs_on+0x418/0x5d0 [ 705.341446][T26426] ? lock_sock_nested+0x9a/0x120 [ 705.346393][T26426] ? sock_kmalloc+0xc6/0x120 05:07:01 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 705.351005][T26426] sock_kmalloc+0xc6/0x120 [ 705.355452][T26426] hash_alloc_result.part.0+0x95/0x110 [ 705.360924][T26426] hash_sendpage+0x7b3/0x9e0 [ 705.365528][T26426] kernel_sendpage+0x95/0xf0 [ 705.370167][T26426] ? hash_sendmsg+0xad0/0xad0 [ 705.374860][T26426] sock_sendpage+0x8b/0xc0 [ 705.379289][T26426] ? lockdep_hardirqs_on+0x418/0x5d0 [ 705.384586][T26426] pipe_to_sendpage+0x299/0x370 [ 705.389453][T26426] ? kernel_sendpage+0xf0/0xf0 [ 705.394232][T26426] ? direct_splice_actor+0x1a0/0x1a0 [ 705.399519][T26426] ? __put_page+0x92/0xd0 [ 705.403874][T26426] ? anon_pipe_buf_release+0x1c6/0x270 [ 705.409344][T26426] __splice_from_pipe+0x395/0x7d0 [ 705.414369][T26426] ? direct_splice_actor+0x1a0/0x1a0 [ 705.419669][T26426] ? direct_splice_actor+0x1a0/0x1a0 [ 705.424954][T26426] splice_from_pipe+0x108/0x170 [ 705.429804][T26426] ? splice_shrink_spd+0xd0/0xd0 [ 705.434758][T26426] ? apparmor_file_permission+0x25/0x30 [ 705.440325][T26426] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.446603][T26426] ? security_file_permission+0x94/0x380 05:07:01 executing program 3 (fault-call:6 fault-nth:13): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 705.452257][T26426] generic_splice_sendpage+0x3c/0x50 [ 705.457581][T26426] ? splice_from_pipe+0x170/0x170 [ 705.462609][T26426] do_splice+0x70a/0x13c0 [ 705.466962][T26426] ? opipe_prep.part.0+0x2d0/0x2d0 [ 705.472076][T26426] ? __fget_light+0x1a9/0x230 [ 705.476763][T26426] __ia32_sys_splice+0x2c4/0x330 [ 705.481714][T26426] do_fast_syscall_32+0x281/0xc98 [ 705.486755][T26426] entry_SYSENTER_compat+0x70/0x7f [ 705.491891][T26426] RIP: 0023:0xf7fe7869 [ 705.495967][T26426] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 705.515583][T26426] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 705.515599][T26426] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 705.515606][T26426] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 705.515613][T26426] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 705.515620][T26426] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 705.515627][T26426] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 705.611577][T26438] FAULT_INJECTION: forcing a failure. [ 705.611577][T26438] name failslab, interval 1, probability 0, space 0, times 0 [ 705.624448][T26438] CPU: 1 PID: 26438 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 705.632357][T26438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.642427][T26438] Call Trace: [ 705.645736][T26438] dump_stack+0x172/0x1f0 [ 705.650083][T26438] should_fail.cold+0xa/0x15 [ 705.654689][T26438] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 705.660513][T26438] ? ___might_sleep+0x163/0x280 [ 705.665382][T26438] __should_failslab+0x121/0x190 [ 705.670345][T26438] should_failslab+0x9/0x14 [ 705.674872][T26438] __kmalloc+0x2dc/0x740 [ 705.679143][T26438] ? __local_bh_enable_ip+0x15a/0x270 [ 705.684532][T26438] ? lock_sock_nested+0xe2/0x120 [ 705.689486][T26438] ? __local_bh_enable_ip+0x15a/0x270 [ 705.694875][T26438] ? lockdep_hardirqs_on+0x418/0x5d0 [ 705.700183][T26438] ? lock_sock_nested+0x9a/0x120 [ 705.705127][T26438] ? sock_kmalloc+0xc6/0x120 [ 705.709737][T26438] sock_kmalloc+0xc6/0x120 [ 705.714176][T26438] hash_alloc_result.part.0+0x95/0x110 [ 705.719655][T26438] hash_sendpage+0x7b3/0x9e0 [ 705.724271][T26438] kernel_sendpage+0x95/0xf0 [ 705.728878][T26438] ? hash_sendmsg+0xad0/0xad0 [ 705.733578][T26438] sock_sendpage+0x8b/0xc0 [ 705.738002][T26438] ? lockdep_hardirqs_on+0x418/0x5d0 [ 705.743303][T26438] pipe_to_sendpage+0x299/0x370 [ 705.748175][T26438] ? kernel_sendpage+0xf0/0xf0 [ 705.752968][T26438] ? direct_splice_actor+0x1a0/0x1a0 [ 705.758270][T26438] ? __put_page+0x92/0xd0 [ 705.762626][T26438] ? anon_pipe_buf_release+0x1c6/0x270 [ 705.768112][T26438] __splice_from_pipe+0x395/0x7d0 [ 705.773169][T26438] ? direct_splice_actor+0x1a0/0x1a0 [ 705.778487][T26438] ? direct_splice_actor+0x1a0/0x1a0 [ 705.783790][T26438] splice_from_pipe+0x108/0x170 [ 705.788665][T26438] ? splice_shrink_spd+0xd0/0xd0 [ 705.793629][T26438] ? apparmor_file_permission+0x25/0x30 [ 705.799190][T26438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.805482][T26438] ? security_file_permission+0x94/0x380 [ 705.811141][T26438] generic_splice_sendpage+0x3c/0x50 [ 705.816445][T26438] ? splice_from_pipe+0x170/0x170 [ 705.821515][T26438] do_splice+0x70a/0x13c0 [ 705.825870][T26438] ? opipe_prep.part.0+0x2d0/0x2d0 [ 705.831007][T26438] ? __fget_light+0x1a9/0x230 [ 705.835709][T26438] __ia32_sys_splice+0x2c4/0x330 [ 705.840670][T26438] do_fast_syscall_32+0x281/0xc98 [ 705.845732][T26438] entry_SYSENTER_compat+0x70/0x7f [ 705.850851][T26438] RIP: 0023:0xf7fb8869 [ 705.854933][T26438] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 705.874575][T26438] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 705.883023][T26438] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 705.890999][T26438] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 705.898971][T26438] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:07:02 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) [ 705.906941][T26438] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 705.914912][T26438] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:02 executing program 4 (fault-call:6 fault-nth:12): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:02 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x01\xa4\xa9[\x00', @ifru_flags=0x1}) 05:07:02 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:02 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x5450, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 706.194064][T26453] FAULT_INJECTION: forcing a failure. [ 706.194064][T26453] name failslab, interval 1, probability 0, space 0, times 0 [ 706.207173][T26453] CPU: 0 PID: 26453 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 706.215090][T26453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.225156][T26453] Call Trace: [ 706.228469][T26453] dump_stack+0x172/0x1f0 [ 706.232820][T26453] should_fail.cold+0xa/0x15 [ 706.237453][T26453] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 706.243273][T26453] ? ___might_sleep+0x163/0x280 [ 706.248135][T26453] __should_failslab+0x121/0x190 [ 706.253095][T26453] should_failslab+0x9/0x14 [ 706.257622][T26453] __kmalloc+0x2dc/0x740 [ 706.261878][T26453] ? __local_bh_enable_ip+0x15a/0x270 [ 706.267262][T26453] ? lock_sock_nested+0xe2/0x120 [ 706.272389][T26453] ? __local_bh_enable_ip+0x15a/0x270 [ 706.277785][T26453] ? lockdep_hardirqs_on+0x418/0x5d0 [ 706.283088][T26453] ? lock_sock_nested+0x9a/0x120 [ 706.288034][T26453] ? sock_kmalloc+0xc6/0x120 [ 706.292647][T26453] sock_kmalloc+0xc6/0x120 [ 706.297086][T26453] hash_alloc_result.part.0+0x95/0x110 [ 706.302549][T26453] hash_sendpage+0x7b3/0x9e0 [ 706.307149][T26453] kernel_sendpage+0x95/0xf0 [ 706.311745][T26453] ? hash_sendmsg+0xad0/0xad0 [ 706.316441][T26453] sock_sendpage+0x8b/0xc0 [ 706.320866][T26453] ? lockdep_hardirqs_on+0x418/0x5d0 [ 706.326166][T26453] pipe_to_sendpage+0x299/0x370 [ 706.331028][T26453] ? kernel_sendpage+0xf0/0xf0 [ 706.335813][T26453] ? direct_splice_actor+0x1a0/0x1a0 [ 706.341112][T26453] ? __put_page+0x92/0xd0 [ 706.345456][T26453] ? anon_pipe_buf_release+0x1c6/0x270 [ 706.350930][T26453] __splice_from_pipe+0x395/0x7d0 [ 706.355956][T26453] ? direct_splice_actor+0x1a0/0x1a0 [ 706.361239][T26453] ? direct_splice_actor+0x1a0/0x1a0 [ 706.366537][T26453] splice_from_pipe+0x108/0x170 [ 706.371411][T26453] ? splice_shrink_spd+0xd0/0xd0 [ 706.376352][T26453] ? apparmor_file_permission+0x25/0x30 [ 706.381902][T26453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.388150][T26453] ? security_file_permission+0x94/0x380 [ 706.393773][T26453] generic_splice_sendpage+0x3c/0x50 [ 706.399042][T26453] ? splice_from_pipe+0x170/0x170 [ 706.404076][T26453] do_splice+0x70a/0x13c0 [ 706.408396][T26453] ? opipe_prep.part.0+0x2d0/0x2d0 [ 706.413498][T26453] ? __fget_light+0x1a9/0x230 [ 706.418160][T26453] __ia32_sys_splice+0x2c4/0x330 [ 706.423102][T26453] do_fast_syscall_32+0x281/0xc98 [ 706.428129][T26453] entry_SYSENTER_compat+0x70/0x7f [ 706.433229][T26453] RIP: 0023:0xf7fe7869 [ 706.437282][T26453] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 706.456889][T26453] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 706.465300][T26453] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 706.473927][T26453] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 706.481906][T26453] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:07:02 executing program 3 (fault-call:6 fault-nth:14): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 706.489877][T26453] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 706.497858][T26453] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 706.657291][T26462] FAULT_INJECTION: forcing a failure. [ 706.657291][T26462] name failslab, interval 1, probability 0, space 0, times 0 [ 706.677672][T26462] CPU: 0 PID: 26462 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 706.685635][T26462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.695705][T26462] Call Trace: [ 706.699020][T26462] dump_stack+0x172/0x1f0 [ 706.703369][T26462] should_fail.cold+0xa/0x15 [ 706.707981][T26462] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 706.713803][T26462] ? ___might_sleep+0x163/0x280 [ 706.718667][T26462] __should_failslab+0x121/0x190 [ 706.723613][T26462] should_failslab+0x9/0x14 [ 706.728126][T26462] __kmalloc+0x2dc/0x740 [ 706.732373][T26462] ? __local_bh_enable_ip+0x15a/0x270 [ 706.737753][T26462] ? lock_sock_nested+0xe2/0x120 [ 706.742697][T26462] ? __local_bh_enable_ip+0x15a/0x270 [ 706.748079][T26462] ? lockdep_hardirqs_on+0x418/0x5d0 [ 706.753371][T26462] ? lock_sock_nested+0x9a/0x120 [ 706.758327][T26462] ? sock_kmalloc+0xc6/0x120 [ 706.762929][T26462] sock_kmalloc+0xc6/0x120 [ 706.767359][T26462] hash_alloc_result.part.0+0x95/0x110 [ 706.772835][T26462] hash_sendpage+0x7b3/0x9e0 [ 706.777445][T26462] kernel_sendpage+0x95/0xf0 [ 706.782043][T26462] ? hash_sendmsg+0xad0/0xad0 [ 706.786729][T26462] sock_sendpage+0x8b/0xc0 [ 706.791184][T26462] ? lockdep_hardirqs_on+0x418/0x5d0 [ 706.796486][T26462] pipe_to_sendpage+0x299/0x370 [ 706.801346][T26462] ? kernel_sendpage+0xf0/0xf0 [ 706.806121][T26462] ? direct_splice_actor+0x1a0/0x1a0 [ 706.811421][T26462] ? __put_page+0x92/0xd0 [ 706.815763][T26462] ? anon_pipe_buf_release+0x1c6/0x270 [ 706.821235][T26462] __splice_from_pipe+0x395/0x7d0 [ 706.826270][T26462] ? direct_splice_actor+0x1a0/0x1a0 [ 706.831655][T26462] ? direct_splice_actor+0x1a0/0x1a0 [ 706.836948][T26462] splice_from_pipe+0x108/0x170 [ 706.841799][T26462] ? splice_shrink_spd+0xd0/0xd0 [ 706.846726][T26462] ? apparmor_file_permission+0x25/0x30 [ 706.852277][T26462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.858546][T26462] ? security_file_permission+0x94/0x380 [ 706.864168][T26462] generic_splice_sendpage+0x3c/0x50 [ 706.869435][T26462] ? splice_from_pipe+0x170/0x170 [ 706.874438][T26462] do_splice+0x70a/0x13c0 [ 706.878777][T26462] ? opipe_prep.part.0+0x2d0/0x2d0 [ 706.883877][T26462] ? __fget_light+0x1a9/0x230 [ 706.888563][T26462] __ia32_sys_splice+0x2c4/0x330 [ 706.893508][T26462] do_fast_syscall_32+0x281/0xc98 [ 706.898521][T26462] entry_SYSENTER_compat+0x70/0x7f [ 706.903632][T26462] RIP: 0023:0xf7fb8869 [ 706.907699][T26462] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 706.927384][T26462] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 706.935820][T26462] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 706.943778][T26462] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 706.951732][T26462] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 706.959703][T26462] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 706.967657][T26462] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:03 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:07:03 executing program 4 (fault-call:6 fault-nth:13): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 707.148124][T26469] FAULT_INJECTION: forcing a failure. [ 707.148124][T26469] name failslab, interval 1, probability 0, space 0, times 0 [ 707.167568][T26469] CPU: 0 PID: 26469 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 707.175524][T26469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.185623][T26469] Call Trace: [ 707.188927][T26469] dump_stack+0x172/0x1f0 [ 707.193267][T26469] should_fail.cold+0xa/0x15 [ 707.197858][T26469] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 707.203673][T26469] ? ___might_sleep+0x163/0x280 [ 707.208533][T26469] __should_failslab+0x121/0x190 [ 707.213459][T26469] should_failslab+0x9/0x14 [ 707.217946][T26469] __kmalloc+0x2dc/0x740 [ 707.222170][T26469] ? __local_bh_enable_ip+0x15a/0x270 [ 707.227542][T26469] ? lock_sock_nested+0xe2/0x120 [ 707.232480][T26469] ? __local_bh_enable_ip+0x15a/0x270 [ 707.237836][T26469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 707.243122][T26469] ? lock_sock_nested+0x9a/0x120 [ 707.248052][T26469] ? sock_kmalloc+0xc6/0x120 [ 707.252626][T26469] sock_kmalloc+0xc6/0x120 [ 707.257025][T26469] hash_alloc_result.part.0+0x95/0x110 [ 707.262470][T26469] hash_sendpage+0x7b3/0x9e0 [ 707.267063][T26469] kernel_sendpage+0x95/0xf0 [ 707.271634][T26469] ? hash_sendmsg+0xad0/0xad0 [ 707.276290][T26469] sock_sendpage+0x8b/0xc0 [ 707.280693][T26469] ? lockdep_hardirqs_on+0x418/0x5d0 [ 707.285967][T26469] pipe_to_sendpage+0x299/0x370 [ 707.290806][T26469] ? kernel_sendpage+0xf0/0xf0 [ 707.295555][T26469] ? direct_splice_actor+0x1a0/0x1a0 [ 707.300838][T26469] ? __put_page+0x92/0xd0 [ 707.305237][T26469] ? anon_pipe_buf_release+0x1c6/0x270 [ 707.310705][T26469] __splice_from_pipe+0x395/0x7d0 [ 707.315715][T26469] ? direct_splice_actor+0x1a0/0x1a0 [ 707.320988][T26469] ? direct_splice_actor+0x1a0/0x1a0 [ 707.326258][T26469] splice_from_pipe+0x108/0x170 [ 707.331112][T26469] ? splice_shrink_spd+0xd0/0xd0 [ 707.336041][T26469] ? apparmor_file_permission+0x25/0x30 [ 707.341574][T26469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.347797][T26469] ? security_file_permission+0x94/0x380 [ 707.353430][T26469] generic_splice_sendpage+0x3c/0x50 [ 707.358705][T26469] ? splice_from_pipe+0x170/0x170 [ 707.363732][T26469] do_splice+0x70a/0x13c0 [ 707.368053][T26469] ? opipe_prep.part.0+0x2d0/0x2d0 [ 707.373150][T26469] ? __fget_light+0x1a9/0x230 [ 707.377917][T26469] __ia32_sys_splice+0x2c4/0x330 [ 707.382863][T26469] do_fast_syscall_32+0x281/0xc98 [ 707.387874][T26469] entry_SYSENTER_compat+0x70/0x7f [ 707.392965][T26469] RIP: 0023:0xf7fe7869 [ 707.397011][T26469] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 707.416605][T26469] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 707.425012][T26469] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 707.432968][T26469] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 707.440929][T26469] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:07:03 executing program 3 (fault-call:6 fault-nth:15): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 707.448891][T26469] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 707.456864][T26469] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:03 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:03 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x02\xa6\xa9[\x00', @ifru_flags=0x1}) [ 707.625288][T26477] FAULT_INJECTION: forcing a failure. [ 707.625288][T26477] name failslab, interval 1, probability 0, space 0, times 0 [ 707.646600][T26477] CPU: 1 PID: 26477 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 707.654542][T26477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.664611][T26477] Call Trace: [ 707.667934][T26477] dump_stack+0x172/0x1f0 [ 707.672283][T26477] should_fail.cold+0xa/0x15 [ 707.676890][T26477] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 707.682721][T26477] ? ___might_sleep+0x163/0x280 [ 707.687594][T26477] __should_failslab+0x121/0x190 [ 707.692549][T26477] should_failslab+0x9/0x14 [ 707.697073][T26477] __kmalloc+0x2dc/0x740 [ 707.701325][T26477] ? __local_bh_enable_ip+0x15a/0x270 [ 707.706705][T26477] ? lock_sock_nested+0xe2/0x120 [ 707.711659][T26477] ? __local_bh_enable_ip+0x15a/0x270 [ 707.717078][T26477] ? lockdep_hardirqs_on+0x418/0x5d0 [ 707.722379][T26477] ? lock_sock_nested+0x9a/0x120 [ 707.727325][T26477] ? sock_kmalloc+0xc6/0x120 [ 707.731950][T26477] sock_kmalloc+0xc6/0x120 [ 707.736385][T26477] hash_alloc_result.part.0+0x95/0x110 [ 707.741856][T26477] hash_sendpage+0x7b3/0x9e0 [ 707.746467][T26477] kernel_sendpage+0x95/0xf0 [ 707.751071][T26477] ? hash_sendmsg+0xad0/0xad0 [ 707.755758][T26477] sock_sendpage+0x8b/0xc0 [ 707.760187][T26477] ? lockdep_hardirqs_on+0x418/0x5d0 [ 707.765482][T26477] pipe_to_sendpage+0x299/0x370 [ 707.770342][T26477] ? kernel_sendpage+0xf0/0xf0 [ 707.775119][T26477] ? direct_splice_actor+0x1a0/0x1a0 [ 707.780410][T26477] ? __put_page+0x92/0xd0 [ 707.784749][T26477] ? anon_pipe_buf_release+0x1c6/0x270 [ 707.790216][T26477] __splice_from_pipe+0x395/0x7d0 [ 707.795247][T26477] ? direct_splice_actor+0x1a0/0x1a0 [ 707.800538][T26477] ? direct_splice_actor+0x1a0/0x1a0 [ 707.805807][T26477] splice_from_pipe+0x108/0x170 [ 707.810643][T26477] ? splice_shrink_spd+0xd0/0xd0 [ 707.815567][T26477] ? apparmor_file_permission+0x25/0x30 [ 707.821098][T26477] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.827326][T26477] ? security_file_permission+0x94/0x380 [ 707.832949][T26477] generic_splice_sendpage+0x3c/0x50 [ 707.838217][T26477] ? splice_from_pipe+0x170/0x170 [ 707.843253][T26477] do_splice+0x70a/0x13c0 [ 707.847574][T26477] ? opipe_prep.part.0+0x2d0/0x2d0 [ 707.852669][T26477] ? __fget_light+0x1a9/0x230 [ 707.857347][T26477] __ia32_sys_splice+0x2c4/0x330 [ 707.862287][T26477] do_fast_syscall_32+0x281/0xc98 [ 707.867321][T26477] entry_SYSENTER_compat+0x70/0x7f [ 707.872427][T26477] RIP: 0023:0xf7fb8869 [ 707.876491][T26477] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 707.896110][T26477] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 707.904513][T26477] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 707.912472][T26477] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 05:07:04 executing program 4 (fault-call:6 fault-nth:14): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 707.920431][T26477] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 707.928394][T26477] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 707.936386][T26477] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:04 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x5452, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 708.075242][T26488] FAULT_INJECTION: forcing a failure. [ 708.075242][T26488] name failslab, interval 1, probability 0, space 0, times 0 [ 708.089659][T26488] CPU: 0 PID: 26488 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 708.097575][T26488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.107643][T26488] Call Trace: [ 708.110962][T26488] dump_stack+0x172/0x1f0 [ 708.115316][T26488] should_fail.cold+0xa/0x15 [ 708.119928][T26488] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 708.125757][T26488] ? ___might_sleep+0x163/0x280 [ 708.130629][T26488] __should_failslab+0x121/0x190 [ 708.135592][T26488] should_failslab+0x9/0x14 [ 708.140114][T26488] __kmalloc+0x2dc/0x740 [ 708.144366][T26488] ? __local_bh_enable_ip+0x15a/0x270 [ 708.149749][T26488] ? lock_sock_nested+0xe2/0x120 [ 708.154703][T26488] ? __local_bh_enable_ip+0x15a/0x270 [ 708.160101][T26488] ? lockdep_hardirqs_on+0x418/0x5d0 [ 708.165411][T26488] ? lock_sock_nested+0x9a/0x120 [ 708.170450][T26488] ? sock_kmalloc+0xc6/0x120 [ 708.175066][T26488] sock_kmalloc+0xc6/0x120 [ 708.179503][T26488] hash_alloc_result.part.0+0x95/0x110 [ 708.184973][T26488] hash_sendpage+0x7b3/0x9e0 [ 708.189600][T26488] kernel_sendpage+0x95/0xf0 [ 708.194197][T26488] ? hash_sendmsg+0xad0/0xad0 [ 708.198888][T26488] sock_sendpage+0x8b/0xc0 [ 708.203317][T26488] ? lockdep_hardirqs_on+0x418/0x5d0 [ 708.208619][T26488] pipe_to_sendpage+0x299/0x370 [ 708.213488][T26488] ? kernel_sendpage+0xf0/0xf0 [ 708.218274][T26488] ? direct_splice_actor+0x1a0/0x1a0 [ 708.223570][T26488] ? __put_page+0x92/0xd0 [ 708.227909][T26488] ? anon_pipe_buf_release+0x1c6/0x270 [ 708.233384][T26488] __splice_from_pipe+0x395/0x7d0 [ 708.238439][T26488] ? direct_splice_actor+0x1a0/0x1a0 [ 708.243745][T26488] ? direct_splice_actor+0x1a0/0x1a0 [ 708.249043][T26488] splice_from_pipe+0x108/0x170 [ 708.253916][T26488] ? splice_shrink_spd+0xd0/0xd0 [ 708.258877][T26488] ? apparmor_file_permission+0x25/0x30 [ 708.264437][T26488] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.270698][T26488] ? security_file_permission+0x94/0x380 [ 708.276368][T26488] generic_splice_sendpage+0x3c/0x50 [ 708.281782][T26488] ? splice_from_pipe+0x170/0x170 [ 708.286835][T26488] do_splice+0x70a/0x13c0 [ 708.291186][T26488] ? opipe_prep.part.0+0x2d0/0x2d0 [ 708.296404][T26488] ? __fget_light+0x1a9/0x230 [ 708.301100][T26488] __ia32_sys_splice+0x2c4/0x330 [ 708.306065][T26488] do_fast_syscall_32+0x281/0xc98 [ 708.311107][T26488] entry_SYSENTER_compat+0x70/0x7f [ 708.316224][T26488] RIP: 0023:0xf7fe7869 [ 708.320303][T26488] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 708.339921][T26488] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 708.348342][T26488] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 708.356323][T26488] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 708.364307][T26488] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:07:04 executing program 3 (fault-call:6 fault-nth:16): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 708.372284][T26488] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 708.380260][T26488] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:04 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:07:04 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 708.559360][T26494] FAULT_INJECTION: forcing a failure. [ 708.559360][T26494] name failslab, interval 1, probability 0, space 0, times 0 [ 708.582498][T26494] CPU: 1 PID: 26494 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 708.590425][T26494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.600505][T26494] Call Trace: [ 708.603815][T26494] dump_stack+0x172/0x1f0 [ 708.608165][T26494] should_fail.cold+0xa/0x15 [ 708.612861][T26494] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 708.618690][T26494] ? ___might_sleep+0x163/0x280 [ 708.623553][T26494] __should_failslab+0x121/0x190 [ 708.628504][T26494] should_failslab+0x9/0x14 [ 708.633014][T26494] __kmalloc+0x2dc/0x740 [ 708.637272][T26494] ? __local_bh_enable_ip+0x15a/0x270 [ 708.642647][T26494] ? lock_sock_nested+0xe2/0x120 [ 708.647623][T26494] ? __local_bh_enable_ip+0x15a/0x270 [ 708.653012][T26494] ? lockdep_hardirqs_on+0x418/0x5d0 [ 708.658306][T26494] ? lock_sock_nested+0x9a/0x120 [ 708.663254][T26494] ? sock_kmalloc+0xc6/0x120 [ 708.667853][T26494] sock_kmalloc+0xc6/0x120 [ 708.672294][T26494] hash_alloc_result.part.0+0x95/0x110 [ 708.679307][T26494] hash_sendpage+0x7b3/0x9e0 [ 708.683931][T26494] kernel_sendpage+0x95/0xf0 [ 708.688545][T26494] ? hash_sendmsg+0xad0/0xad0 [ 708.693247][T26494] sock_sendpage+0x8b/0xc0 [ 708.697760][T26494] ? lockdep_hardirqs_on+0x418/0x5d0 [ 708.703071][T26494] pipe_to_sendpage+0x299/0x370 [ 708.707943][T26494] ? kernel_sendpage+0xf0/0xf0 [ 708.712723][T26494] ? direct_splice_actor+0x1a0/0x1a0 [ 708.718020][T26494] ? __put_page+0x92/0xd0 [ 708.722376][T26494] ? anon_pipe_buf_release+0x1c6/0x270 [ 708.727856][T26494] __splice_from_pipe+0x395/0x7d0 [ 708.732906][T26494] ? direct_splice_actor+0x1a0/0x1a0 [ 708.738216][T26494] ? direct_splice_actor+0x1a0/0x1a0 [ 708.743520][T26494] splice_from_pipe+0x108/0x170 [ 708.748402][T26494] ? splice_shrink_spd+0xd0/0xd0 [ 708.753376][T26494] ? apparmor_file_permission+0x25/0x30 [ 708.758927][T26494] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.765158][T26494] ? security_file_permission+0x94/0x380 [ 708.770783][T26494] generic_splice_sendpage+0x3c/0x50 [ 708.776067][T26494] ? splice_from_pipe+0x170/0x170 [ 708.781087][T26494] do_splice+0x70a/0x13c0 [ 708.785417][T26494] ? opipe_prep.part.0+0x2d0/0x2d0 [ 708.790514][T26494] ? __fget_light+0x1a9/0x230 [ 708.795178][T26494] __ia32_sys_splice+0x2c4/0x330 [ 708.800118][T26494] do_fast_syscall_32+0x281/0xc98 [ 708.805162][T26494] entry_SYSENTER_compat+0x70/0x7f 05:07:05 executing program 4 (fault-call:6 fault-nth:15): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 708.810289][T26494] RIP: 0023:0xf7fb8869 [ 708.814363][T26494] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 708.833973][T26494] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 708.833988][T26494] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 708.833996][T26494] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 708.834005][T26494] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 708.834013][T26494] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 708.834021][T26494] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:05 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x5460, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 708.943516][T26507] FAULT_INJECTION: forcing a failure. [ 708.943516][T26507] name failslab, interval 1, probability 0, space 0, times 0 [ 708.995229][T26507] CPU: 0 PID: 26507 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 709.003172][T26507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.013225][T26507] Call Trace: [ 709.016527][T26507] dump_stack+0x172/0x1f0 [ 709.020872][T26507] should_fail.cold+0xa/0x15 [ 709.025524][T26507] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 709.031329][T26507] ? ___might_sleep+0x163/0x280 [ 709.036190][T26507] __should_failslab+0x121/0x190 [ 709.041146][T26507] should_failslab+0x9/0x14 [ 709.045649][T26507] __kmalloc+0x2dc/0x740 [ 709.049891][T26507] ? __local_bh_enable_ip+0x15a/0x270 [ 709.055271][T26507] ? lock_sock_nested+0xe2/0x120 [ 709.060224][T26507] ? __local_bh_enable_ip+0x15a/0x270 [ 709.065631][T26507] ? lockdep_hardirqs_on+0x418/0x5d0 [ 709.070928][T26507] ? lock_sock_nested+0x9a/0x120 [ 709.075866][T26507] ? sock_kmalloc+0xc6/0x120 [ 709.080463][T26507] sock_kmalloc+0xc6/0x120 [ 709.084885][T26507] hash_alloc_result.part.0+0x95/0x110 [ 709.090351][T26507] hash_sendpage+0x7b3/0x9e0 [ 709.094961][T26507] kernel_sendpage+0x95/0xf0 [ 709.099645][T26507] ? hash_sendmsg+0xad0/0xad0 [ 709.104342][T26507] sock_sendpage+0x8b/0xc0 [ 709.108759][T26507] ? lockdep_hardirqs_on+0x418/0x5d0 [ 709.114071][T26507] pipe_to_sendpage+0x299/0x370 [ 709.118939][T26507] ? kernel_sendpage+0xf0/0xf0 [ 709.123721][T26507] ? direct_splice_actor+0x1a0/0x1a0 [ 709.129019][T26507] ? __put_page+0x92/0xd0 [ 709.133363][T26507] ? anon_pipe_buf_release+0x1c6/0x270 [ 709.138842][T26507] __splice_from_pipe+0x395/0x7d0 [ 709.143877][T26507] ? direct_splice_actor+0x1a0/0x1a0 [ 709.149180][T26507] ? direct_splice_actor+0x1a0/0x1a0 [ 709.154473][T26507] splice_from_pipe+0x108/0x170 [ 709.159341][T26507] ? splice_shrink_spd+0xd0/0xd0 [ 709.164306][T26507] ? apparmor_file_permission+0x25/0x30 [ 709.169875][T26507] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.176131][T26507] ? security_file_permission+0x94/0x380 [ 709.181773][T26507] generic_splice_sendpage+0x3c/0x50 [ 709.187051][T26507] ? splice_from_pipe+0x170/0x170 [ 709.192076][T26507] do_splice+0x70a/0x13c0 [ 709.196457][T26507] ? opipe_prep.part.0+0x2d0/0x2d0 [ 709.201580][T26507] ? __fget_light+0x1a9/0x230 [ 709.206268][T26507] __ia32_sys_splice+0x2c4/0x330 [ 709.211218][T26507] do_fast_syscall_32+0x281/0xc98 [ 709.216266][T26507] entry_SYSENTER_compat+0x70/0x7f [ 709.221382][T26507] RIP: 0023:0xf7fe7869 [ 709.225454][T26507] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 05:07:05 executing program 3 (fault-call:6 fault-nth:17): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 709.245158][T26507] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 709.253584][T26507] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 709.261569][T26507] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 709.269562][T26507] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 709.277545][T26507] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 709.285526][T26507] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:05 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x01\xae\xa9[\x00', @ifru_flags=0x1}) [ 709.392134][T26518] FAULT_INJECTION: forcing a failure. [ 709.392134][T26518] name failslab, interval 1, probability 0, space 0, times 0 [ 709.405017][T26518] CPU: 0 PID: 26518 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 709.412947][T26518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.423008][T26518] Call Trace: [ 709.426311][T26518] dump_stack+0x172/0x1f0 [ 709.430650][T26518] should_fail.cold+0xa/0x15 [ 709.435256][T26518] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 709.441078][T26518] ? ___might_sleep+0x163/0x280 [ 709.445939][T26518] __should_failslab+0x121/0x190 [ 709.450893][T26518] should_failslab+0x9/0x14 [ 709.455438][T26518] __kmalloc+0x2dc/0x740 [ 709.459693][T26518] ? __local_bh_enable_ip+0x15a/0x270 [ 709.465095][T26518] ? lock_sock_nested+0xe2/0x120 [ 709.470043][T26518] ? __local_bh_enable_ip+0x15a/0x270 [ 709.475439][T26518] ? lockdep_hardirqs_on+0x418/0x5d0 [ 709.480734][T26518] ? lock_sock_nested+0x9a/0x120 [ 709.485676][T26518] ? sock_kmalloc+0xc6/0x120 [ 709.490279][T26518] sock_kmalloc+0xc6/0x120 [ 709.494715][T26518] hash_alloc_result.part.0+0x95/0x110 [ 709.500182][T26518] hash_sendpage+0x7b3/0x9e0 [ 709.504817][T26518] kernel_sendpage+0x95/0xf0 [ 709.510370][T26518] ? hash_sendmsg+0xad0/0xad0 [ 709.515065][T26518] sock_sendpage+0x8b/0xc0 [ 709.519489][T26518] ? lockdep_hardirqs_on+0x418/0x5d0 [ 709.524783][T26518] pipe_to_sendpage+0x299/0x370 [ 709.529647][T26518] ? kernel_sendpage+0xf0/0xf0 [ 709.534424][T26518] ? direct_splice_actor+0x1a0/0x1a0 [ 709.539713][T26518] ? __put_page+0x92/0xd0 [ 709.544052][T26518] ? anon_pipe_buf_release+0x1c6/0x270 [ 709.549526][T26518] __splice_from_pipe+0x395/0x7d0 [ 709.554559][T26518] ? direct_splice_actor+0x1a0/0x1a0 [ 709.559861][T26518] ? direct_splice_actor+0x1a0/0x1a0 [ 709.565157][T26518] splice_from_pipe+0x108/0x170 [ 709.571538][T26518] ? splice_shrink_spd+0xd0/0xd0 [ 709.576490][T26518] ? apparmor_file_permission+0x25/0x30 [ 709.582040][T26518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.588298][T26518] ? security_file_permission+0x94/0x380 [ 709.593941][T26518] generic_splice_sendpage+0x3c/0x50 [ 709.599238][T26518] ? splice_from_pipe+0x170/0x170 [ 709.604263][T26518] do_splice+0x70a/0x13c0 [ 709.608597][T26518] ? opipe_prep.part.0+0x2d0/0x2d0 [ 709.613703][T26518] ? __fget_light+0x1a9/0x230 [ 709.618367][T26518] __ia32_sys_splice+0x2c4/0x330 [ 709.623308][T26518] do_fast_syscall_32+0x281/0xc98 [ 709.628356][T26518] entry_SYSENTER_compat+0x70/0x7f [ 709.633461][T26518] RIP: 0023:0xf7fb8869 [ 709.637526][T26518] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 709.657129][T26518] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 709.666260][T26518] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 709.674247][T26518] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 709.682237][T26518] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:07:05 executing program 4 (fault-call:6 fault-nth:16): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 709.690216][T26518] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 709.698196][T26518] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:05 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 709.801890][T26524] FAULT_INJECTION: forcing a failure. [ 709.801890][T26524] name failslab, interval 1, probability 0, space 0, times 0 [ 709.815058][T26524] CPU: 1 PID: 26524 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 709.822970][T26524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.833039][T26524] Call Trace: [ 709.836351][T26524] dump_stack+0x172/0x1f0 [ 709.840692][T26524] should_fail.cold+0xa/0x15 [ 709.840714][T26524] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 709.840736][T26524] ? ___might_sleep+0x163/0x280 [ 709.840757][T26524] __should_failslab+0x121/0x190 [ 709.840776][T26524] should_failslab+0x9/0x14 [ 709.840791][T26524] __kmalloc+0x2dc/0x740 [ 709.840814][T26524] ? __local_bh_enable_ip+0x15a/0x270 [ 709.851192][T26524] ? lock_sock_nested+0xe2/0x120 [ 709.851208][T26524] ? __local_bh_enable_ip+0x15a/0x270 [ 709.851225][T26524] ? lockdep_hardirqs_on+0x418/0x5d0 [ 709.851245][T26524] ? lock_sock_nested+0x9a/0x120 [ 709.861002][T26524] ? sock_kmalloc+0xc6/0x120 [ 709.861021][T26524] sock_kmalloc+0xc6/0x120 [ 709.861045][T26524] hash_alloc_result.part.0+0x95/0x110 [ 709.861061][T26524] hash_sendpage+0x7b3/0x9e0 [ 709.861083][T26524] kernel_sendpage+0x95/0xf0 [ 709.861097][T26524] ? hash_sendmsg+0xad0/0xad0 [ 709.861114][T26524] sock_sendpage+0x8b/0xc0 [ 709.861135][T26524] ? lockdep_hardirqs_on+0x418/0x5d0 [ 709.869861][T26524] pipe_to_sendpage+0x299/0x370 [ 709.869880][T26524] ? kernel_sendpage+0xf0/0xf0 [ 709.869897][T26524] ? direct_splice_actor+0x1a0/0x1a0 [ 709.869920][T26524] ? __put_page+0x92/0xd0 [ 709.869939][T26524] ? anon_pipe_buf_release+0x1c6/0x270 [ 709.869957][T26524] __splice_from_pipe+0x395/0x7d0 [ 709.869981][T26524] ? direct_splice_actor+0x1a0/0x1a0 [ 709.880287][T26524] ? direct_splice_actor+0x1a0/0x1a0 [ 709.880311][T26524] splice_from_pipe+0x108/0x170 [ 709.890960][T26524] ? splice_shrink_spd+0xd0/0xd0 [ 709.890981][T26524] ? apparmor_file_permission+0x25/0x30 [ 709.890996][T26524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.891012][T26524] ? security_file_permission+0x94/0x380 05:07:06 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8901, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:06 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) [ 709.891033][T26524] generic_splice_sendpage+0x3c/0x50 [ 709.900551][T26524] ? splice_from_pipe+0x170/0x170 [ 709.900568][T26524] do_splice+0x70a/0x13c0 [ 709.900596][T26524] ? opipe_prep.part.0+0x2d0/0x2d0 [ 709.900615][T26524] ? __fget_light+0x1a9/0x230 [ 709.900635][T26524] __ia32_sys_splice+0x2c4/0x330 [ 709.910501][T26524] do_fast_syscall_32+0x281/0xc98 [ 709.910525][T26524] entry_SYSENTER_compat+0x70/0x7f [ 709.910539][T26524] RIP: 0023:0xf7fe7869 [ 709.910555][T26524] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 709.910563][T26524] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 709.910577][T26524] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 709.910585][T26524] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 709.910593][T26524] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:07:06 executing program 3 (fault-call:6 fault-nth:18): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 709.910609][T26524] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 709.919758][T26524] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 710.244622][T26540] FAULT_INJECTION: forcing a failure. [ 710.244622][T26540] name failslab, interval 1, probability 0, space 0, times 0 [ 710.257767][T26540] CPU: 0 PID: 26540 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 710.265675][T26540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.275734][T26540] Call Trace: [ 710.279047][T26540] dump_stack+0x172/0x1f0 [ 710.283410][T26540] should_fail.cold+0xa/0x15 [ 710.288012][T26540] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 710.293827][T26540] ? ___might_sleep+0x163/0x280 [ 710.298680][T26540] __should_failslab+0x121/0x190 [ 710.303624][T26540] should_failslab+0x9/0x14 [ 710.308127][T26540] __kmalloc+0x2dc/0x740 [ 710.312373][T26540] ? __local_bh_enable_ip+0x15a/0x270 [ 710.317748][T26540] ? lock_sock_nested+0xe2/0x120 [ 710.322698][T26540] ? __local_bh_enable_ip+0x15a/0x270 [ 710.328106][T26540] ? lockdep_hardirqs_on+0x418/0x5d0 [ 710.333393][T26540] ? lock_sock_nested+0x9a/0x120 [ 710.338342][T26540] ? sock_kmalloc+0xc6/0x120 [ 710.342938][T26540] sock_kmalloc+0xc6/0x120 [ 710.347353][T26540] hash_alloc_result.part.0+0x95/0x110 [ 710.352815][T26540] hash_sendpage+0x7b3/0x9e0 [ 710.357426][T26540] kernel_sendpage+0x95/0xf0 [ 710.362001][T26540] ? hash_sendmsg+0xad0/0xad0 [ 710.366684][T26540] sock_sendpage+0x8b/0xc0 [ 710.371096][T26540] ? lockdep_hardirqs_on+0x418/0x5d0 [ 710.376415][T26540] pipe_to_sendpage+0x299/0x370 [ 710.381259][T26540] ? kernel_sendpage+0xf0/0xf0 [ 710.386009][T26540] ? direct_splice_actor+0x1a0/0x1a0 [ 710.391287][T26540] ? __put_page+0x92/0xd0 [ 710.395635][T26540] ? anon_pipe_buf_release+0x1c6/0x270 [ 710.401099][T26540] __splice_from_pipe+0x395/0x7d0 [ 710.406202][T26540] ? direct_splice_actor+0x1a0/0x1a0 [ 710.411490][T26540] ? direct_splice_actor+0x1a0/0x1a0 [ 710.416770][T26540] splice_from_pipe+0x108/0x170 [ 710.421605][T26540] ? splice_shrink_spd+0xd0/0xd0 [ 710.426544][T26540] ? apparmor_file_permission+0x25/0x30 [ 710.432089][T26540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.438327][T26540] ? security_file_permission+0x94/0x380 [ 710.443962][T26540] generic_splice_sendpage+0x3c/0x50 [ 710.449245][T26540] ? splice_from_pipe+0x170/0x170 [ 710.454259][T26540] do_splice+0x70a/0x13c0 [ 710.458597][T26540] ? opipe_prep.part.0+0x2d0/0x2d0 [ 710.463693][T26540] ? __fget_light+0x1a9/0x230 [ 710.468357][T26540] __ia32_sys_splice+0x2c4/0x330 [ 710.473283][T26540] do_fast_syscall_32+0x281/0xc98 [ 710.478298][T26540] entry_SYSENTER_compat+0x70/0x7f [ 710.483475][T26540] RIP: 0023:0xf7fb8869 [ 710.487539][T26540] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 710.507131][T26540] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 710.515526][T26540] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 710.523485][T26540] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 710.531454][T26540] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:07:06 executing program 4 (fault-call:6 fault-nth:17): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 710.539432][T26540] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 710.547420][T26540] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:06 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:06 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03\xb1\xa9[\x00', @ifru_flags=0x1}) 05:07:06 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) [ 710.737377][T26545] FAULT_INJECTION: forcing a failure. [ 710.737377][T26545] name failslab, interval 1, probability 0, space 0, times 0 [ 710.759589][T26545] CPU: 1 PID: 26545 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 710.759605][T26545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.777580][T26545] Call Trace: [ 710.780888][T26545] dump_stack+0x172/0x1f0 [ 710.785242][T26545] should_fail.cold+0xa/0x15 [ 710.789855][T26545] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 710.795690][T26545] ? ___might_sleep+0x163/0x280 [ 710.800558][T26545] __should_failslab+0x121/0x190 [ 710.805543][T26545] should_failslab+0x9/0x14 [ 710.810060][T26545] __kmalloc+0x2dc/0x740 [ 710.814309][T26545] ? __local_bh_enable_ip+0x15a/0x270 [ 710.819690][T26545] ? lock_sock_nested+0xe2/0x120 [ 710.819707][T26545] ? __local_bh_enable_ip+0x15a/0x270 [ 710.819725][T26545] ? lockdep_hardirqs_on+0x418/0x5d0 [ 710.819739][T26545] ? lock_sock_nested+0x9a/0x120 [ 710.819750][T26545] ? sock_kmalloc+0xc6/0x120 [ 710.819765][T26545] sock_kmalloc+0xc6/0x120 [ 710.819793][T26545] hash_alloc_result.part.0+0x95/0x110 [ 710.830095][T26545] hash_sendpage+0x7b3/0x9e0 [ 710.830119][T26545] kernel_sendpage+0x95/0xf0 [ 710.830133][T26545] ? hash_sendmsg+0xad0/0xad0 [ 710.830150][T26545] sock_sendpage+0x8b/0xc0 [ 710.830165][T26545] ? lockdep_hardirqs_on+0x418/0x5d0 [ 710.830184][T26545] pipe_to_sendpage+0x299/0x370 05:07:07 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8904, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 710.830204][T26545] ? kernel_sendpage+0xf0/0xf0 [ 710.840409][T26545] ? direct_splice_actor+0x1a0/0x1a0 [ 710.840423][T26545] ? __put_page+0x92/0xd0 [ 710.840443][T26545] ? anon_pipe_buf_release+0x1c6/0x270 [ 710.840462][T26545] __splice_from_pipe+0x395/0x7d0 [ 710.840478][T26545] ? direct_splice_actor+0x1a0/0x1a0 [ 710.840499][T26545] ? direct_splice_actor+0x1a0/0x1a0 [ 710.840518][T26545] splice_from_pipe+0x108/0x170 [ 710.849508][T26545] ? splice_shrink_spd+0xd0/0xd0 [ 710.849532][T26545] ? apparmor_file_permission+0x25/0x30 [ 710.849548][T26545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.849565][T26545] ? security_file_permission+0x94/0x380 [ 710.849587][T26545] generic_splice_sendpage+0x3c/0x50 [ 710.859632][T26545] ? splice_from_pipe+0x170/0x170 [ 710.859648][T26545] do_splice+0x70a/0x13c0 [ 710.859674][T26545] ? opipe_prep.part.0+0x2d0/0x2d0 [ 710.859692][T26545] ? __fget_light+0x1a9/0x230 [ 710.859719][T26545] __ia32_sys_splice+0x2c4/0x330 [ 710.868984][T26545] do_fast_syscall_32+0x281/0xc98 [ 710.869008][T26545] entry_SYSENTER_compat+0x70/0x7f 05:07:07 executing program 3 (fault-call:6 fault-nth:19): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 710.869019][T26545] RIP: 0023:0xf7fe7869 [ 710.869034][T26545] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 710.869041][T26545] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 710.869072][T26545] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 710.878762][T26545] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 710.878770][T26545] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 710.878778][T26545] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 710.878785][T26545] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 711.118947][T26565] FAULT_INJECTION: forcing a failure. [ 711.118947][T26565] name failslab, interval 1, probability 0, space 0, times 0 [ 711.132720][T26565] CPU: 0 PID: 26565 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 711.140716][T26565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 711.140723][T26565] Call Trace: [ 711.140751][T26565] dump_stack+0x172/0x1f0 [ 711.140776][T26565] should_fail.cold+0xa/0x15 [ 711.140798][T26565] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 711.140823][T26565] ? ___might_sleep+0x163/0x280 [ 711.163173][T26565] __should_failslab+0x121/0x190 [ 711.163194][T26565] should_failslab+0x9/0x14 [ 711.163210][T26565] __kmalloc+0x2dc/0x740 [ 711.163226][T26565] ? __local_bh_enable_ip+0x15a/0x270 [ 711.163240][T26565] ? lock_sock_nested+0xe2/0x120 [ 711.163254][T26565] ? __local_bh_enable_ip+0x15a/0x270 [ 711.163270][T26565] ? lockdep_hardirqs_on+0x418/0x5d0 [ 711.163290][T26565] ? lock_sock_nested+0x9a/0x120 [ 711.178892][T26565] ? sock_kmalloc+0xc6/0x120 [ 711.178910][T26565] sock_kmalloc+0xc6/0x120 [ 711.178933][T26565] hash_alloc_result.part.0+0x95/0x110 [ 711.178951][T26565] hash_sendpage+0x7b3/0x9e0 [ 711.178974][T26565] kernel_sendpage+0x95/0xf0 [ 711.178988][T26565] ? hash_sendmsg+0xad0/0xad0 [ 711.179004][T26565] sock_sendpage+0x8b/0xc0 [ 711.179018][T26565] ? lockdep_hardirqs_on+0x418/0x5d0 [ 711.179036][T26565] pipe_to_sendpage+0x299/0x370 [ 711.179051][T26565] ? kernel_sendpage+0xf0/0xf0 [ 711.179084][T26565] ? direct_splice_actor+0x1a0/0x1a0 [ 711.187845][T26565] ? __put_page+0x92/0xd0 [ 711.187867][T26565] ? anon_pipe_buf_release+0x1c6/0x270 [ 711.187888][T26565] __splice_from_pipe+0x395/0x7d0 [ 711.187904][T26565] ? direct_splice_actor+0x1a0/0x1a0 [ 711.187926][T26565] ? direct_splice_actor+0x1a0/0x1a0 [ 711.187941][T26565] splice_from_pipe+0x108/0x170 [ 711.187961][T26565] ? splice_shrink_spd+0xd0/0xd0 [ 711.271027][T26565] ? apparmor_file_permission+0x25/0x30 [ 711.271046][T26565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 711.271064][T26565] ? security_file_permission+0x94/0x380 [ 711.271086][T26565] generic_splice_sendpage+0x3c/0x50 [ 711.271099][T26565] ? splice_from_pipe+0x170/0x170 [ 711.271112][T26565] do_splice+0x70a/0x13c0 [ 711.271135][T26565] ? opipe_prep.part.0+0x2d0/0x2d0 [ 711.271153][T26565] ? __fget_light+0x1a9/0x230 [ 711.271173][T26565] __ia32_sys_splice+0x2c4/0x330 [ 711.271197][T26565] do_fast_syscall_32+0x281/0xc98 [ 711.271227][T26565] entry_SYSENTER_compat+0x70/0x7f [ 711.286980][T26565] RIP: 0023:0xf7fb8869 [ 711.286997][T26565] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 711.287006][T26565] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 711.287022][T26565] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 711.287031][T26565] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 711.287039][T26565] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:07:07 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:07 executing program 4 (fault-call:6 fault-nth:18): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 711.287057][T26565] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 711.297181][T26565] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 711.607886][T26572] FAULT_INJECTION: forcing a failure. [ 711.607886][T26572] name failslab, interval 1, probability 0, space 0, times 0 [ 711.628832][T26572] CPU: 0 PID: 26572 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 711.636749][T26572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 711.646807][T26572] Call Trace: [ 711.650103][T26572] dump_stack+0x172/0x1f0 [ 711.654446][T26572] should_fail.cold+0xa/0x15 [ 711.659037][T26572] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 711.664881][T26572] ? ___might_sleep+0x163/0x280 [ 711.669759][T26572] __should_failslab+0x121/0x190 [ 711.674724][T26572] should_failslab+0x9/0x14 [ 711.679315][T26572] __kmalloc+0x2dc/0x740 [ 711.683588][T26572] ? __local_bh_enable_ip+0x15a/0x270 [ 711.688965][T26572] ? lock_sock_nested+0xe2/0x120 [ 711.693906][T26572] ? __local_bh_enable_ip+0x15a/0x270 [ 711.699282][T26572] ? lockdep_hardirqs_on+0x418/0x5d0 [ 711.704570][T26572] ? lock_sock_nested+0x9a/0x120 [ 711.709511][T26572] ? sock_kmalloc+0xc6/0x120 [ 711.714118][T26572] sock_kmalloc+0xc6/0x120 [ 711.718524][T26572] hash_alloc_result.part.0+0x95/0x110 [ 711.723977][T26572] hash_sendpage+0x7b3/0x9e0 [ 711.728597][T26572] kernel_sendpage+0x95/0xf0 [ 711.733169][T26572] ? hash_sendmsg+0xad0/0xad0 [ 711.737828][T26572] sock_sendpage+0x8b/0xc0 [ 711.742236][T26572] ? lockdep_hardirqs_on+0x418/0x5d0 [ 711.747516][T26572] pipe_to_sendpage+0x299/0x370 [ 711.752391][T26572] ? kernel_sendpage+0xf0/0xf0 [ 711.757168][T26572] ? direct_splice_actor+0x1a0/0x1a0 [ 711.762445][T26572] ? __put_page+0x92/0xd0 [ 711.766791][T26572] ? anon_pipe_buf_release+0x1c6/0x270 [ 711.772265][T26572] __splice_from_pipe+0x395/0x7d0 [ 711.777290][T26572] ? direct_splice_actor+0x1a0/0x1a0 [ 711.782581][T26572] ? direct_splice_actor+0x1a0/0x1a0 [ 711.787864][T26572] splice_from_pipe+0x108/0x170 [ 711.792727][T26572] ? splice_shrink_spd+0xd0/0xd0 [ 711.797690][T26572] ? apparmor_file_permission+0x25/0x30 [ 711.803228][T26572] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 711.809653][T26572] ? security_file_permission+0x94/0x380 [ 711.815298][T26572] generic_splice_sendpage+0x3c/0x50 [ 711.820591][T26572] ? splice_from_pipe+0x170/0x170 [ 711.825621][T26572] do_splice+0x70a/0x13c0 [ 711.829967][T26572] ? opipe_prep.part.0+0x2d0/0x2d0 [ 711.835112][T26572] ? __fget_light+0x1a9/0x230 [ 711.839794][T26572] __ia32_sys_splice+0x2c4/0x330 [ 711.844748][T26572] do_fast_syscall_32+0x281/0xc98 [ 711.849784][T26572] entry_SYSENTER_compat+0x70/0x7f [ 711.854895][T26572] RIP: 0023:0xf7fe7869 05:07:08 executing program 3 (fault-call:6 fault-nth:20): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 711.858966][T26572] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 711.878567][T26572] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 711.878583][T26572] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 711.878592][T26572] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 711.878601][T26572] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 711.878609][T26572] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 711.878618][T26572] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 711.999651][T26576] FAULT_INJECTION: forcing a failure. [ 711.999651][T26576] name failslab, interval 1, probability 0, space 0, times 0 [ 712.019004][T26576] CPU: 1 PID: 26576 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 712.026937][T26576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.036979][T26576] Call Trace: [ 712.040290][T26576] dump_stack+0x172/0x1f0 [ 712.044637][T26576] should_fail.cold+0xa/0x15 [ 712.049275][T26576] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 712.055126][T26576] ? ___might_sleep+0x163/0x280 [ 712.060011][T26576] __should_failslab+0x121/0x190 [ 712.064963][T26576] should_failslab+0x9/0x14 [ 712.069471][T26576] __kmalloc+0x2dc/0x740 [ 712.073722][T26576] ? __local_bh_enable_ip+0x15a/0x270 [ 712.079104][T26576] ? lock_sock_nested+0xe2/0x120 [ 712.084050][T26576] ? __local_bh_enable_ip+0x15a/0x270 [ 712.089430][T26576] ? lockdep_hardirqs_on+0x418/0x5d0 [ 712.094720][T26576] ? lock_sock_nested+0x9a/0x120 [ 712.099654][T26576] ? sock_kmalloc+0xc6/0x120 [ 712.104262][T26576] sock_kmalloc+0xc6/0x120 [ 712.108692][T26576] hash_alloc_result.part.0+0x95/0x110 [ 712.114161][T26576] hash_sendpage+0x7b3/0x9e0 [ 712.118767][T26576] kernel_sendpage+0x95/0xf0 [ 712.123367][T26576] ? hash_sendmsg+0xad0/0xad0 [ 712.128084][T26576] sock_sendpage+0x8b/0xc0 [ 712.132522][T26576] ? lockdep_hardirqs_on+0x418/0x5d0 [ 712.137817][T26576] pipe_to_sendpage+0x299/0x370 [ 712.142676][T26576] ? kernel_sendpage+0xf0/0xf0 [ 712.147455][T26576] ? direct_splice_actor+0x1a0/0x1a0 [ 712.152748][T26576] ? __put_page+0x92/0xd0 [ 712.157088][T26576] ? anon_pipe_buf_release+0x1c6/0x270 [ 712.162569][T26576] __splice_from_pipe+0x395/0x7d0 [ 712.167606][T26576] ? direct_splice_actor+0x1a0/0x1a0 [ 712.172920][T26576] ? direct_splice_actor+0x1a0/0x1a0 [ 712.178220][T26576] splice_from_pipe+0x108/0x170 [ 712.183109][T26576] ? splice_shrink_spd+0xd0/0xd0 [ 712.188071][T26576] ? apparmor_file_permission+0x25/0x30 [ 712.193717][T26576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 712.199966][T26576] ? security_file_permission+0x94/0x380 [ 712.205675][T26576] generic_splice_sendpage+0x3c/0x50 [ 712.210958][T26576] ? splice_from_pipe+0x170/0x170 [ 712.215981][T26576] do_splice+0x70a/0x13c0 [ 712.220300][T26576] ? opipe_prep.part.0+0x2d0/0x2d0 [ 712.225430][T26576] ? __fget_light+0x1a9/0x230 [ 712.230132][T26576] __ia32_sys_splice+0x2c4/0x330 [ 712.235060][T26576] do_fast_syscall_32+0x281/0xc98 [ 712.240081][T26576] entry_SYSENTER_compat+0x70/0x7f [ 712.245172][T26576] RIP: 0023:0xf7fb8869 [ 712.249222][T26576] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 712.268811][T26576] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 712.277234][T26576] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 712.285197][T26576] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 712.293165][T26576] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:07:08 executing program 4 (fault-call:6 fault-nth:19): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 712.301146][T26576] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 712.309132][T26576] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:08 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:08 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8905, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:08 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x01\xbe\xa9[\x00', @ifru_flags=0x1}) [ 712.481505][T26582] FAULT_INJECTION: forcing a failure. [ 712.481505][T26582] name failslab, interval 1, probability 0, space 0, times 0 [ 712.507437][T26582] CPU: 1 PID: 26582 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 712.515378][T26582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.515385][T26582] Call Trace: [ 712.515416][T26582] dump_stack+0x172/0x1f0 [ 712.515440][T26582] should_fail.cold+0xa/0x15 [ 712.515464][T26582] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 712.533161][T26582] ? ___might_sleep+0x163/0x280 [ 712.533183][T26582] __should_failslab+0x121/0x190 [ 712.533203][T26582] should_failslab+0x9/0x14 [ 712.533224][T26582] __kmalloc+0x2dc/0x740 [ 712.543624][T26582] ? __local_bh_enable_ip+0x15a/0x270 [ 712.543640][T26582] ? lock_sock_nested+0xe2/0x120 [ 712.543654][T26582] ? __local_bh_enable_ip+0x15a/0x270 [ 712.543671][T26582] ? lockdep_hardirqs_on+0x418/0x5d0 [ 712.543690][T26582] ? lock_sock_nested+0x9a/0x120 [ 712.553464][T26582] ? sock_kmalloc+0xc6/0x120 [ 712.562191][T26582] sock_kmalloc+0xc6/0x120 [ 712.562214][T26582] hash_alloc_result.part.0+0x95/0x110 [ 712.562231][T26582] hash_sendpage+0x7b3/0x9e0 [ 712.562254][T26582] kernel_sendpage+0x95/0xf0 [ 712.562274][T26582] ? hash_sendmsg+0xad0/0xad0 [ 712.572654][T26582] sock_sendpage+0x8b/0xc0 [ 712.572670][T26582] ? lockdep_hardirqs_on+0x418/0x5d0 [ 712.572690][T26582] pipe_to_sendpage+0x299/0x370 05:07:08 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 712.572705][T26582] ? kernel_sendpage+0xf0/0xf0 [ 712.572729][T26582] ? direct_splice_actor+0x1a0/0x1a0 [ 712.583382][T26582] ? __put_page+0x92/0xd0 [ 712.583402][T26582] ? anon_pipe_buf_release+0x1c6/0x270 [ 712.583420][T26582] __splice_from_pipe+0x395/0x7d0 [ 712.583436][T26582] ? direct_splice_actor+0x1a0/0x1a0 [ 712.583458][T26582] ? direct_splice_actor+0x1a0/0x1a0 [ 712.583477][T26582] splice_from_pipe+0x108/0x170 [ 712.593006][T26582] ? splice_shrink_spd+0xd0/0xd0 05:07:08 executing program 3 (fault-call:6 fault-nth:21): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 712.593029][T26582] ? apparmor_file_permission+0x25/0x30 [ 712.593045][T26582] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 712.593062][T26582] ? security_file_permission+0x94/0x380 [ 712.593084][T26582] generic_splice_sendpage+0x3c/0x50 [ 712.593103][T26582] ? splice_from_pipe+0x170/0x170 [ 712.602964][T26582] do_splice+0x70a/0x13c0 [ 712.602991][T26582] ? opipe_prep.part.0+0x2d0/0x2d0 [ 712.603011][T26582] ? __fget_light+0x1a9/0x230 [ 712.603030][T26582] __ia32_sys_splice+0x2c4/0x330 [ 712.603054][T26582] do_fast_syscall_32+0x281/0xc98 [ 712.612224][T26582] entry_SYSENTER_compat+0x70/0x7f [ 712.612237][T26582] RIP: 0023:0xf7fe7869 [ 712.612252][T26582] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 712.612260][T26582] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 712.612275][T26582] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 05:07:09 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) [ 712.612282][T26582] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 712.612298][T26582] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 712.621371][T26582] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 712.621379][T26582] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:09 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 712.910257][T26600] FAULT_INJECTION: forcing a failure. [ 712.910257][T26600] name failslab, interval 1, probability 0, space 0, times 0 [ 712.924469][T26600] CPU: 1 PID: 26600 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 712.932379][T26600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.932387][T26600] Call Trace: [ 712.932413][T26600] dump_stack+0x172/0x1f0 [ 712.932442][T26600] should_fail.cold+0xa/0x15 [ 712.954670][T26600] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 712.960489][T26600] ? ___might_sleep+0x163/0x280 [ 712.965351][T26600] __should_failslab+0x121/0x190 [ 712.970302][T26600] should_failslab+0x9/0x14 [ 712.974813][T26600] __kmalloc+0x2dc/0x740 [ 712.979062][T26600] ? __local_bh_enable_ip+0x15a/0x270 [ 712.984442][T26600] ? lock_sock_nested+0xe2/0x120 [ 712.989394][T26600] ? __local_bh_enable_ip+0x15a/0x270 [ 712.994774][T26600] ? lockdep_hardirqs_on+0x418/0x5d0 [ 713.000063][T26600] ? lock_sock_nested+0x9a/0x120 [ 713.005004][T26600] ? sock_kmalloc+0xc6/0x120 [ 713.009605][T26600] sock_kmalloc+0xc6/0x120 [ 713.014037][T26600] hash_alloc_result.part.0+0x95/0x110 [ 713.019512][T26600] hash_sendpage+0x7b3/0x9e0 [ 713.024122][T26600] kernel_sendpage+0x95/0xf0 [ 713.028757][T26600] ? hash_sendmsg+0xad0/0xad0 [ 713.033451][T26600] sock_sendpage+0x8b/0xc0 [ 713.037874][T26600] ? lockdep_hardirqs_on+0x418/0x5d0 [ 713.043176][T26600] pipe_to_sendpage+0x299/0x370 [ 713.048038][T26600] ? kernel_sendpage+0xf0/0xf0 [ 713.052813][T26600] ? direct_splice_actor+0x1a0/0x1a0 [ 713.058107][T26600] ? __put_page+0x92/0xd0 [ 713.062455][T26600] ? anon_pipe_buf_release+0x1c6/0x270 [ 713.068013][T26600] __splice_from_pipe+0x395/0x7d0 [ 713.073048][T26600] ? direct_splice_actor+0x1a0/0x1a0 [ 713.078352][T26600] ? direct_splice_actor+0x1a0/0x1a0 [ 713.083649][T26600] splice_from_pipe+0x108/0x170 [ 713.088513][T26600] ? splice_shrink_spd+0xd0/0xd0 [ 713.093470][T26600] ? apparmor_file_permission+0x25/0x30 [ 713.099025][T26600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.105280][T26600] ? security_file_permission+0x94/0x380 [ 713.110935][T26600] generic_splice_sendpage+0x3c/0x50 [ 713.116245][T26600] ? splice_from_pipe+0x170/0x170 [ 713.121276][T26600] do_splice+0x70a/0x13c0 [ 713.125624][T26600] ? opipe_prep.part.0+0x2d0/0x2d0 [ 713.130747][T26600] ? __fget_light+0x1a9/0x230 [ 713.135530][T26600] __ia32_sys_splice+0x2c4/0x330 [ 713.140487][T26600] do_fast_syscall_32+0x281/0xc98 [ 713.145530][T26600] entry_SYSENTER_compat+0x70/0x7f [ 713.150648][T26600] RIP: 0023:0xf7fb8869 [ 713.154728][T26600] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 713.174433][T26600] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 713.182862][T26600] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 713.190854][T26600] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 713.198847][T26600] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:07:09 executing program 4 (fault-call:6 fault-nth:20): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 713.206831][T26600] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 713.214818][T26600] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:09 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8906, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 713.407519][T26612] FAULT_INJECTION: forcing a failure. [ 713.407519][T26612] name failslab, interval 1, probability 0, space 0, times 0 [ 713.426538][T26612] CPU: 0 PID: 26612 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 713.434455][T26612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.444517][T26612] Call Trace: [ 713.447825][T26612] dump_stack+0x172/0x1f0 [ 713.452190][T26612] should_fail.cold+0xa/0x15 [ 713.456791][T26612] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 713.462608][T26612] ? ___might_sleep+0x163/0x280 [ 713.467470][T26612] __should_failslab+0x121/0x190 [ 713.472431][T26612] should_failslab+0x9/0x14 [ 713.476938][T26612] __kmalloc+0x2dc/0x740 [ 713.481189][T26612] ? __local_bh_enable_ip+0x15a/0x270 [ 713.486563][T26612] ? lock_sock_nested+0xe2/0x120 [ 713.491505][T26612] ? __local_bh_enable_ip+0x15a/0x270 [ 713.496886][T26612] ? lockdep_hardirqs_on+0x418/0x5d0 [ 713.502172][T26612] ? lock_sock_nested+0x9a/0x120 [ 713.507106][T26612] ? sock_kmalloc+0xc6/0x120 [ 713.511699][T26612] sock_kmalloc+0xc6/0x120 [ 713.516128][T26612] hash_alloc_result.part.0+0x95/0x110 [ 713.521684][T26612] hash_sendpage+0x7b3/0x9e0 [ 713.526287][T26612] kernel_sendpage+0x95/0xf0 [ 713.530909][T26612] ? hash_sendmsg+0xad0/0xad0 [ 713.535599][T26612] sock_sendpage+0x8b/0xc0 [ 713.540020][T26612] ? lockdep_hardirqs_on+0x418/0x5d0 [ 713.545328][T26612] pipe_to_sendpage+0x299/0x370 [ 713.550191][T26612] ? kernel_sendpage+0xf0/0xf0 [ 713.554993][T26612] ? direct_splice_actor+0x1a0/0x1a0 [ 713.560274][T26612] ? __put_page+0x92/0xd0 [ 713.564591][T26612] ? anon_pipe_buf_release+0x1c6/0x270 [ 713.570035][T26612] __splice_from_pipe+0x395/0x7d0 [ 713.575043][T26612] ? direct_splice_actor+0x1a0/0x1a0 [ 713.580347][T26612] ? direct_splice_actor+0x1a0/0x1a0 [ 713.585618][T26612] splice_from_pipe+0x108/0x170 [ 713.590458][T26612] ? splice_shrink_spd+0xd0/0xd0 [ 713.595389][T26612] ? apparmor_file_permission+0x25/0x30 [ 713.600922][T26612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.607160][T26612] ? security_file_permission+0x94/0x380 [ 713.612803][T26612] generic_splice_sendpage+0x3c/0x50 [ 713.618102][T26612] ? splice_from_pipe+0x170/0x170 [ 713.623115][T26612] do_splice+0x70a/0x13c0 [ 713.627436][T26612] ? opipe_prep.part.0+0x2d0/0x2d0 [ 713.632539][T26612] ? __fget_light+0x1a9/0x230 [ 713.637202][T26612] __ia32_sys_splice+0x2c4/0x330 [ 713.642127][T26612] do_fast_syscall_32+0x281/0xc98 [ 713.658304][T26612] entry_SYSENTER_compat+0x70/0x7f [ 713.663420][T26612] RIP: 0023:0xf7fe7869 [ 713.667483][T26612] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 713.687107][T26612] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 713.695519][T26612] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 05:07:09 executing program 3 (fault-call:6 fault-nth:22): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 713.703479][T26612] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 713.711437][T26612] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 713.719424][T26612] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 713.727384][T26612] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:10 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 713.888897][T26619] FAULT_INJECTION: forcing a failure. [ 713.888897][T26619] name failslab, interval 1, probability 0, space 0, times 0 [ 713.905681][T26619] CPU: 0 PID: 26619 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 713.913594][T26619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.923827][T26619] Call Trace: [ 713.927134][T26619] dump_stack+0x172/0x1f0 [ 713.931477][T26619] should_fail.cold+0xa/0x15 [ 713.936081][T26619] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 713.941896][T26619] ? ___might_sleep+0x163/0x280 [ 713.946755][T26619] __should_failslab+0x121/0x190 [ 713.951703][T26619] should_failslab+0x9/0x14 [ 713.956216][T26619] __kmalloc+0x2dc/0x740 [ 713.960458][T26619] ? __local_bh_enable_ip+0x15a/0x270 [ 713.965827][T26619] ? lock_sock_nested+0xe2/0x120 [ 713.970771][T26619] ? __local_bh_enable_ip+0x15a/0x270 [ 713.976235][T26619] ? lockdep_hardirqs_on+0x418/0x5d0 [ 713.981522][T26619] ? lock_sock_nested+0x9a/0x120 [ 713.986458][T26619] ? sock_kmalloc+0xc6/0x120 [ 713.991053][T26619] sock_kmalloc+0xc6/0x120 [ 713.995488][T26619] hash_alloc_result.part.0+0x95/0x110 [ 714.000951][T26619] hash_sendpage+0x7b3/0x9e0 [ 714.005551][T26619] kernel_sendpage+0x95/0xf0 [ 714.010152][T26619] ? hash_sendmsg+0xad0/0xad0 [ 714.014832][T26619] sock_sendpage+0x8b/0xc0 [ 714.019340][T26619] ? lockdep_hardirqs_on+0x418/0x5d0 [ 714.024619][T26619] pipe_to_sendpage+0x299/0x370 [ 714.029466][T26619] ? kernel_sendpage+0xf0/0xf0 [ 714.034226][T26619] ? direct_splice_actor+0x1a0/0x1a0 [ 714.039504][T26619] ? __put_page+0x92/0xd0 [ 714.043851][T26619] ? anon_pipe_buf_release+0x1c6/0x270 [ 714.049315][T26619] __splice_from_pipe+0x395/0x7d0 [ 714.054339][T26619] ? direct_splice_actor+0x1a0/0x1a0 [ 714.060418][T26619] ? direct_splice_actor+0x1a0/0x1a0 [ 714.065804][T26619] splice_from_pipe+0x108/0x170 [ 714.070723][T26619] ? splice_shrink_spd+0xd0/0xd0 [ 714.075644][T26619] ? apparmor_file_permission+0x25/0x30 [ 714.081269][T26619] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 714.087517][T26619] ? security_file_permission+0x94/0x380 [ 714.093146][T26619] generic_splice_sendpage+0x3c/0x50 [ 714.098414][T26619] ? splice_from_pipe+0x170/0x170 [ 714.103431][T26619] do_splice+0x70a/0x13c0 [ 714.107750][T26619] ? opipe_prep.part.0+0x2d0/0x2d0 [ 714.112842][T26619] ? __fget_light+0x1a9/0x230 [ 714.117502][T26619] __ia32_sys_splice+0x2c4/0x330 [ 714.122445][T26619] do_fast_syscall_32+0x281/0xc98 [ 714.127464][T26619] entry_SYSENTER_compat+0x70/0x7f [ 714.132555][T26619] RIP: 0023:0xf7fb8869 [ 714.136689][T26619] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 714.156279][T26619] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 714.164677][T26619] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 714.172629][T26619] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 714.180593][T26619] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:07:10 executing program 4 (fault-call:6 fault-nth:21): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 714.188572][T26619] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 714.196544][T26619] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:10 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:10 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\xc3\xa9[\x00', @ifru_flags=0x1}) 05:07:10 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:07:10 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8907, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:10 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 714.431740][T26632] FAULT_INJECTION: forcing a failure. [ 714.431740][T26632] name failslab, interval 1, probability 0, space 0, times 0 [ 714.470438][T26632] CPU: 0 PID: 26632 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 714.478480][T26632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.489165][T26632] Call Trace: [ 714.492484][T26632] dump_stack+0x172/0x1f0 [ 714.496949][T26632] should_fail.cold+0xa/0x15 [ 714.501571][T26632] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 714.507748][T26632] ? ___might_sleep+0x163/0x280 [ 714.512820][T26632] __should_failslab+0x121/0x190 [ 714.517788][T26632] should_failslab+0x9/0x14 [ 714.522399][T26632] __kmalloc+0x2dc/0x740 [ 714.526928][T26632] ? __local_bh_enable_ip+0x15a/0x270 [ 714.532321][T26632] ? lock_sock_nested+0xe2/0x120 [ 714.537299][T26632] ? __local_bh_enable_ip+0x15a/0x270 [ 714.542694][T26632] ? lockdep_hardirqs_on+0x418/0x5d0 [ 714.548093][T26632] ? lock_sock_nested+0x9a/0x120 [ 714.553075][T26632] ? sock_kmalloc+0xc6/0x120 [ 714.557688][T26632] sock_kmalloc+0xc6/0x120 [ 714.562141][T26632] hash_alloc_result.part.0+0x95/0x110 [ 714.567625][T26632] hash_sendpage+0x7b3/0x9e0 [ 714.572683][T26632] kernel_sendpage+0x95/0xf0 [ 714.577305][T26632] ? hash_sendmsg+0xad0/0xad0 [ 714.582115][T26632] sock_sendpage+0x8b/0xc0 [ 714.586812][T26632] ? lockdep_hardirqs_on+0x418/0x5d0 [ 714.594219][T26632] pipe_to_sendpage+0x299/0x370 [ 714.599115][T26632] ? kernel_sendpage+0xf0/0xf0 [ 714.603912][T26632] ? direct_splice_actor+0x1a0/0x1a0 [ 714.609309][T26632] ? __put_page+0x92/0xd0 [ 714.613863][T26632] ? anon_pipe_buf_release+0x1c6/0x270 [ 714.619363][T26632] __splice_from_pipe+0x395/0x7d0 [ 714.624461][T26632] ? direct_splice_actor+0x1a0/0x1a0 [ 714.629785][T26632] ? direct_splice_actor+0x1a0/0x1a0 [ 714.635101][T26632] splice_from_pipe+0x108/0x170 [ 714.640004][T26632] ? splice_shrink_spd+0xd0/0xd0 [ 714.644973][T26632] ? apparmor_file_permission+0x25/0x30 [ 714.650548][T26632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 714.656842][T26632] ? security_file_permission+0x94/0x380 [ 714.662949][T26632] generic_splice_sendpage+0x3c/0x50 [ 714.668369][T26632] ? splice_from_pipe+0x170/0x170 [ 714.673435][T26632] do_splice+0x70a/0x13c0 [ 714.679338][T26632] ? opipe_prep.part.0+0x2d0/0x2d0 [ 714.684482][T26632] ? __fget_light+0x1a9/0x230 [ 714.689221][T26632] __ia32_sys_splice+0x2c4/0x330 [ 714.694286][T26632] do_fast_syscall_32+0x281/0xc98 [ 714.699343][T26632] entry_SYSENTER_compat+0x70/0x7f [ 714.704648][T26632] RIP: 0023:0xf7fe7869 [ 714.708736][T26632] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 05:07:11 executing program 3 (fault-call:6 fault-nth:23): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 714.728530][T26632] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 714.737168][T26632] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 714.745164][T26632] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 714.753299][T26632] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 714.761378][T26632] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 714.769416][T26632] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 714.935866][T26645] FAULT_INJECTION: forcing a failure. [ 714.935866][T26645] name failslab, interval 1, probability 0, space 0, times 0 [ 714.949317][T26645] CPU: 0 PID: 26645 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 714.957424][T26645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.967489][T26645] Call Trace: [ 714.970793][T26645] dump_stack+0x172/0x1f0 [ 714.976570][T26645] should_fail.cold+0xa/0x15 [ 714.981182][T26645] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 714.987197][T26645] ? ___might_sleep+0x163/0x280 [ 714.992176][T26645] __should_failslab+0x121/0x190 [ 714.997113][T26645] should_failslab+0x9/0x14 [ 715.001900][T26645] __kmalloc+0x2dc/0x740 [ 715.006152][T26645] ? __local_bh_enable_ip+0x15a/0x270 [ 715.011700][T26645] ? lock_sock_nested+0xe2/0x120 [ 715.017166][T26645] ? __local_bh_enable_ip+0x15a/0x270 [ 715.022567][T26645] ? lockdep_hardirqs_on+0x418/0x5d0 [ 715.027865][T26645] ? lock_sock_nested+0x9a/0x120 [ 715.032993][T26645] ? sock_kmalloc+0xc6/0x120 [ 715.037579][T26645] sock_kmalloc+0xc6/0x120 [ 715.042017][T26645] hash_alloc_result.part.0+0x95/0x110 [ 715.047489][T26645] hash_sendpage+0x7b3/0x9e0 [ 715.052105][T26645] kernel_sendpage+0x95/0xf0 [ 715.056800][T26645] ? hash_sendmsg+0xad0/0xad0 [ 715.061519][T26645] sock_sendpage+0x8b/0xc0 [ 715.066742][T26645] ? lockdep_hardirqs_on+0x418/0x5d0 [ 715.072201][T26645] pipe_to_sendpage+0x299/0x370 [ 715.077060][T26645] ? kernel_sendpage+0xf0/0xf0 [ 715.081944][T26645] ? direct_splice_actor+0x1a0/0x1a0 [ 715.090317][T26645] ? __put_page+0x92/0xd0 [ 715.099479][T26645] ? anon_pipe_buf_release+0x1c6/0x270 [ 715.105154][T26645] __splice_from_pipe+0x395/0x7d0 [ 715.110280][T26645] ? direct_splice_actor+0x1a0/0x1a0 [ 715.115596][T26645] ? direct_splice_actor+0x1a0/0x1a0 [ 715.121515][T26645] splice_from_pipe+0x108/0x170 [ 715.126372][T26645] ? splice_shrink_spd+0xd0/0xd0 [ 715.131336][T26645] generic_splice_sendpage+0x3c/0x50 [ 715.136653][T26645] ? splice_from_pipe+0x170/0x170 [ 715.141674][T26645] do_splice+0x70a/0x13c0 [ 715.146029][T26645] ? opipe_prep.part.0+0x2d0/0x2d0 [ 715.151303][T26645] ? __fget_light+0x1a9/0x230 [ 715.156019][T26645] __ia32_sys_splice+0x2c4/0x330 [ 715.161096][T26645] do_fast_syscall_32+0x281/0xc98 [ 715.166139][T26645] entry_SYSENTER_compat+0x70/0x7f [ 715.171256][T26645] RIP: 0023:0xf7fb8869 [ 715.175351][T26645] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 715.195387][T26645] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 715.203801][T26645] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 715.211885][T26645] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 715.220123][T26645] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 715.228215][T26645] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 05:07:11 executing program 4 (fault-call:6 fault-nth:22): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 715.236234][T26645] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:11 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 715.461981][T26650] FAULT_INJECTION: forcing a failure. [ 715.461981][T26650] name failslab, interval 1, probability 0, space 0, times 0 [ 715.478333][T26650] CPU: 0 PID: 26650 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 715.486349][T26650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.496636][T26650] Call Trace: [ 715.499950][T26650] dump_stack+0x172/0x1f0 [ 715.504297][T26650] should_fail.cold+0xa/0x15 [ 715.508886][T26650] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 715.514706][T26650] ? ___might_sleep+0x163/0x280 [ 715.519608][T26650] __should_failslab+0x121/0x190 [ 715.524643][T26650] should_failslab+0x9/0x14 [ 715.529145][T26650] __kmalloc+0x2dc/0x740 [ 715.533389][T26650] ? __local_bh_enable_ip+0x15a/0x270 [ 715.539033][T26650] ? lock_sock_nested+0xe2/0x120 [ 715.543970][T26650] ? __local_bh_enable_ip+0x15a/0x270 [ 715.549363][T26650] ? lockdep_hardirqs_on+0x418/0x5d0 [ 715.554662][T26650] ? lock_sock_nested+0x9a/0x120 [ 715.559724][T26650] ? sock_kmalloc+0xc6/0x120 [ 715.564348][T26650] sock_kmalloc+0xc6/0x120 [ 715.568781][T26650] hash_alloc_result.part.0+0x95/0x110 [ 715.574355][T26650] hash_sendpage+0x7b3/0x9e0 [ 715.578946][T26650] kernel_sendpage+0x95/0xf0 [ 715.583544][T26650] ? hash_sendmsg+0xad0/0xad0 [ 715.588220][T26650] sock_sendpage+0x8b/0xc0 [ 715.592710][T26650] ? lockdep_hardirqs_on+0x418/0x5d0 [ 715.605574][T26650] pipe_to_sendpage+0x299/0x370 [ 715.610615][T26650] ? kernel_sendpage+0xf0/0xf0 [ 715.615471][T26650] ? direct_splice_actor+0x1a0/0x1a0 [ 715.620757][T26650] ? __put_page+0x92/0xd0 [ 715.625086][T26650] ? anon_pipe_buf_release+0x1c6/0x270 [ 715.630548][T26650] __splice_from_pipe+0x395/0x7d0 [ 715.635595][T26650] ? direct_splice_actor+0x1a0/0x1a0 [ 715.640987][T26650] ? direct_splice_actor+0x1a0/0x1a0 [ 715.646907][T26650] splice_from_pipe+0x108/0x170 [ 715.651764][T26650] ? splice_shrink_spd+0xd0/0xd0 [ 715.656720][T26650] ? apparmor_file_permission+0x25/0x30 [ 715.662271][T26650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.668532][T26650] ? security_file_permission+0x94/0x380 [ 715.674186][T26650] generic_splice_sendpage+0x3c/0x50 [ 715.679839][T26650] ? splice_from_pipe+0x170/0x170 [ 715.684870][T26650] do_splice+0x70a/0x13c0 [ 715.689201][T26650] ? opipe_prep.part.0+0x2d0/0x2d0 [ 715.694428][T26650] ? __fget_light+0x1a9/0x230 [ 715.699110][T26650] __ia32_sys_splice+0x2c4/0x330 [ 715.704056][T26650] do_fast_syscall_32+0x281/0xc98 [ 715.709085][T26650] entry_SYSENTER_compat+0x70/0x7f [ 715.714589][T26650] RIP: 0023:0xf7fe7869 [ 715.719032][T26650] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 715.743578][T26650] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 05:07:12 executing program 3 (fault-call:6 fault-nth:24): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 715.752016][T26650] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 715.772112][T26650] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 715.780268][T26650] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 715.788269][T26650] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 715.803614][T26650] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 715.966638][T26657] FAULT_INJECTION: forcing a failure. [ 715.966638][T26657] name failslab, interval 1, probability 0, space 0, times 0 [ 715.986468][T26657] CPU: 0 PID: 26657 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 715.994460][T26657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.004527][T26657] Call Trace: [ 716.004554][T26657] dump_stack+0x172/0x1f0 [ 716.004573][T26657] should_fail.cold+0xa/0x15 [ 716.004589][T26657] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 716.004607][T26657] ? ___might_sleep+0x163/0x280 [ 716.004625][T26657] __should_failslab+0x121/0x190 [ 716.004650][T26657] should_failslab+0x9/0x14 [ 716.013933][T26657] __kmalloc+0x2dc/0x740 [ 716.013949][T26657] ? __local_bh_enable_ip+0x15a/0x270 [ 716.013963][T26657] ? lock_sock_nested+0xe2/0x120 [ 716.013976][T26657] ? __local_bh_enable_ip+0x15a/0x270 [ 716.013999][T26657] ? lockdep_hardirqs_on+0x418/0x5d0 [ 716.024411][T26657] ? lock_sock_nested+0x9a/0x120 [ 716.024425][T26657] ? sock_kmalloc+0xc6/0x120 [ 716.024440][T26657] sock_kmalloc+0xc6/0x120 [ 716.024466][T26657] hash_alloc_result.part.0+0x95/0x110 [ 716.034268][T26657] hash_sendpage+0x7b3/0x9e0 [ 716.034291][T26657] kernel_sendpage+0x95/0xf0 [ 716.034304][T26657] ? hash_sendmsg+0xad0/0xad0 [ 716.034325][T26657] sock_sendpage+0x8b/0xc0 [ 716.043094][T26657] ? lockdep_hardirqs_on+0x418/0x5d0 [ 716.043116][T26657] pipe_to_sendpage+0x299/0x370 [ 716.043132][T26657] ? kernel_sendpage+0xf0/0xf0 [ 716.043154][T26657] ? direct_splice_actor+0x1a0/0x1a0 [ 716.053496][T26657] ? __put_page+0x92/0xd0 [ 716.053515][T26657] ? anon_pipe_buf_release+0x1c6/0x270 [ 716.053532][T26657] __splice_from_pipe+0x395/0x7d0 [ 716.053547][T26657] ? direct_splice_actor+0x1a0/0x1a0 [ 716.053566][T26657] ? direct_splice_actor+0x1a0/0x1a0 [ 716.053579][T26657] splice_from_pipe+0x108/0x170 [ 716.053595][T26657] ? splice_shrink_spd+0xd0/0xd0 [ 716.053616][T26657] ? apparmor_file_permission+0x25/0x30 [ 716.053639][T26657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 716.172607][T26657] ? security_file_permission+0x94/0x380 [ 716.178451][T26657] generic_splice_sendpage+0x3c/0x50 [ 716.183759][T26657] ? splice_from_pipe+0x170/0x170 [ 716.188790][T26657] do_splice+0x70a/0x13c0 [ 716.193415][T26657] ? opipe_prep.part.0+0x2d0/0x2d0 [ 716.198620][T26657] ? __fget_light+0x1a9/0x230 [ 716.203424][T26657] __ia32_sys_splice+0x2c4/0x330 [ 716.208375][T26657] do_fast_syscall_32+0x281/0xc98 [ 716.213730][T26657] entry_SYSENTER_compat+0x70/0x7f [ 716.218831][T26657] RIP: 0023:0xf7fb8869 [ 716.222897][T26657] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 716.242525][T26657] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 716.250961][T26657] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 716.258972][T26657] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 05:07:12 executing program 4 (fault-call:6 fault-nth:23): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 716.266969][T26657] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 716.274966][T26657] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 716.282935][T26657] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:12 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x02\xc6\xa9[\x00', @ifru_flags=0x1}) 05:07:12 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:12 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x890b, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:12 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:07:12 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 716.515635][T26669] FAULT_INJECTION: forcing a failure. [ 716.515635][T26669] name failslab, interval 1, probability 0, space 0, times 0 [ 716.564236][T26669] CPU: 0 PID: 26669 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 716.572330][T26669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.582424][T26669] Call Trace: [ 716.585734][T26669] dump_stack+0x172/0x1f0 [ 716.590094][T26669] should_fail.cold+0xa/0x15 [ 716.594841][T26669] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 716.608851][T26669] ? ___might_sleep+0x163/0x280 [ 716.613733][T26669] __should_failslab+0x121/0x190 [ 716.618709][T26669] should_failslab+0x9/0x14 [ 716.623344][T26669] __kmalloc+0x2dc/0x740 [ 716.627641][T26669] ? __local_bh_enable_ip+0x15a/0x270 [ 716.633027][T26669] ? lock_sock_nested+0xe2/0x120 [ 716.637980][T26669] ? __local_bh_enable_ip+0x15a/0x270 [ 716.643470][T26669] ? lockdep_hardirqs_on+0x418/0x5d0 [ 716.648808][T26669] ? lock_sock_nested+0x9a/0x120 [ 716.653760][T26669] ? sock_kmalloc+0xc6/0x120 [ 716.658384][T26669] sock_kmalloc+0xc6/0x120 [ 716.662931][T26669] hash_alloc_result.part.0+0x95/0x110 [ 716.668416][T26669] hash_sendpage+0x7b3/0x9e0 [ 716.673047][T26669] kernel_sendpage+0x95/0xf0 [ 716.678916][T26669] ? hash_sendmsg+0xad0/0xad0 [ 716.683619][T26669] sock_sendpage+0x8b/0xc0 [ 716.688053][T26669] ? lockdep_hardirqs_on+0x418/0x5d0 [ 716.693387][T26669] pipe_to_sendpage+0x299/0x370 [ 716.698265][T26669] ? kernel_sendpage+0xf0/0xf0 [ 716.703075][T26669] ? direct_splice_actor+0x1a0/0x1a0 [ 716.708371][T26669] ? __put_page+0x92/0xd0 [ 716.712727][T26669] ? anon_pipe_buf_release+0x1c6/0x270 [ 716.718201][T26669] __splice_from_pipe+0x395/0x7d0 [ 716.723269][T26669] ? direct_splice_actor+0x1a0/0x1a0 [ 716.728689][T26669] ? direct_splice_actor+0x1a0/0x1a0 [ 716.733992][T26669] splice_from_pipe+0x108/0x170 [ 716.738886][T26669] ? splice_shrink_spd+0xd0/0xd0 [ 716.744195][T26669] ? apparmor_file_permission+0x25/0x30 [ 716.749761][T26669] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 716.756018][T26669] ? security_file_permission+0x94/0x380 [ 716.761708][T26669] generic_splice_sendpage+0x3c/0x50 [ 716.767009][T26669] ? splice_from_pipe+0x170/0x170 [ 716.772133][T26669] do_splice+0x70a/0x13c0 [ 716.776483][T26669] ? opipe_prep.part.0+0x2d0/0x2d0 [ 716.781610][T26669] ? __fget_light+0x1a9/0x230 [ 716.786305][T26669] __ia32_sys_splice+0x2c4/0x330 [ 716.791618][T26669] do_fast_syscall_32+0x281/0xc98 [ 716.796667][T26669] entry_SYSENTER_compat+0x70/0x7f [ 716.801791][T26669] RIP: 0023:0xf7fe7869 [ 716.805889][T26669] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 716.825508][T26669] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 716.833933][T26669] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 716.841925][T26669] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 716.849937][T26669] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 716.857925][T26669] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 05:07:13 executing program 3 (fault-call:6 fault-nth:25): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 716.865917][T26669] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 717.051687][T26684] FAULT_INJECTION: forcing a failure. [ 717.051687][T26684] name failslab, interval 1, probability 0, space 0, times 0 [ 717.064954][T26684] CPU: 0 PID: 26684 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 717.072872][T26684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.082940][T26684] Call Trace: [ 717.086235][T26684] dump_stack+0x172/0x1f0 [ 717.090568][T26684] should_fail.cold+0xa/0x15 [ 717.095149][T26684] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 717.101354][T26684] ? ___might_sleep+0x163/0x280 [ 717.106268][T26684] __should_failslab+0x121/0x190 [ 717.111223][T26684] should_failslab+0x9/0x14 [ 717.115759][T26684] __kmalloc+0x2dc/0x740 [ 717.120035][T26684] ? __local_bh_enable_ip+0x15a/0x270 [ 717.125443][T26684] ? lock_sock_nested+0xe2/0x120 [ 717.130371][T26684] ? __local_bh_enable_ip+0x15a/0x270 [ 717.135909][T26684] ? lockdep_hardirqs_on+0x418/0x5d0 [ 717.141217][T26684] ? lock_sock_nested+0x9a/0x120 [ 717.146152][T26684] ? sock_kmalloc+0xc6/0x120 [ 717.150795][T26684] sock_kmalloc+0xc6/0x120 [ 717.155226][T26684] hash_alloc_result.part.0+0x95/0x110 [ 717.160689][T26684] hash_sendpage+0x7b3/0x9e0 [ 717.165541][T26684] kernel_sendpage+0x95/0xf0 [ 717.170156][T26684] ? hash_sendmsg+0xad0/0xad0 [ 717.174838][T26684] sock_sendpage+0x8b/0xc0 [ 717.180387][T26684] ? lockdep_hardirqs_on+0x418/0x5d0 [ 717.185681][T26684] pipe_to_sendpage+0x299/0x370 [ 717.190526][T26684] ? kernel_sendpage+0xf0/0xf0 [ 717.195291][T26684] ? direct_splice_actor+0x1a0/0x1a0 [ 717.200585][T26684] ? __put_page+0x92/0xd0 [ 717.204934][T26684] ? anon_pipe_buf_release+0x1c6/0x270 [ 717.210381][T26684] __splice_from_pipe+0x395/0x7d0 [ 717.215421][T26684] ? direct_splice_actor+0x1a0/0x1a0 [ 717.220713][T26684] ? direct_splice_actor+0x1a0/0x1a0 [ 717.226004][T26684] splice_from_pipe+0x108/0x170 [ 717.230862][T26684] ? splice_shrink_spd+0xd0/0xd0 [ 717.235790][T26684] ? apparmor_file_permission+0x25/0x30 [ 717.241543][T26684] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.247810][T26684] ? security_file_permission+0x94/0x380 [ 717.253709][T26684] generic_splice_sendpage+0x3c/0x50 [ 717.258992][T26684] ? splice_from_pipe+0x170/0x170 [ 717.264024][T26684] do_splice+0x70a/0x13c0 [ 717.268363][T26684] ? opipe_prep.part.0+0x2d0/0x2d0 [ 717.273478][T26684] ? __fget_light+0x1a9/0x230 [ 717.278152][T26684] __ia32_sys_splice+0x2c4/0x330 [ 717.283109][T26684] do_fast_syscall_32+0x281/0xc98 [ 717.288158][T26684] entry_SYSENTER_compat+0x70/0x7f [ 717.293270][T26684] RIP: 0023:0xf7fb8869 [ 717.297325][T26684] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 717.316934][T26684] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 717.325345][T26684] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 717.333419][T26684] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 717.341392][T26684] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:07:13 executing program 4 (fault-call:6 fault-nth:24): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 717.349370][T26684] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 717.357343][T26684] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 717.513366][T26690] FAULT_INJECTION: forcing a failure. [ 717.513366][T26690] name failslab, interval 1, probability 0, space 0, times 0 [ 717.533843][T26690] CPU: 1 PID: 26690 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 717.541787][T26690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.551851][T26690] Call Trace: [ 717.555188][T26690] dump_stack+0x172/0x1f0 [ 717.559563][T26690] should_fail.cold+0xa/0x15 [ 717.564188][T26690] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 717.571088][T26690] ? ___might_sleep+0x163/0x280 [ 717.575961][T26690] __should_failslab+0x121/0x190 [ 717.580927][T26690] should_failslab+0x9/0x14 [ 717.585548][T26690] __kmalloc+0x2dc/0x740 [ 717.589780][T26690] ? __local_bh_enable_ip+0x15a/0x270 [ 717.595203][T26690] ? lock_sock_nested+0xe2/0x120 [ 717.600173][T26690] ? __local_bh_enable_ip+0x15a/0x270 [ 717.605540][T26690] ? lockdep_hardirqs_on+0x418/0x5d0 [ 717.610828][T26690] ? lock_sock_nested+0x9a/0x120 [ 717.615767][T26690] ? sock_kmalloc+0xc6/0x120 [ 717.620368][T26690] sock_kmalloc+0xc6/0x120 [ 717.624795][T26690] hash_alloc_result.part.0+0x95/0x110 [ 717.630246][T26690] hash_sendpage+0x7b3/0x9e0 [ 717.634927][T26690] kernel_sendpage+0x95/0xf0 [ 717.639520][T26690] ? hash_sendmsg+0xad0/0xad0 [ 717.644235][T26690] sock_sendpage+0x8b/0xc0 [ 717.648767][T26690] ? lockdep_hardirqs_on+0x418/0x5d0 [ 717.654082][T26690] pipe_to_sendpage+0x299/0x370 [ 717.659124][T26690] ? kernel_sendpage+0xf0/0xf0 [ 717.663968][T26690] ? direct_splice_actor+0x1a0/0x1a0 [ 717.669246][T26690] ? __put_page+0x92/0xd0 [ 717.673584][T26690] ? anon_pipe_buf_release+0x1c6/0x270 [ 717.679063][T26690] __splice_from_pipe+0x395/0x7d0 [ 717.684100][T26690] ? direct_splice_actor+0x1a0/0x1a0 [ 717.689384][T26690] ? direct_splice_actor+0x1a0/0x1a0 [ 717.694850][T26690] splice_from_pipe+0x108/0x170 [ 717.699691][T26690] ? splice_shrink_spd+0xd0/0xd0 [ 717.704643][T26690] ? apparmor_file_permission+0x25/0x30 [ 717.710200][T26690] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.716504][T26690] ? security_file_permission+0x94/0x380 [ 717.722134][T26690] generic_splice_sendpage+0x3c/0x50 [ 717.727436][T26690] ? splice_from_pipe+0x170/0x170 [ 717.732477][T26690] do_splice+0x70a/0x13c0 [ 717.736809][T26690] ? opipe_prep.part.0+0x2d0/0x2d0 [ 717.741925][T26690] ? __fget_light+0x1a9/0x230 [ 717.746631][T26690] __ia32_sys_splice+0x2c4/0x330 [ 717.751593][T26690] do_fast_syscall_32+0x281/0xc98 [ 717.756654][T26690] entry_SYSENTER_compat+0x70/0x7f [ 717.761784][T26690] RIP: 0023:0xf7fe7869 [ 717.765845][T26690] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 717.785556][T26690] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 717.793969][T26690] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 717.801937][T26690] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 05:07:14 executing program 3 (fault-call:6 fault-nth:26): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 717.809900][T26690] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 717.817875][T26690] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 717.825845][T26690] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 717.974826][T26694] FAULT_INJECTION: forcing a failure. [ 717.974826][T26694] name failslab, interval 1, probability 0, space 0, times 0 [ 717.994699][T26694] CPU: 1 PID: 26694 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 718.002739][T26694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.012807][T26694] Call Trace: [ 718.016138][T26694] dump_stack+0x172/0x1f0 [ 718.020585][T26694] should_fail.cold+0xa/0x15 [ 718.025372][T26694] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 718.031199][T26694] ? ___might_sleep+0x163/0x280 [ 718.036080][T26694] __should_failslab+0x121/0x190 [ 718.041018][T26694] should_failslab+0x9/0x14 [ 718.045521][T26694] __kmalloc+0x2dc/0x740 [ 718.049760][T26694] ? __local_bh_enable_ip+0x15a/0x270 [ 718.055129][T26694] ? lock_sock_nested+0xe2/0x120 [ 718.060061][T26694] ? __local_bh_enable_ip+0x15a/0x270 [ 718.065431][T26694] ? lockdep_hardirqs_on+0x418/0x5d0 [ 718.070725][T26694] ? lock_sock_nested+0x9a/0x120 [ 718.075657][T26694] ? sock_kmalloc+0xc6/0x120 [ 718.080256][T26694] sock_kmalloc+0xc6/0x120 [ 718.084693][T26694] hash_alloc_result.part.0+0x95/0x110 [ 718.090143][T26694] hash_sendpage+0x7b3/0x9e0 [ 718.094743][T26694] kernel_sendpage+0x95/0xf0 [ 718.099327][T26694] ? hash_sendmsg+0xad0/0xad0 [ 718.104027][T26694] sock_sendpage+0x8b/0xc0 [ 718.108432][T26694] ? lockdep_hardirqs_on+0x418/0x5d0 [ 718.113711][T26694] pipe_to_sendpage+0x299/0x370 [ 718.118584][T26694] ? kernel_sendpage+0xf0/0xf0 [ 718.123358][T26694] ? direct_splice_actor+0x1a0/0x1a0 [ 718.128826][T26694] ? __put_page+0x92/0xd0 [ 718.133144][T26694] ? anon_pipe_buf_release+0x1c6/0x270 [ 718.138591][T26694] __splice_from_pipe+0x395/0x7d0 [ 718.143605][T26694] ? direct_splice_actor+0x1a0/0x1a0 [ 718.149001][T26694] ? direct_splice_actor+0x1a0/0x1a0 [ 718.154281][T26694] splice_from_pipe+0x108/0x170 [ 718.159160][T26694] ? splice_shrink_spd+0xd0/0xd0 [ 718.164220][T26694] ? apparmor_file_permission+0x25/0x30 [ 718.169754][T26694] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.175985][T26694] ? security_file_permission+0x94/0x380 [ 718.181625][T26694] generic_splice_sendpage+0x3c/0x50 [ 718.188157][T26694] ? splice_from_pipe+0x170/0x170 [ 718.193190][T26694] do_splice+0x70a/0x13c0 [ 718.198940][T26694] ? opipe_prep.part.0+0x2d0/0x2d0 [ 718.204041][T26694] ? __fget_light+0x1a9/0x230 [ 718.208728][T26694] __ia32_sys_splice+0x2c4/0x330 [ 718.213678][T26694] do_fast_syscall_32+0x281/0xc98 [ 718.218710][T26694] entry_SYSENTER_compat+0x70/0x7f [ 718.223822][T26694] RIP: 0023:0xf7fb8869 [ 718.227896][T26694] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 718.247593][T26694] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 718.255999][T26694] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 718.263964][T26694] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 05:07:14 executing program 4 (fault-call:6 fault-nth:25): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 718.271957][T26694] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 718.279927][T26694] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 718.287912][T26694] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:14 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\xc8\xa9[\x00', @ifru_flags=0x1}) 05:07:14 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:14 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x890c, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 718.426297][T26700] FAULT_INJECTION: forcing a failure. [ 718.426297][T26700] name failslab, interval 1, probability 0, space 0, times 0 05:07:14 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) [ 718.498291][T26700] CPU: 0 PID: 26700 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 718.506270][T26700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.516333][T26700] Call Trace: [ 718.519651][T26700] dump_stack+0x172/0x1f0 [ 718.523991][T26700] should_fail.cold+0xa/0x15 [ 718.528599][T26700] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 718.534434][T26700] ? ___might_sleep+0x163/0x280 [ 718.539342][T26700] __should_failslab+0x121/0x190 [ 718.544300][T26700] should_failslab+0x9/0x14 [ 718.548817][T26700] __kmalloc+0x2dc/0x740 [ 718.553059][T26700] ? __local_bh_enable_ip+0x15a/0x270 [ 718.558464][T26700] ? lock_sock_nested+0xe2/0x120 [ 718.563399][T26700] ? __local_bh_enable_ip+0x15a/0x270 [ 718.568803][T26700] ? lockdep_hardirqs_on+0x418/0x5d0 [ 718.574129][T26700] ? lock_sock_nested+0x9a/0x120 [ 718.579076][T26700] ? sock_kmalloc+0xc6/0x120 [ 718.583699][T26700] sock_kmalloc+0xc6/0x120 [ 718.588110][T26700] hash_alloc_result.part.0+0x95/0x110 [ 718.593635][T26700] hash_sendpage+0x7b3/0x9e0 [ 718.598231][T26700] kernel_sendpage+0x95/0xf0 [ 718.602825][T26700] ? hash_sendmsg+0xad0/0xad0 [ 718.607534][T26700] sock_sendpage+0x8b/0xc0 [ 718.611991][T26700] ? lockdep_hardirqs_on+0x418/0x5d0 [ 718.617343][T26700] pipe_to_sendpage+0x299/0x370 [ 718.622264][T26700] ? kernel_sendpage+0xf0/0xf0 [ 718.627049][T26700] ? direct_splice_actor+0x1a0/0x1a0 [ 718.632356][T26700] ? __put_page+0x92/0xd0 [ 718.636707][T26700] ? anon_pipe_buf_release+0x1c6/0x270 [ 718.642187][T26700] __splice_from_pipe+0x395/0x7d0 [ 718.647230][T26700] ? direct_splice_actor+0x1a0/0x1a0 [ 718.652534][T26700] ? direct_splice_actor+0x1a0/0x1a0 [ 718.657930][T26700] splice_from_pipe+0x108/0x170 [ 718.662803][T26700] ? splice_shrink_spd+0xd0/0xd0 [ 718.667766][T26700] ? apparmor_file_permission+0x25/0x30 [ 718.673330][T26700] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.681300][T26700] ? security_file_permission+0x94/0x380 [ 718.686959][T26700] generic_splice_sendpage+0x3c/0x50 [ 718.692261][T26700] ? splice_from_pipe+0x170/0x170 [ 718.697306][T26700] do_splice+0x70a/0x13c0 [ 718.701661][T26700] ? opipe_prep.part.0+0x2d0/0x2d0 [ 718.706793][T26700] ? __fget_light+0x1a9/0x230 [ 718.711495][T26700] __ia32_sys_splice+0x2c4/0x330 [ 718.716456][T26700] do_fast_syscall_32+0x281/0xc98 [ 718.721505][T26700] entry_SYSENTER_compat+0x70/0x7f [ 718.726629][T26700] RIP: 0023:0xf7fe7869 05:07:15 executing program 3 (fault-call:6 fault-nth:27): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 718.730794][T26700] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 718.750413][T26700] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 718.758842][T26700] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 718.766828][T26700] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 718.774911][T26700] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 718.782897][T26700] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 718.790897][T26700] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 718.965028][T26718] FAULT_INJECTION: forcing a failure. [ 718.965028][T26718] name failslab, interval 1, probability 0, space 0, times 0 [ 718.984566][T26718] CPU: 1 PID: 26718 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 718.992502][T26718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.002570][T26718] Call Trace: [ 719.002597][T26718] dump_stack+0x172/0x1f0 [ 719.002616][T26718] should_fail.cold+0xa/0x15 [ 719.002634][T26718] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 719.002652][T26718] ? ___might_sleep+0x163/0x280 [ 719.002675][T26718] __should_failslab+0x121/0x190 [ 719.010298][T26718] should_failslab+0x9/0x14 [ 719.010313][T26718] __kmalloc+0x2dc/0x740 [ 719.010327][T26718] ? __local_bh_enable_ip+0x15a/0x270 [ 719.010339][T26718] ? lock_sock_nested+0xe2/0x120 [ 719.010352][T26718] ? __local_bh_enable_ip+0x15a/0x270 [ 719.010367][T26718] ? lockdep_hardirqs_on+0x418/0x5d0 [ 719.010378][T26718] ? lock_sock_nested+0x9a/0x120 [ 719.010387][T26718] ? sock_kmalloc+0xc6/0x120 [ 719.010403][T26718] sock_kmalloc+0xc6/0x120 [ 719.010431][T26718] hash_alloc_result.part.0+0x95/0x110 [ 719.020838][T26718] hash_sendpage+0x7b3/0x9e0 [ 719.030619][T26718] kernel_sendpage+0x95/0xf0 [ 719.030634][T26718] ? hash_sendmsg+0xad0/0xad0 [ 719.030649][T26718] sock_sendpage+0x8b/0xc0 [ 719.030663][T26718] ? lockdep_hardirqs_on+0x418/0x5d0 [ 719.030679][T26718] pipe_to_sendpage+0x299/0x370 [ 719.030694][T26718] ? kernel_sendpage+0xf0/0xf0 [ 719.030714][T26718] ? direct_splice_actor+0x1a0/0x1a0 [ 719.039445][T26718] ? __put_page+0x92/0xd0 [ 719.039463][T26718] ? anon_pipe_buf_release+0x1c6/0x270 [ 719.039483][T26718] __splice_from_pipe+0x395/0x7d0 [ 719.039497][T26718] ? direct_splice_actor+0x1a0/0x1a0 [ 719.039517][T26718] ? direct_splice_actor+0x1a0/0x1a0 [ 719.039537][T26718] splice_from_pipe+0x108/0x170 [ 719.049859][T26718] ? splice_shrink_spd+0xd0/0xd0 [ 719.049880][T26718] ? apparmor_file_permission+0x25/0x30 [ 719.049895][T26718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 05:07:15 executing program 4 (fault-call:6 fault-nth:26): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 719.049919][T26718] ? security_file_permission+0x94/0x380 [ 719.049939][T26718] generic_splice_sendpage+0x3c/0x50 [ 719.060622][T26718] ? splice_from_pipe+0x170/0x170 [ 719.060637][T26718] do_splice+0x70a/0x13c0 [ 719.060661][T26718] ? opipe_prep.part.0+0x2d0/0x2d0 [ 719.060678][T26718] ? __fget_light+0x1a9/0x230 [ 719.060696][T26718] __ia32_sys_splice+0x2c4/0x330 [ 719.060720][T26718] do_fast_syscall_32+0x281/0xc98 [ 719.070242][T26718] entry_SYSENTER_compat+0x70/0x7f [ 719.070255][T26718] RIP: 0023:0xf7fb8869 [ 719.070271][T26718] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 719.070279][T26718] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 719.070292][T26718] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 719.070301][T26718] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 05:07:15 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 719.070309][T26718] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 719.070325][T26718] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 719.080178][T26718] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 719.392968][T26724] FAULT_INJECTION: forcing a failure. [ 719.392968][T26724] name failslab, interval 1, probability 0, space 0, times 0 [ 719.414378][T26724] CPU: 1 PID: 26724 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 719.422310][T26724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.432391][T26724] Call Trace: [ 719.435701][T26724] dump_stack+0x172/0x1f0 [ 719.440052][T26724] should_fail.cold+0xa/0x15 [ 719.444783][T26724] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 719.450621][T26724] ? ___might_sleep+0x163/0x280 [ 719.455496][T26724] __should_failslab+0x121/0x190 [ 719.460471][T26724] should_failslab+0x9/0x14 [ 719.464989][T26724] __kmalloc+0x2dc/0x740 [ 719.469251][T26724] ? __local_bh_enable_ip+0x15a/0x270 [ 719.474638][T26724] ? lock_sock_nested+0xe2/0x120 [ 719.479584][T26724] ? __local_bh_enable_ip+0x15a/0x270 [ 719.484991][T26724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 719.490287][T26724] ? lock_sock_nested+0x9a/0x120 [ 719.495233][T26724] ? sock_kmalloc+0xc6/0x120 [ 719.499832][T26724] sock_kmalloc+0xc6/0x120 [ 719.504276][T26724] hash_alloc_result.part.0+0x95/0x110 [ 719.509753][T26724] hash_sendpage+0x7b3/0x9e0 [ 719.514369][T26724] kernel_sendpage+0x95/0xf0 [ 719.518948][T26724] ? hash_sendmsg+0xad0/0xad0 [ 719.523645][T26724] sock_sendpage+0x8b/0xc0 [ 719.528051][T26724] ? lockdep_hardirqs_on+0x418/0x5d0 [ 719.533327][T26724] pipe_to_sendpage+0x299/0x370 [ 719.538171][T26724] ? kernel_sendpage+0xf0/0xf0 [ 719.552385][T26724] ? direct_splice_actor+0x1a0/0x1a0 [ 719.557669][T26724] ? __put_page+0x92/0xd0 [ 719.562003][T26724] ? anon_pipe_buf_release+0x1c6/0x270 [ 719.568408][T26724] __splice_from_pipe+0x395/0x7d0 [ 719.573437][T26724] ? direct_splice_actor+0x1a0/0x1a0 [ 719.578738][T26724] ? direct_splice_actor+0x1a0/0x1a0 [ 719.584032][T26724] splice_from_pipe+0x108/0x170 [ 719.588873][T26724] ? splice_shrink_spd+0xd0/0xd0 [ 719.593818][T26724] ? apparmor_file_permission+0x25/0x30 [ 719.599354][T26724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.605693][T26724] ? security_file_permission+0x94/0x380 [ 719.611318][T26724] generic_splice_sendpage+0x3c/0x50 [ 719.616594][T26724] ? splice_from_pipe+0x170/0x170 [ 719.621614][T26724] do_splice+0x70a/0x13c0 [ 719.625942][T26724] ? opipe_prep.part.0+0x2d0/0x2d0 [ 719.631038][T26724] ? __fget_light+0x1a9/0x230 [ 719.635813][T26724] __ia32_sys_splice+0x2c4/0x330 [ 719.640742][T26724] do_fast_syscall_32+0x281/0xc98 [ 719.645757][T26724] entry_SYSENTER_compat+0x70/0x7f [ 719.650851][T26724] RIP: 0023:0xf7fe7869 [ 719.654951][T26724] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 719.674554][T26724] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 719.683063][T26724] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 719.691027][T26724] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 05:07:15 executing program 3 (fault-call:6 fault-nth:28): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 719.699016][T26724] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 719.706982][T26724] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 719.714954][T26724] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:16 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03\xd2\xa9[\x00', @ifru_flags=0x1}) 05:07:16 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:07:16 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:16 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8910, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 719.944204][T26732] FAULT_INJECTION: forcing a failure. [ 719.944204][T26732] name failslab, interval 1, probability 0, space 0, times 0 [ 719.963225][T26732] CPU: 0 PID: 26732 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 719.971188][T26732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.981346][T26732] Call Trace: [ 719.981376][T26732] dump_stack+0x172/0x1f0 [ 719.981395][T26732] should_fail.cold+0xa/0x15 [ 719.981419][T26732] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 719.981439][T26732] ? ___might_sleep+0x163/0x280 [ 719.981463][T26732] __should_failslab+0x121/0x190 [ 719.989097][T26732] should_failslab+0x9/0x14 [ 719.989113][T26732] __kmalloc+0x2dc/0x740 [ 719.989128][T26732] ? __local_bh_enable_ip+0x15a/0x270 [ 719.989143][T26732] ? lock_sock_nested+0xe2/0x120 [ 719.989156][T26732] ? __local_bh_enable_ip+0x15a/0x270 [ 719.989171][T26732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 719.989182][T26732] ? lock_sock_nested+0x9a/0x120 [ 719.989193][T26732] ? sock_kmalloc+0xc6/0x120 [ 719.989208][T26732] sock_kmalloc+0xc6/0x120 [ 719.989230][T26732] hash_alloc_result.part.0+0x95/0x110 [ 719.999638][T26732] hash_sendpage+0x7b3/0x9e0 [ 719.999660][T26732] kernel_sendpage+0x95/0xf0 [ 719.999674][T26732] ? hash_sendmsg+0xad0/0xad0 [ 719.999691][T26732] sock_sendpage+0x8b/0xc0 [ 719.999706][T26732] ? lockdep_hardirqs_on+0x418/0x5d0 [ 719.999723][T26732] pipe_to_sendpage+0x299/0x370 [ 719.999736][T26732] ? kernel_sendpage+0xf0/0xf0 05:07:16 executing program 4 (fault-call:6 fault-nth:27): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 719.999760][T26732] ? direct_splice_actor+0x1a0/0x1a0 [ 720.009547][T26732] ? __put_page+0x92/0xd0 [ 720.009566][T26732] ? anon_pipe_buf_release+0x1c6/0x270 [ 720.009586][T26732] __splice_from_pipe+0x395/0x7d0 [ 720.009602][T26732] ? direct_splice_actor+0x1a0/0x1a0 [ 720.009622][T26732] ? direct_splice_actor+0x1a0/0x1a0 [ 720.009635][T26732] splice_from_pipe+0x108/0x170 [ 720.009651][T26732] ? splice_shrink_spd+0xd0/0xd0 [ 720.009673][T26732] ? apparmor_file_permission+0x25/0x30 [ 720.018439][T26732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.018459][T26732] ? security_file_permission+0x94/0x380 [ 720.018481][T26732] generic_splice_sendpage+0x3c/0x50 [ 720.018495][T26732] ? splice_from_pipe+0x170/0x170 [ 720.018510][T26732] do_splice+0x70a/0x13c0 [ 720.018533][T26732] ? opipe_prep.part.0+0x2d0/0x2d0 [ 720.117434][T26732] ? __fget_light+0x1a9/0x230 [ 720.127597][T26732] __ia32_sys_splice+0x2c4/0x330 [ 720.127624][T26732] do_fast_syscall_32+0x281/0xc98 [ 720.127646][T26732] entry_SYSENTER_compat+0x70/0x7f [ 720.127658][T26732] RIP: 0023:0xf7fb8869 [ 720.127679][T26732] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 720.212435][T26750] FAULT_INJECTION: forcing a failure. [ 720.212435][T26750] name failslab, interval 1, probability 0, space 0, times 0 [ 720.213119][T26732] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 720.213135][T26732] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 720.213144][T26732] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 720.213153][T26732] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 720.213162][T26732] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 720.213170][T26732] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 720.276267][T26750] CPU: 1 PID: 26750 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 720.284180][T26750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.294242][T26750] Call Trace: [ 720.297559][T26750] dump_stack+0x172/0x1f0 [ 720.301917][T26750] should_fail.cold+0xa/0x15 [ 720.306555][T26750] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 720.312379][T26750] ? ___might_sleep+0x163/0x280 [ 720.317249][T26750] __should_failslab+0x121/0x190 [ 720.322289][T26750] should_failslab+0x9/0x14 [ 720.326812][T26750] __kmalloc+0x2dc/0x740 [ 720.331068][T26750] ? __local_bh_enable_ip+0x15a/0x270 [ 720.336447][T26750] ? lock_sock_nested+0xe2/0x120 [ 720.341489][T26750] ? __local_bh_enable_ip+0x15a/0x270 [ 720.346868][T26750] ? lockdep_hardirqs_on+0x418/0x5d0 [ 720.352313][T26750] ? lock_sock_nested+0x9a/0x120 [ 720.357266][T26750] ? sock_kmalloc+0xc6/0x120 [ 720.361870][T26750] sock_kmalloc+0xc6/0x120 [ 720.366309][T26750] hash_alloc_result.part.0+0x95/0x110 [ 720.371784][T26750] hash_sendpage+0x7b3/0x9e0 [ 720.376485][T26750] kernel_sendpage+0x95/0xf0 [ 720.381092][T26750] ? hash_sendmsg+0xad0/0xad0 [ 720.385807][T26750] sock_sendpage+0x8b/0xc0 [ 720.390496][T26750] ? lockdep_hardirqs_on+0x418/0x5d0 [ 720.396071][T26750] pipe_to_sendpage+0x299/0x370 [ 720.401208][T26750] ? kernel_sendpage+0xf0/0xf0 [ 720.406250][T26750] ? direct_splice_actor+0x1a0/0x1a0 [ 720.411554][T26750] ? __put_page+0x92/0xd0 [ 720.415903][T26750] ? anon_pipe_buf_release+0x1c6/0x270 [ 720.421387][T26750] __splice_from_pipe+0x395/0x7d0 [ 720.426446][T26750] ? direct_splice_actor+0x1a0/0x1a0 [ 720.431763][T26750] ? direct_splice_actor+0x1a0/0x1a0 [ 720.437082][T26750] splice_from_pipe+0x108/0x170 [ 720.441963][T26750] ? splice_shrink_spd+0xd0/0xd0 [ 720.446936][T26750] ? apparmor_file_permission+0x25/0x30 [ 720.452502][T26750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.458776][T26750] ? security_file_permission+0x94/0x380 [ 720.464437][T26750] generic_splice_sendpage+0x3c/0x50 [ 720.469735][T26750] ? splice_from_pipe+0x170/0x170 [ 720.474770][T26750] do_splice+0x70a/0x13c0 [ 720.479137][T26750] ? opipe_prep.part.0+0x2d0/0x2d0 [ 720.484362][T26750] ? __fget_light+0x1a9/0x230 [ 720.489065][T26750] __ia32_sys_splice+0x2c4/0x330 [ 720.494047][T26750] do_fast_syscall_32+0x281/0xc98 [ 720.499116][T26750] entry_SYSENTER_compat+0x70/0x7f [ 720.504240][T26750] RIP: 0023:0xf7fe7869 [ 720.508319][T26750] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 720.527950][T26750] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 720.536549][T26750] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 05:07:16 executing program 3 (fault-call:6 fault-nth:29): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 720.544533][T26750] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 720.552514][T26750] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 720.560494][T26750] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 720.568478][T26750] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 720.746048][T26754] FAULT_INJECTION: forcing a failure. [ 720.746048][T26754] name failslab, interval 1, probability 0, space 0, times 0 [ 720.765565][T26754] CPU: 0 PID: 26754 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 720.773499][T26754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.783589][T26754] Call Trace: [ 720.786899][T26754] dump_stack+0x172/0x1f0 [ 720.791275][T26754] should_fail.cold+0xa/0x15 [ 720.795878][T26754] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 720.801714][T26754] ? ___might_sleep+0x163/0x280 [ 720.806587][T26754] __should_failslab+0x121/0x190 [ 720.811545][T26754] should_failslab+0x9/0x14 [ 720.816090][T26754] __kmalloc+0x2dc/0x740 [ 720.820444][T26754] ? __local_bh_enable_ip+0x15a/0x270 [ 720.825830][T26754] ? lock_sock_nested+0xe2/0x120 [ 720.830780][T26754] ? __local_bh_enable_ip+0x15a/0x270 [ 720.836182][T26754] ? lockdep_hardirqs_on+0x418/0x5d0 [ 720.841487][T26754] ? lock_sock_nested+0x9a/0x120 [ 720.846442][T26754] ? sock_kmalloc+0xc6/0x120 [ 720.851050][T26754] sock_kmalloc+0xc6/0x120 [ 720.855498][T26754] hash_alloc_result.part.0+0x95/0x110 [ 720.860965][T26754] hash_sendpage+0x7b3/0x9e0 [ 720.865543][T26754] kernel_sendpage+0x95/0xf0 [ 720.870118][T26754] ? hash_sendmsg+0xad0/0xad0 [ 720.874783][T26754] sock_sendpage+0x8b/0xc0 [ 720.879184][T26754] ? lockdep_hardirqs_on+0x418/0x5d0 [ 720.884462][T26754] pipe_to_sendpage+0x299/0x370 [ 720.889304][T26754] ? kernel_sendpage+0xf0/0xf0 [ 720.894059][T26754] ? direct_splice_actor+0x1a0/0x1a0 [ 720.899823][T26754] ? __put_page+0x92/0xd0 [ 720.904145][T26754] ? anon_pipe_buf_release+0x1c6/0x270 [ 720.909683][T26754] __splice_from_pipe+0x395/0x7d0 [ 720.914699][T26754] ? direct_splice_actor+0x1a0/0x1a0 [ 720.919972][T26754] ? direct_splice_actor+0x1a0/0x1a0 [ 720.925279][T26754] splice_from_pipe+0x108/0x170 [ 720.930148][T26754] ? splice_shrink_spd+0xd0/0xd0 [ 720.935080][T26754] ? apparmor_file_permission+0x25/0x30 [ 720.940612][T26754] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.946863][T26754] ? security_file_permission+0x94/0x380 [ 720.952496][T26754] generic_splice_sendpage+0x3c/0x50 [ 720.957788][T26754] ? splice_from_pipe+0x170/0x170 [ 720.962803][T26754] do_splice+0x70a/0x13c0 [ 720.967130][T26754] ? opipe_prep.part.0+0x2d0/0x2d0 [ 720.972228][T26754] ? __fget_light+0x1a9/0x230 [ 720.976891][T26754] __ia32_sys_splice+0x2c4/0x330 [ 720.981838][T26754] do_fast_syscall_32+0x281/0xc98 [ 720.986850][T26754] entry_SYSENTER_compat+0x70/0x7f [ 720.991943][T26754] RIP: 0023:0xf7fb8869 [ 720.996016][T26754] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 721.015627][T26754] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 721.024027][T26754] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 721.031986][T26754] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 05:07:17 executing program 4 (fault-call:6 fault-nth:28): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 721.039964][T26754] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 721.048011][T26754] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 721.055988][T26754] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:17 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) [ 721.245773][T26759] FAULT_INJECTION: forcing a failure. [ 721.245773][T26759] name failslab, interval 1, probability 0, space 0, times 0 [ 721.276448][T26759] CPU: 1 PID: 26759 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 721.284743][T26759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.294899][T26759] Call Trace: [ 721.298243][T26759] dump_stack+0x172/0x1f0 [ 721.302605][T26759] should_fail.cold+0xa/0x15 [ 721.307231][T26759] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 721.313067][T26759] ? ___might_sleep+0x163/0x280 [ 721.317946][T26759] __should_failslab+0x121/0x190 [ 721.322899][T26759] should_failslab+0x9/0x14 [ 721.327397][T26759] __kmalloc+0x2dc/0x740 [ 721.331641][T26759] ? __local_bh_enable_ip+0x15a/0x270 [ 721.337016][T26759] ? lock_sock_nested+0xe2/0x120 [ 721.342031][T26759] ? __local_bh_enable_ip+0x15a/0x270 [ 721.347397][T26759] ? lockdep_hardirqs_on+0x418/0x5d0 [ 721.352685][T26759] ? lock_sock_nested+0x9a/0x120 [ 721.357620][T26759] ? sock_kmalloc+0xc6/0x120 [ 721.362199][T26759] sock_kmalloc+0xc6/0x120 [ 721.366617][T26759] hash_alloc_result.part.0+0x95/0x110 [ 721.372102][T26759] hash_sendpage+0x7b3/0x9e0 [ 721.376700][T26759] kernel_sendpage+0x95/0xf0 [ 721.381341][T26759] ? hash_sendmsg+0xad0/0xad0 [ 721.386012][T26759] sock_sendpage+0x8b/0xc0 [ 721.390430][T26759] ? lockdep_hardirqs_on+0x418/0x5d0 [ 721.395719][T26759] pipe_to_sendpage+0x299/0x370 [ 721.400564][T26759] ? kernel_sendpage+0xf0/0xf0 [ 721.405330][T26759] ? direct_splice_actor+0x1a0/0x1a0 [ 721.410659][T26759] ? __put_page+0x92/0xd0 [ 721.415006][T26759] ? anon_pipe_buf_release+0x1c6/0x270 [ 721.420469][T26759] __splice_from_pipe+0x395/0x7d0 [ 721.425482][T26759] ? direct_splice_actor+0x1a0/0x1a0 [ 721.430864][T26759] ? direct_splice_actor+0x1a0/0x1a0 [ 721.436164][T26759] splice_from_pipe+0x108/0x170 [ 721.441081][T26759] ? splice_shrink_spd+0xd0/0xd0 [ 721.446026][T26759] ? apparmor_file_permission+0x25/0x30 [ 721.451594][T26759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.457844][T26759] ? security_file_permission+0x94/0x380 [ 721.463567][T26759] generic_splice_sendpage+0x3c/0x50 [ 721.468859][T26759] ? splice_from_pipe+0x170/0x170 [ 721.473902][T26759] do_splice+0x70a/0x13c0 [ 721.478261][T26759] ? opipe_prep.part.0+0x2d0/0x2d0 [ 721.483378][T26759] ? __fget_light+0x1a9/0x230 [ 721.488065][T26759] __ia32_sys_splice+0x2c4/0x330 [ 721.493011][T26759] do_fast_syscall_32+0x281/0xc98 [ 721.498041][T26759] entry_SYSENTER_compat+0x70/0x7f [ 721.503138][T26759] RIP: 0023:0xf7fe7869 [ 721.507195][T26759] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 721.526964][T26759] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 721.535402][T26759] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 05:07:17 executing program 3 (fault-call:6 fault-nth:30): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 721.543396][T26759] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 721.551374][T26759] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 721.559351][T26759] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 721.568091][T26759] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 721.736573][T26767] FAULT_INJECTION: forcing a failure. [ 721.736573][T26767] name failslab, interval 1, probability 0, space 0, times 0 [ 721.756885][T26767] CPU: 1 PID: 26767 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 721.764810][T26767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.774877][T26767] Call Trace: [ 721.778188][T26767] dump_stack+0x172/0x1f0 [ 721.782517][T26767] should_fail.cold+0xa/0x15 [ 721.787096][T26767] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 721.792895][T26767] ? ___might_sleep+0x163/0x280 [ 721.797742][T26767] __should_failslab+0x121/0x190 [ 721.802667][T26767] should_failslab+0x9/0x14 [ 721.807152][T26767] __kmalloc+0x2dc/0x740 [ 721.811380][T26767] ? __local_bh_enable_ip+0x15a/0x270 [ 721.816740][T26767] ? lock_sock_nested+0xe2/0x120 [ 721.821660][T26767] ? __local_bh_enable_ip+0x15a/0x270 [ 721.827040][T26767] ? lockdep_hardirqs_on+0x418/0x5d0 [ 721.832309][T26767] ? lock_sock_nested+0x9a/0x120 [ 721.837225][T26767] ? sock_kmalloc+0xc6/0x120 [ 721.841798][T26767] sock_kmalloc+0xc6/0x120 [ 721.846222][T26767] hash_alloc_result.part.0+0x95/0x110 [ 721.851676][T26767] hash_sendpage+0x7b3/0x9e0 [ 721.856277][T26767] kernel_sendpage+0x95/0xf0 [ 721.860960][T26767] ? hash_sendmsg+0xad0/0xad0 [ 721.865621][T26767] sock_sendpage+0x8b/0xc0 [ 721.870049][T26767] ? lockdep_hardirqs_on+0x418/0x5d0 [ 721.875326][T26767] pipe_to_sendpage+0x299/0x370 [ 721.880189][T26767] ? kernel_sendpage+0xf0/0xf0 [ 721.884935][T26767] ? direct_splice_actor+0x1a0/0x1a0 [ 721.890200][T26767] ? __put_page+0x92/0xd0 [ 721.894510][T26767] ? anon_pipe_buf_release+0x1c6/0x270 [ 721.899951][T26767] __splice_from_pipe+0x395/0x7d0 [ 721.904978][T26767] ? direct_splice_actor+0x1a0/0x1a0 [ 721.910247][T26767] ? direct_splice_actor+0x1a0/0x1a0 [ 721.915541][T26767] splice_from_pipe+0x108/0x170 [ 721.920377][T26767] ? splice_shrink_spd+0xd0/0xd0 [ 721.925300][T26767] ? apparmor_file_permission+0x25/0x30 [ 721.930846][T26767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.937080][T26767] ? security_file_permission+0x94/0x380 [ 721.942718][T26767] generic_splice_sendpage+0x3c/0x50 [ 721.948006][T26767] ? splice_from_pipe+0x170/0x170 [ 721.953015][T26767] do_splice+0x70a/0x13c0 [ 721.957336][T26767] ? opipe_prep.part.0+0x2d0/0x2d0 [ 721.962432][T26767] ? __fget_light+0x1a9/0x230 [ 721.967115][T26767] __ia32_sys_splice+0x2c4/0x330 [ 721.972062][T26767] do_fast_syscall_32+0x281/0xc98 [ 721.977077][T26767] entry_SYSENTER_compat+0x70/0x7f [ 721.982190][T26767] RIP: 0023:0xf7fb8869 [ 721.986271][T26767] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 722.005884][T26767] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 722.014298][T26767] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 722.022279][T26767] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 722.030259][T26767] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:07:18 executing program 4 (fault-call:6 fault-nth:29): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 722.038240][T26767] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 722.046211][T26767] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:18 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:18 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8911, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:18 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x01\xd8\xa9[\x00', @ifru_flags=0x1}) 05:07:18 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) [ 722.258428][T26772] FAULT_INJECTION: forcing a failure. [ 722.258428][T26772] name failslab, interval 1, probability 0, space 0, times 0 [ 722.292227][T26772] CPU: 0 PID: 26772 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 722.300179][T26772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.310244][T26772] Call Trace: [ 722.313552][T26772] dump_stack+0x172/0x1f0 [ 722.317895][T26772] should_fail.cold+0xa/0x15 [ 722.322497][T26772] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 722.328316][T26772] ? ___might_sleep+0x163/0x280 [ 722.328338][T26772] __should_failslab+0x121/0x190 [ 722.328358][T26772] should_failslab+0x9/0x14 [ 722.328374][T26772] __kmalloc+0x2dc/0x740 [ 722.328390][T26772] ? __local_bh_enable_ip+0x15a/0x270 [ 722.328420][T26772] ? lock_sock_nested+0xe2/0x120 [ 722.338226][T26772] ? __local_bh_enable_ip+0x15a/0x270 [ 722.338245][T26772] ? lockdep_hardirqs_on+0x418/0x5d0 [ 722.338260][T26772] ? lock_sock_nested+0x9a/0x120 [ 722.338272][T26772] ? sock_kmalloc+0xc6/0x120 [ 722.338290][T26772] sock_kmalloc+0xc6/0x120 [ 722.338312][T26772] hash_alloc_result.part.0+0x95/0x110 [ 722.338328][T26772] hash_sendpage+0x7b3/0x9e0 [ 722.338350][T26772] kernel_sendpage+0x95/0xf0 [ 722.347276][T26772] ? hash_sendmsg+0xad0/0xad0 [ 722.347298][T26772] sock_sendpage+0x8b/0xc0 [ 722.347315][T26772] ? lockdep_hardirqs_on+0x418/0x5d0 [ 722.347334][T26772] pipe_to_sendpage+0x299/0x370 [ 722.347349][T26772] ? kernel_sendpage+0xf0/0xf0 [ 722.347374][T26772] ? direct_splice_actor+0x1a0/0x1a0 [ 722.357698][T26772] ? __put_page+0x92/0xd0 [ 722.357717][T26772] ? anon_pipe_buf_release+0x1c6/0x270 [ 722.357737][T26772] __splice_from_pipe+0x395/0x7d0 [ 722.357753][T26772] ? direct_splice_actor+0x1a0/0x1a0 [ 722.357776][T26772] ? direct_splice_actor+0x1a0/0x1a0 [ 722.357791][T26772] splice_from_pipe+0x108/0x170 [ 722.357808][T26772] ? splice_shrink_spd+0xd0/0xd0 [ 722.357831][T26772] ? apparmor_file_permission+0x25/0x30 [ 722.368478][T26772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.368497][T26772] ? security_file_permission+0x94/0x380 [ 722.368519][T26772] generic_splice_sendpage+0x3c/0x50 [ 722.368533][T26772] ? splice_from_pipe+0x170/0x170 [ 722.368550][T26772] do_splice+0x70a/0x13c0 [ 722.368574][T26772] ? opipe_prep.part.0+0x2d0/0x2d0 [ 722.368597][T26772] ? __fget_light+0x1a9/0x230 [ 722.378130][T26772] __ia32_sys_splice+0x2c4/0x330 05:07:18 executing program 3 (fault-call:6 fault-nth:31): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 722.378157][T26772] do_fast_syscall_32+0x281/0xc98 [ 722.378181][T26772] entry_SYSENTER_compat+0x70/0x7f [ 722.378193][T26772] RIP: 0023:0xf7fe7869 [ 722.378208][T26772] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 722.378216][T26772] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 722.388094][T26772] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 722.388102][T26772] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 722.388109][T26772] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 722.388116][T26772] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 722.388125][T26772] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 722.574746][T26791] FAULT_INJECTION: forcing a failure. [ 722.574746][T26791] name failslab, interval 1, probability 0, space 0, times 0 [ 722.614087][T26791] CPU: 0 PID: 26791 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 722.614104][T26791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.632134][T26791] Call Trace: [ 722.632159][T26791] dump_stack+0x172/0x1f0 [ 722.632180][T26791] should_fail.cold+0xa/0x15 [ 722.632200][T26791] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 722.632222][T26791] ? ___might_sleep+0x163/0x280 [ 722.632241][T26791] __should_failslab+0x121/0x190 [ 722.632260][T26791] should_failslab+0x9/0x14 [ 722.632282][T26791] __kmalloc+0x2dc/0x740 [ 722.639897][T26791] ? __local_bh_enable_ip+0x15a/0x270 [ 722.639910][T26791] ? lock_sock_nested+0xe2/0x120 [ 722.639924][T26791] ? __local_bh_enable_ip+0x15a/0x270 [ 722.639942][T26791] ? lockdep_hardirqs_on+0x418/0x5d0 [ 722.639956][T26791] ? lock_sock_nested+0x9a/0x120 [ 722.639967][T26791] ? sock_kmalloc+0xc6/0x120 [ 722.639983][T26791] sock_kmalloc+0xc6/0x120 [ 722.640007][T26791] hash_alloc_result.part.0+0x95/0x110 [ 722.650401][T26791] hash_sendpage+0x7b3/0x9e0 [ 722.650433][T26791] kernel_sendpage+0x95/0xf0 [ 722.650447][T26791] ? hash_sendmsg+0xad0/0xad0 [ 722.650463][T26791] sock_sendpage+0x8b/0xc0 [ 722.650477][T26791] ? lockdep_hardirqs_on+0x418/0x5d0 [ 722.650495][T26791] pipe_to_sendpage+0x299/0x370 [ 722.650515][T26791] ? kernel_sendpage+0xf0/0xf0 [ 722.743547][T26791] ? direct_splice_actor+0x1a0/0x1a0 [ 722.748818][T26791] ? __put_page+0x92/0xd0 [ 722.753134][T26791] ? anon_pipe_buf_release+0x1c6/0x270 [ 722.758613][T26791] __splice_from_pipe+0x395/0x7d0 [ 722.763645][T26791] ? direct_splice_actor+0x1a0/0x1a0 [ 722.768927][T26791] ? direct_splice_actor+0x1a0/0x1a0 [ 722.774206][T26791] splice_from_pipe+0x108/0x170 [ 722.779054][T26791] ? splice_shrink_spd+0xd0/0xd0 [ 722.783994][T26791] ? apparmor_file_permission+0x25/0x30 [ 722.789524][T26791] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.795775][T26791] ? security_file_permission+0x94/0x380 [ 722.801396][T26791] generic_splice_sendpage+0x3c/0x50 [ 722.806666][T26791] ? splice_from_pipe+0x170/0x170 [ 722.811678][T26791] do_splice+0x70a/0x13c0 [ 722.815997][T26791] ? opipe_prep.part.0+0x2d0/0x2d0 [ 722.821106][T26791] ? __fget_light+0x1a9/0x230 [ 722.825793][T26791] __ia32_sys_splice+0x2c4/0x330 [ 722.830717][T26791] do_fast_syscall_32+0x281/0xc98 [ 722.835739][T26791] entry_SYSENTER_compat+0x70/0x7f [ 722.840853][T26791] RIP: 0023:0xf7fb8869 [ 722.844903][T26791] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 722.864510][T26791] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 722.872938][T26791] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 722.880914][T26791] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 722.888872][T26791] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 722.897183][T26791] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 05:07:19 executing program 4 (fault-call:6 fault-nth:30): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 722.905166][T26791] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 723.061399][T26796] FAULT_INJECTION: forcing a failure. [ 723.061399][T26796] name failslab, interval 1, probability 0, space 0, times 0 [ 723.074628][T26796] CPU: 0 PID: 26796 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 723.082528][T26796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.092591][T26796] Call Trace: [ 723.095894][T26796] dump_stack+0x172/0x1f0 [ 723.100236][T26796] should_fail.cold+0xa/0x15 [ 723.104837][T26796] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 723.110659][T26796] ? ___might_sleep+0x163/0x280 [ 723.115605][T26796] __should_failslab+0x121/0x190 [ 723.120560][T26796] should_failslab+0x9/0x14 [ 723.125071][T26796] __kmalloc+0x2dc/0x740 [ 723.129319][T26796] ? __local_bh_enable_ip+0x15a/0x270 [ 723.134681][T26796] ? lock_sock_nested+0xe2/0x120 [ 723.139614][T26796] ? __local_bh_enable_ip+0x15a/0x270 [ 723.144984][T26796] ? lockdep_hardirqs_on+0x418/0x5d0 [ 723.150248][T26796] ? lock_sock_nested+0x9a/0x120 [ 723.155166][T26796] ? sock_kmalloc+0xc6/0x120 [ 723.159752][T26796] sock_kmalloc+0xc6/0x120 [ 723.164199][T26796] hash_alloc_result.part.0+0x95/0x110 [ 723.169639][T26796] hash_sendpage+0x7b3/0x9e0 [ 723.174217][T26796] kernel_sendpage+0x95/0xf0 [ 723.178789][T26796] ? hash_sendmsg+0xad0/0xad0 [ 723.183643][T26796] sock_sendpage+0x8b/0xc0 [ 723.188040][T26796] ? lockdep_hardirqs_on+0x418/0x5d0 [ 723.193313][T26796] pipe_to_sendpage+0x299/0x370 [ 723.198160][T26796] ? kernel_sendpage+0xf0/0xf0 [ 723.202934][T26796] ? direct_splice_actor+0x1a0/0x1a0 [ 723.208225][T26796] ? __put_page+0x92/0xd0 [ 723.212546][T26796] ? anon_pipe_buf_release+0x1c6/0x270 [ 723.217986][T26796] __splice_from_pipe+0x395/0x7d0 [ 723.222989][T26796] ? direct_splice_actor+0x1a0/0x1a0 [ 723.228263][T26796] ? direct_splice_actor+0x1a0/0x1a0 [ 723.233552][T26796] splice_from_pipe+0x108/0x170 [ 723.238388][T26796] ? splice_shrink_spd+0xd0/0xd0 [ 723.243318][T26796] ? apparmor_file_permission+0x25/0x30 [ 723.248846][T26796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.255070][T26796] ? security_file_permission+0x94/0x380 [ 723.260752][T26796] generic_splice_sendpage+0x3c/0x50 [ 723.266023][T26796] ? splice_from_pipe+0x170/0x170 [ 723.271038][T26796] do_splice+0x70a/0x13c0 [ 723.275360][T26796] ? opipe_prep.part.0+0x2d0/0x2d0 [ 723.280469][T26796] ? __fget_light+0x1a9/0x230 [ 723.285132][T26796] __ia32_sys_splice+0x2c4/0x330 [ 723.290060][T26796] do_fast_syscall_32+0x281/0xc98 [ 723.295100][T26796] entry_SYSENTER_compat+0x70/0x7f [ 723.300192][T26796] RIP: 0023:0xf7fe7869 [ 723.304246][T26796] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 723.323833][T26796] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 723.332225][T26796] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 723.340284][T26796] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 723.348237][T26796] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:07:19 executing program 3 (fault-call:6 fault-nth:32): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 723.356202][T26796] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 723.364157][T26796] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 723.524343][T26800] FAULT_INJECTION: forcing a failure. [ 723.524343][T26800] name failslab, interval 1, probability 0, space 0, times 0 [ 723.537501][T26800] CPU: 0 PID: 26800 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 723.545416][T26800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.555479][T26800] Call Trace: [ 723.558789][T26800] dump_stack+0x172/0x1f0 [ 723.563129][T26800] should_fail.cold+0xa/0x15 [ 723.569193][T26800] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 723.575018][T26800] ? ___might_sleep+0x163/0x280 [ 723.579881][T26800] __should_failslab+0x121/0x190 [ 723.584828][T26800] should_failslab+0x9/0x14 [ 723.589337][T26800] __kmalloc+0x2dc/0x740 [ 723.593586][T26800] ? __local_bh_enable_ip+0x15a/0x270 [ 723.598962][T26800] ? lock_sock_nested+0xe2/0x120 [ 723.603907][T26800] ? __local_bh_enable_ip+0x15a/0x270 [ 723.609293][T26800] ? lockdep_hardirqs_on+0x418/0x5d0 [ 723.614630][T26800] ? lock_sock_nested+0x9a/0x120 [ 723.619580][T26800] ? sock_kmalloc+0xc6/0x120 [ 723.624171][T26800] sock_kmalloc+0xc6/0x120 [ 723.628591][T26800] hash_alloc_result.part.0+0x95/0x110 [ 723.634051][T26800] hash_sendpage+0x7b3/0x9e0 [ 723.638645][T26800] kernel_sendpage+0x95/0xf0 [ 723.643222][T26800] ? hash_sendmsg+0xad0/0xad0 [ 723.647904][T26800] sock_sendpage+0x8b/0xc0 [ 723.652321][T26800] ? lockdep_hardirqs_on+0x418/0x5d0 [ 723.657609][T26800] pipe_to_sendpage+0x299/0x370 [ 723.662455][T26800] ? kernel_sendpage+0xf0/0xf0 [ 723.667225][T26800] ? direct_splice_actor+0x1a0/0x1a0 [ 723.672493][T26800] ? __put_page+0x92/0xd0 [ 723.676813][T26800] ? anon_pipe_buf_release+0x1c6/0x270 [ 723.682279][T26800] __splice_from_pipe+0x395/0x7d0 [ 723.687301][T26800] ? direct_splice_actor+0x1a0/0x1a0 [ 723.692616][T26800] ? direct_splice_actor+0x1a0/0x1a0 [ 723.697911][T26800] splice_from_pipe+0x108/0x170 [ 723.702751][T26800] ? splice_shrink_spd+0xd0/0xd0 [ 723.707691][T26800] ? apparmor_file_permission+0x25/0x30 [ 723.713253][T26800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.719497][T26800] ? security_file_permission+0x94/0x380 [ 723.725116][T26800] generic_splice_sendpage+0x3c/0x50 [ 723.730385][T26800] ? splice_from_pipe+0x170/0x170 [ 723.735434][T26800] do_splice+0x70a/0x13c0 [ 723.739776][T26800] ? opipe_prep.part.0+0x2d0/0x2d0 [ 723.744883][T26800] ? __fget_light+0x1a9/0x230 [ 723.749551][T26800] __ia32_sys_splice+0x2c4/0x330 [ 723.754486][T26800] do_fast_syscall_32+0x281/0xc98 [ 723.759523][T26800] entry_SYSENTER_compat+0x70/0x7f [ 723.764748][T26800] RIP: 0023:0xf7fb8869 [ 723.768799][T26800] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 723.788422][T26800] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 723.796932][T26800] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 723.804960][T26800] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 723.813011][T26800] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:07:20 executing program 4 (fault-call:6 fault-nth:31): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 723.821244][T26800] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 723.829221][T26800] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 723.980071][T26804] FAULT_INJECTION: forcing a failure. [ 723.980071][T26804] name failslab, interval 1, probability 0, space 0, times 0 [ 723.996814][T26804] CPU: 0 PID: 26804 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 724.004722][T26804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.014782][T26804] Call Trace: [ 724.018267][T26804] dump_stack+0x172/0x1f0 [ 724.022721][T26804] should_fail.cold+0xa/0x15 [ 724.027322][T26804] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 724.033117][T26804] ? ___might_sleep+0x163/0x280 [ 724.037952][T26804] __should_failslab+0x121/0x190 [ 724.043376][T26804] should_failslab+0x9/0x14 [ 724.048221][T26804] __kmalloc+0x2dc/0x740 [ 724.053260][T26804] ? __local_bh_enable_ip+0x15a/0x270 [ 724.058657][T26804] ? lock_sock_nested+0xe2/0x120 [ 724.063792][T26804] ? __local_bh_enable_ip+0x15a/0x270 [ 724.069196][T26804] ? lockdep_hardirqs_on+0x418/0x5d0 [ 724.074565][T26804] ? lock_sock_nested+0x9a/0x120 [ 724.079497][T26804] ? sock_kmalloc+0xc6/0x120 [ 724.084186][T26804] sock_kmalloc+0xc6/0x120 [ 724.088609][T26804] hash_alloc_result.part.0+0x95/0x110 [ 724.094054][T26804] hash_sendpage+0x7b3/0x9e0 [ 724.098638][T26804] kernel_sendpage+0x95/0xf0 [ 724.103371][T26804] ? hash_sendmsg+0xad0/0xad0 [ 724.108039][T26804] sock_sendpage+0x8b/0xc0 [ 724.112555][T26804] ? lockdep_hardirqs_on+0x418/0x5d0 [ 724.118386][T26804] pipe_to_sendpage+0x299/0x370 [ 724.123269][T26804] ? kernel_sendpage+0xf0/0xf0 [ 724.128170][T26804] ? direct_splice_actor+0x1a0/0x1a0 [ 724.133608][T26804] ? __put_page+0x92/0xd0 [ 724.138336][T26804] ? anon_pipe_buf_release+0x1c6/0x270 [ 724.143998][T26804] __splice_from_pipe+0x395/0x7d0 [ 724.149023][T26804] ? direct_splice_actor+0x1a0/0x1a0 [ 724.154312][T26804] ? direct_splice_actor+0x1a0/0x1a0 [ 724.159599][T26804] splice_from_pipe+0x108/0x170 [ 724.164468][T26804] ? splice_shrink_spd+0xd0/0xd0 [ 724.169434][T26804] ? apparmor_file_permission+0x25/0x30 [ 724.175000][T26804] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.181254][T26804] ? security_file_permission+0x94/0x380 [ 724.186887][T26804] generic_splice_sendpage+0x3c/0x50 [ 724.192245][T26804] ? splice_from_pipe+0x170/0x170 [ 724.197268][T26804] do_splice+0x70a/0x13c0 [ 724.201614][T26804] ? opipe_prep.part.0+0x2d0/0x2d0 [ 724.206761][T26804] ? __fget_light+0x1a9/0x230 [ 724.211458][T26804] __ia32_sys_splice+0x2c4/0x330 [ 724.216426][T26804] do_fast_syscall_32+0x281/0xc98 [ 724.221450][T26804] entry_SYSENTER_compat+0x70/0x7f [ 724.226549][T26804] RIP: 0023:0xf7fe7869 [ 724.230603][T26804] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 724.250195][T26804] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 724.258618][T26804] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 724.266603][T26804] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 05:07:20 executing program 3 (fault-call:6 fault-nth:33): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:20 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) [ 724.274568][T26804] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 724.282528][T26804] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 724.290608][T26804] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:20 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:20 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8912, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:20 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03\xd8\xa9[\x00', @ifru_flags=0x1}) 05:07:20 executing program 4 (fault-call:6 fault-nth:32): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 724.695751][T26818] FAULT_INJECTION: forcing a failure. [ 724.695751][T26818] name failslab, interval 1, probability 0, space 0, times 0 [ 724.759757][T26818] CPU: 0 PID: 26818 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 724.767796][T26818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.777888][T26818] Call Trace: [ 724.781201][T26818] dump_stack+0x172/0x1f0 [ 724.785548][T26818] should_fail.cold+0xa/0x15 [ 724.790167][T26818] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 724.795996][T26818] ? ___might_sleep+0x163/0x280 [ 724.800875][T26818] __should_failslab+0x121/0x190 [ 724.805829][T26818] should_failslab+0x9/0x14 [ 724.810346][T26818] __kmalloc+0x2dc/0x740 [ 724.814595][T26818] ? __local_bh_enable_ip+0x15a/0x270 [ 724.819985][T26818] ? lock_sock_nested+0xe2/0x120 [ 724.824932][T26818] ? __local_bh_enable_ip+0x15a/0x270 [ 724.830318][T26818] ? lockdep_hardirqs_on+0x418/0x5d0 [ 724.835616][T26818] ? lock_sock_nested+0x9a/0x120 [ 724.840559][T26818] ? sock_kmalloc+0xc6/0x120 [ 724.845165][T26818] sock_kmalloc+0xc6/0x120 [ 724.849605][T26818] hash_alloc_result.part.0+0x95/0x110 [ 724.855077][T26818] hash_sendpage+0x7b3/0x9e0 [ 724.858474][T26828] FAULT_INJECTION: forcing a failure. [ 724.858474][T26828] name failslab, interval 1, probability 0, space 0, times 0 [ 724.859683][T26818] kernel_sendpage+0x95/0xf0 [ 724.859698][T26818] ? hash_sendmsg+0xad0/0xad0 [ 724.859716][T26818] sock_sendpage+0x8b/0xc0 [ 724.859732][T26818] ? lockdep_hardirqs_on+0x418/0x5d0 [ 724.859752][T26818] pipe_to_sendpage+0x299/0x370 [ 724.859767][T26818] ? kernel_sendpage+0xf0/0xf0 [ 724.859789][T26818] ? direct_splice_actor+0x1a0/0x1a0 [ 724.906220][T26818] ? __put_page+0x92/0xd0 [ 724.910558][T26818] ? anon_pipe_buf_release+0x1c6/0x270 [ 724.916026][T26818] __splice_from_pipe+0x395/0x7d0 [ 724.921062][T26818] ? direct_splice_actor+0x1a0/0x1a0 [ 724.926362][T26818] ? direct_splice_actor+0x1a0/0x1a0 [ 724.931653][T26818] splice_from_pipe+0x108/0x170 [ 724.936549][T26818] ? splice_shrink_spd+0xd0/0xd0 [ 724.941506][T26818] ? apparmor_file_permission+0x25/0x30 [ 724.947086][T26818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.953350][T26818] ? security_file_permission+0x94/0x380 [ 724.960395][T26818] generic_splice_sendpage+0x3c/0x50 [ 724.965694][T26818] ? splice_from_pipe+0x170/0x170 [ 724.970725][T26818] do_splice+0x70a/0x13c0 [ 724.975067][T26818] ? opipe_prep.part.0+0x2d0/0x2d0 [ 724.980188][T26818] ? __fget_light+0x1a9/0x230 [ 724.984879][T26818] __ia32_sys_splice+0x2c4/0x330 [ 724.989832][T26818] do_fast_syscall_32+0x281/0xc98 [ 724.994876][T26818] entry_SYSENTER_compat+0x70/0x7f [ 724.999994][T26818] RIP: 0023:0xf7fb8869 [ 725.004072][T26818] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 725.023686][T26818] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 725.032106][T26818] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 725.040190][T26818] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 725.048172][T26818] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 725.056153][T26818] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 725.064128][T26818] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 725.072141][T26828] CPU: 1 PID: 26828 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 725.080048][T26828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.090134][T26828] Call Trace: [ 725.093440][T26828] dump_stack+0x172/0x1f0 [ 725.097775][T26828] should_fail.cold+0xa/0x15 [ 725.102373][T26828] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 725.108214][T26828] ? ___might_sleep+0x163/0x280 [ 725.113165][T26828] __should_failslab+0x121/0x190 [ 725.118109][T26828] should_failslab+0x9/0x14 [ 725.122623][T26828] __kmalloc+0x2dc/0x740 [ 725.126872][T26828] ? __local_bh_enable_ip+0x15a/0x270 [ 725.132261][T26828] ? lock_sock_nested+0xe2/0x120 [ 725.137223][T26828] ? __local_bh_enable_ip+0x15a/0x270 [ 725.142608][T26828] ? lockdep_hardirqs_on+0x418/0x5d0 [ 725.147894][T26828] ? lock_sock_nested+0x9a/0x120 [ 725.152820][T26828] ? sock_kmalloc+0xc6/0x120 [ 725.157398][T26828] sock_kmalloc+0xc6/0x120 [ 725.161828][T26828] hash_alloc_result.part.0+0x95/0x110 [ 725.167305][T26828] hash_sendpage+0x7b3/0x9e0 [ 725.171916][T26828] kernel_sendpage+0x95/0xf0 [ 725.176524][T26828] ? hash_sendmsg+0xad0/0xad0 [ 725.181205][T26828] sock_sendpage+0x8b/0xc0 [ 725.185623][T26828] ? lockdep_hardirqs_on+0x418/0x5d0 [ 725.190903][T26828] pipe_to_sendpage+0x299/0x370 [ 725.195756][T26828] ? kernel_sendpage+0xf0/0xf0 [ 725.200530][T26828] ? direct_splice_actor+0x1a0/0x1a0 [ 725.205820][T26828] ? __put_page+0x92/0xd0 [ 725.210165][T26828] ? anon_pipe_buf_release+0x1c6/0x270 [ 725.215625][T26828] __splice_from_pipe+0x395/0x7d0 [ 725.220659][T26828] ? direct_splice_actor+0x1a0/0x1a0 [ 725.225951][T26828] ? direct_splice_actor+0x1a0/0x1a0 [ 725.231235][T26828] splice_from_pipe+0x108/0x170 [ 725.236079][T26828] ? splice_shrink_spd+0xd0/0xd0 [ 725.241034][T26828] ? apparmor_file_permission+0x25/0x30 [ 725.246582][T26828] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.252838][T26828] ? security_file_permission+0x94/0x380 [ 725.258466][T26828] generic_splice_sendpage+0x3c/0x50 [ 725.263760][T26828] ? splice_from_pipe+0x170/0x170 [ 725.268799][T26828] do_splice+0x70a/0x13c0 [ 725.273134][T26828] ? opipe_prep.part.0+0x2d0/0x2d0 [ 725.278240][T26828] ? __fget_light+0x1a9/0x230 [ 725.282947][T26828] __ia32_sys_splice+0x2c4/0x330 [ 725.287905][T26828] do_fast_syscall_32+0x281/0xc98 [ 725.292958][T26828] entry_SYSENTER_compat+0x70/0x7f [ 725.298074][T26828] RIP: 0023:0xf7fe7869 [ 725.302144][T26828] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 725.321755][T26828] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 725.330168][T26828] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 725.338139][T26828] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 725.346102][T26828] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 725.354063][T26828] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 725.362043][T26828] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:21 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:07:21 executing program 3 (fault-call:6 fault-nth:34): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:21 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:21 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:21 executing program 4 (fault-call:6 fault-nth:33): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 725.635349][T26837] FAULT_INJECTION: forcing a failure. [ 725.635349][T26837] name failslab, interval 1, probability 0, space 0, times 0 [ 725.655996][T26837] CPU: 1 PID: 26837 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 725.663948][T26837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 725.674040][T26837] Call Trace: [ 725.677349][T26837] dump_stack+0x172/0x1f0 [ 725.681698][T26837] should_fail.cold+0xa/0x15 [ 725.686309][T26837] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 725.692139][T26837] ? ___might_sleep+0x163/0x280 [ 725.697026][T26837] __should_failslab+0x121/0x190 [ 725.701981][T26837] should_failslab+0x9/0x14 [ 725.706507][T26837] __kmalloc+0x2dc/0x740 [ 725.710762][T26837] ? __local_bh_enable_ip+0x15a/0x270 [ 725.716151][T26837] ? lock_sock_nested+0xe2/0x120 [ 725.721097][T26837] ? __local_bh_enable_ip+0x15a/0x270 [ 725.726484][T26837] ? lockdep_hardirqs_on+0x418/0x5d0 [ 725.731786][T26837] ? lock_sock_nested+0x9a/0x120 [ 725.736991][T26837] ? sock_kmalloc+0xc6/0x120 [ 725.741685][T26837] sock_kmalloc+0xc6/0x120 [ 725.746122][T26837] hash_alloc_result.part.0+0x95/0x110 [ 725.751595][T26837] hash_sendpage+0x7b3/0x9e0 [ 725.756201][T26837] kernel_sendpage+0x95/0xf0 [ 725.760796][T26837] ? hash_sendmsg+0xad0/0xad0 [ 725.765488][T26837] sock_sendpage+0x8b/0xc0 [ 725.769923][T26837] ? lockdep_hardirqs_on+0x418/0x5d0 [ 725.775231][T26837] pipe_to_sendpage+0x299/0x370 [ 725.780095][T26837] ? kernel_sendpage+0xf0/0xf0 [ 725.784885][T26837] ? direct_splice_actor+0x1a0/0x1a0 [ 725.790194][T26837] ? __put_page+0x92/0xd0 [ 725.794545][T26837] ? anon_pipe_buf_release+0x1c6/0x270 [ 725.800056][T26837] __splice_from_pipe+0x395/0x7d0 [ 725.805110][T26837] ? direct_splice_actor+0x1a0/0x1a0 [ 725.810425][T26837] ? direct_splice_actor+0x1a0/0x1a0 [ 725.815725][T26837] splice_from_pipe+0x108/0x170 [ 725.820596][T26837] ? splice_shrink_spd+0xd0/0xd0 [ 725.825565][T26837] ? apparmor_file_permission+0x25/0x30 [ 725.831132][T26837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.837395][T26837] ? security_file_permission+0x94/0x380 [ 725.843049][T26837] generic_splice_sendpage+0x3c/0x50 [ 725.848360][T26837] ? splice_from_pipe+0x170/0x170 [ 725.853402][T26837] do_splice+0x70a/0x13c0 [ 725.857762][T26837] ? opipe_prep.part.0+0x2d0/0x2d0 [ 725.862880][T26837] ? __fget_light+0x1a9/0x230 [ 725.867554][T26837] __ia32_sys_splice+0x2c4/0x330 [ 725.872507][T26837] do_fast_syscall_32+0x281/0xc98 [ 725.877543][T26837] entry_SYSENTER_compat+0x70/0x7f [ 725.882772][T26837] RIP: 0023:0xf7fb8869 [ 725.886831][T26837] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 725.906437][T26837] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 725.914887][T26837] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 725.922885][T26837] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 725.930873][T26837] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 725.938885][T26837] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 725.946898][T26837] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 726.021296][T26849] FAULT_INJECTION: forcing a failure. [ 726.021296][T26849] name failslab, interval 1, probability 0, space 0, times 0 [ 726.038132][T26849] CPU: 0 PID: 26849 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 726.046050][T26849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.046057][T26849] Call Trace: [ 726.046083][T26849] dump_stack+0x172/0x1f0 [ 726.046101][T26849] should_fail.cold+0xa/0x15 [ 726.046117][T26849] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 726.046135][T26849] ? ___might_sleep+0x163/0x280 [ 726.046154][T26849] __should_failslab+0x121/0x190 [ 726.046173][T26849] should_failslab+0x9/0x14 [ 726.046188][T26849] __kmalloc+0x2dc/0x740 [ 726.046202][T26849] ? __local_bh_enable_ip+0x15a/0x270 [ 726.046216][T26849] ? lock_sock_nested+0xe2/0x120 [ 726.046229][T26849] ? __local_bh_enable_ip+0x15a/0x270 [ 726.046245][T26849] ? lockdep_hardirqs_on+0x418/0x5d0 [ 726.046259][T26849] ? lock_sock_nested+0x9a/0x120 [ 726.046271][T26849] ? sock_kmalloc+0xc6/0x120 [ 726.046287][T26849] sock_kmalloc+0xc6/0x120 [ 726.046308][T26849] hash_alloc_result.part.0+0x95/0x110 [ 726.046326][T26849] hash_sendpage+0x7b3/0x9e0 [ 726.046349][T26849] kernel_sendpage+0x95/0xf0 [ 726.046363][T26849] ? hash_sendmsg+0xad0/0xad0 [ 726.046379][T26849] sock_sendpage+0x8b/0xc0 [ 726.046393][T26849] ? lockdep_hardirqs_on+0x418/0x5d0 [ 726.046420][T26849] pipe_to_sendpage+0x299/0x370 [ 726.046435][T26849] ? kernel_sendpage+0xf0/0xf0 [ 726.046451][T26849] ? direct_splice_actor+0x1a0/0x1a0 [ 726.046465][T26849] ? __put_page+0x92/0xd0 [ 726.046483][T26849] ? anon_pipe_buf_release+0x1c6/0x270 [ 726.046502][T26849] __splice_from_pipe+0x395/0x7d0 [ 726.046523][T26849] ? direct_splice_actor+0x1a0/0x1a0 [ 726.059892][T26849] ? direct_splice_actor+0x1a0/0x1a0 [ 726.059908][T26849] splice_from_pipe+0x108/0x170 [ 726.059926][T26849] ? splice_shrink_spd+0xd0/0xd0 [ 726.059948][T26849] ? apparmor_file_permission+0x25/0x30 [ 726.059965][T26849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.059983][T26849] ? security_file_permission+0x94/0x380 [ 726.060001][T26849] generic_splice_sendpage+0x3c/0x50 [ 726.060015][T26849] ? splice_from_pipe+0x170/0x170 [ 726.060031][T26849] do_splice+0x70a/0x13c0 [ 726.060057][T26849] ? opipe_prep.part.0+0x2d0/0x2d0 [ 726.060076][T26849] ? __fget_light+0x1a9/0x230 [ 726.060105][T26849] __ia32_sys_splice+0x2c4/0x330 [ 726.069039][T26849] do_fast_syscall_32+0x281/0xc98 [ 726.069062][T26849] entry_SYSENTER_compat+0x70/0x7f [ 726.069075][T26849] RIP: 0023:0xf7fe7869 [ 726.069091][T26849] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 726.069100][T26849] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 726.069113][T26849] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 726.069121][T26849] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 05:07:22 executing program 3 (fault-call:6 fault-nth:35): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:22 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\xdc\xa9[\x00', @ifru_flags=0x1}) [ 726.069129][T26849] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 726.069137][T26849] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 726.069146][T26849] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:22 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, 0x0) 05:07:22 executing program 4 (fault-call:6 fault-nth:34): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 726.494754][T26855] FAULT_INJECTION: forcing a failure. [ 726.494754][T26855] name failslab, interval 1, probability 0, space 0, times 0 [ 726.524354][T26855] CPU: 0 PID: 26855 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 726.532304][T26855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.542369][T26855] Call Trace: [ 726.545679][T26855] dump_stack+0x172/0x1f0 [ 726.550020][T26855] should_fail.cold+0xa/0x15 [ 726.554692][T26855] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 726.560606][T26855] ? ___might_sleep+0x163/0x280 [ 726.565469][T26855] __should_failslab+0x121/0x190 [ 726.570527][T26855] should_failslab+0x9/0x14 [ 726.575044][T26855] __kmalloc+0x2dc/0x740 [ 726.579298][T26855] ? __local_bh_enable_ip+0x15a/0x270 [ 726.584679][T26855] ? lock_sock_nested+0xe2/0x120 [ 726.589621][T26855] ? __local_bh_enable_ip+0x15a/0x270 [ 726.595005][T26855] ? lockdep_hardirqs_on+0x418/0x5d0 [ 726.600298][T26855] ? lock_sock_nested+0x9a/0x120 [ 726.605234][T26855] ? sock_kmalloc+0xc6/0x120 [ 726.609832][T26855] sock_kmalloc+0xc6/0x120 [ 726.614264][T26855] hash_alloc_result.part.0+0x95/0x110 [ 726.619728][T26855] hash_sendpage+0x7b3/0x9e0 [ 726.624337][T26855] kernel_sendpage+0x95/0xf0 [ 726.628937][T26855] ? hash_sendmsg+0xad0/0xad0 [ 726.633621][T26855] sock_sendpage+0x8b/0xc0 [ 726.638048][T26855] ? lockdep_hardirqs_on+0x418/0x5d0 [ 726.643351][T26855] pipe_to_sendpage+0x299/0x370 [ 726.648208][T26855] ? kernel_sendpage+0xf0/0xf0 [ 726.653010][T26855] ? direct_splice_actor+0x1a0/0x1a0 [ 726.658334][T26855] ? __put_page+0x92/0xd0 [ 726.662677][T26855] ? anon_pipe_buf_release+0x1c6/0x270 [ 726.668121][T26855] __splice_from_pipe+0x395/0x7d0 [ 726.673155][T26855] ? direct_splice_actor+0x1a0/0x1a0 [ 726.679778][T26855] ? direct_splice_actor+0x1a0/0x1a0 [ 726.685059][T26855] splice_from_pipe+0x108/0x170 [ 726.689914][T26855] ? splice_shrink_spd+0xd0/0xd0 [ 726.694915][T26855] ? apparmor_file_permission+0x25/0x30 [ 726.700454][T26855] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 726.706693][T26855] ? security_file_permission+0x94/0x380 [ 726.712342][T26855] generic_splice_sendpage+0x3c/0x50 [ 726.717626][T26855] ? splice_from_pipe+0x170/0x170 [ 726.722634][T26855] do_splice+0x70a/0x13c0 [ 726.726952][T26855] ? opipe_prep.part.0+0x2d0/0x2d0 [ 726.732050][T26855] ? __fget_light+0x1a9/0x230 [ 726.736713][T26855] __ia32_sys_splice+0x2c4/0x330 [ 726.741637][T26855] do_fast_syscall_32+0x281/0xc98 [ 726.746647][T26855] entry_SYSENTER_compat+0x70/0x7f [ 726.751744][T26855] RIP: 0023:0xf7fb8869 [ 726.755819][T26855] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 726.775593][T26855] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 726.783995][T26855] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 726.791965][T26855] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 726.799944][T26855] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 726.807905][T26855] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 726.815867][T26855] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:23 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x891d, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 726.903584][T26866] FAULT_INJECTION: forcing a failure. [ 726.903584][T26866] name failslab, interval 1, probability 0, space 0, times 0 [ 726.958901][T26866] CPU: 1 PID: 26866 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 726.967025][T26866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 726.977104][T26866] Call Trace: [ 726.980415][T26866] dump_stack+0x172/0x1f0 [ 726.984766][T26866] should_fail.cold+0xa/0x15 [ 726.989386][T26866] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 726.995221][T26866] ? ___might_sleep+0x163/0x280 [ 727.000107][T26866] __should_failslab+0x121/0x190 [ 727.005070][T26866] should_failslab+0x9/0x14 [ 727.009586][T26866] __kmalloc+0x2dc/0x740 [ 727.013837][T26866] ? __local_bh_enable_ip+0x15a/0x270 [ 727.019220][T26866] ? lock_sock_nested+0xe2/0x120 [ 727.024171][T26866] ? __local_bh_enable_ip+0x15a/0x270 [ 727.029561][T26866] ? lockdep_hardirqs_on+0x418/0x5d0 [ 727.034857][T26866] ? lock_sock_nested+0x9a/0x120 [ 727.039798][T26866] ? sock_kmalloc+0xc6/0x120 [ 727.044400][T26866] sock_kmalloc+0xc6/0x120 [ 727.048833][T26866] hash_alloc_result.part.0+0x95/0x110 [ 727.054392][T26866] hash_sendpage+0x7b3/0x9e0 [ 727.059000][T26866] kernel_sendpage+0x95/0xf0 [ 727.063616][T26866] ? hash_sendmsg+0xad0/0xad0 [ 727.068304][T26866] sock_sendpage+0x8b/0xc0 [ 727.072729][T26866] ? lockdep_hardirqs_on+0x418/0x5d0 [ 727.078036][T26866] pipe_to_sendpage+0x299/0x370 [ 727.082919][T26866] ? kernel_sendpage+0xf0/0xf0 [ 727.087694][T26866] ? direct_splice_actor+0x1a0/0x1a0 [ 727.092985][T26866] ? __put_page+0x92/0xd0 [ 727.097329][T26866] ? anon_pipe_buf_release+0x1c6/0x270 [ 727.102809][T26866] __splice_from_pipe+0x395/0x7d0 [ 727.107854][T26866] ? direct_splice_actor+0x1a0/0x1a0 [ 727.113162][T26866] ? direct_splice_actor+0x1a0/0x1a0 [ 727.118459][T26866] splice_from_pipe+0x108/0x170 [ 727.123327][T26866] ? splice_shrink_spd+0xd0/0xd0 [ 727.128284][T26866] ? apparmor_file_permission+0x25/0x30 [ 727.133838][T26866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 727.140101][T26866] ? security_file_permission+0x94/0x380 [ 727.145750][T26866] generic_splice_sendpage+0x3c/0x50 [ 727.151052][T26866] ? splice_from_pipe+0x170/0x170 [ 727.156188][T26866] do_splice+0x70a/0x13c0 [ 727.160537][T26866] ? opipe_prep.part.0+0x2d0/0x2d0 [ 727.165660][T26866] ? __fget_light+0x1a9/0x230 [ 727.170442][T26866] __ia32_sys_splice+0x2c4/0x330 [ 727.175396][T26866] do_fast_syscall_32+0x281/0xc98 [ 727.180442][T26866] entry_SYSENTER_compat+0x70/0x7f [ 727.185560][T26866] RIP: 0023:0xf7fe7869 [ 727.189639][T26866] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 727.209378][T26866] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 727.217775][T26866] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 727.225729][T26866] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 727.233711][T26866] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 727.241668][T26866] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 727.249621][T26866] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:23 executing program 3 (fault-call:6 fault-nth:36): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:23 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:23 executing program 4 (fault-call:6 fault-nth:35): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 727.501088][T26883] FAULT_INJECTION: forcing a failure. [ 727.501088][T26883] name failslab, interval 1, probability 0, space 0, times 0 [ 727.514413][T26883] CPU: 1 PID: 26883 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 727.522496][T26883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.532558][T26883] Call Trace: [ 727.535862][T26883] dump_stack+0x172/0x1f0 [ 727.540247][T26883] should_fail.cold+0xa/0x15 [ 727.544852][T26883] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 727.550671][T26883] ? ___might_sleep+0x163/0x280 [ 727.553460][T26882] FAULT_INJECTION: forcing a failure. [ 727.553460][T26882] name failslab, interval 1, probability 0, space 0, times 0 [ 727.555533][T26883] __should_failslab+0x121/0x190 [ 727.574571][T26883] should_failslab+0x9/0x14 [ 727.579078][T26883] __kmalloc+0x2dc/0x740 [ 727.583327][T26883] ? __local_bh_enable_ip+0x15a/0x270 [ 727.588700][T26883] ? lock_sock_nested+0xe2/0x120 [ 727.593647][T26883] ? __local_bh_enable_ip+0x15a/0x270 [ 727.599024][T26883] ? lockdep_hardirqs_on+0x418/0x5d0 [ 727.604312][T26883] ? lock_sock_nested+0x9a/0x120 [ 727.609247][T26883] ? sock_kmalloc+0xc6/0x120 [ 727.613842][T26883] sock_kmalloc+0xc6/0x120 [ 727.618271][T26883] hash_alloc_result.part.0+0x95/0x110 [ 727.623735][T26883] hash_sendpage+0x7b3/0x9e0 [ 727.628369][T26883] kernel_sendpage+0x95/0xf0 [ 727.632977][T26883] ? hash_sendmsg+0xad0/0xad0 [ 727.637661][T26883] sock_sendpage+0x8b/0xc0 [ 727.642078][T26883] ? lockdep_hardirqs_on+0x418/0x5d0 [ 727.647373][T26883] pipe_to_sendpage+0x299/0x370 [ 727.652230][T26883] ? kernel_sendpage+0xf0/0xf0 [ 727.656996][T26883] ? direct_splice_actor+0x1a0/0x1a0 [ 727.662282][T26883] ? __put_page+0x92/0xd0 [ 727.666617][T26883] ? anon_pipe_buf_release+0x1c6/0x270 [ 727.672261][T26883] __splice_from_pipe+0x395/0x7d0 [ 727.677295][T26883] ? direct_splice_actor+0x1a0/0x1a0 [ 727.682618][T26883] ? direct_splice_actor+0x1a0/0x1a0 [ 727.687917][T26883] splice_from_pipe+0x108/0x170 [ 727.692799][T26883] ? splice_shrink_spd+0xd0/0xd0 [ 727.697755][T26883] ? apparmor_file_permission+0x25/0x30 [ 727.703315][T26883] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 727.709569][T26883] ? security_file_permission+0x94/0x380 [ 727.715215][T26883] generic_splice_sendpage+0x3c/0x50 [ 727.720500][T26883] ? splice_from_pipe+0x170/0x170 [ 727.725533][T26883] do_splice+0x70a/0x13c0 [ 727.729881][T26883] ? opipe_prep.part.0+0x2d0/0x2d0 [ 727.735001][T26883] ? __fget_light+0x1a9/0x230 [ 727.739687][T26883] __ia32_sys_splice+0x2c4/0x330 [ 727.744673][T26883] do_fast_syscall_32+0x281/0xc98 [ 727.749710][T26883] entry_SYSENTER_compat+0x70/0x7f [ 727.754819][T26883] RIP: 0023:0xf7fe7869 [ 727.758888][T26883] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 727.778504][T26883] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 727.786921][T26883] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 727.794901][T26883] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 727.802878][T26883] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 727.810855][T26883] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 727.818838][T26883] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 727.826862][T26882] CPU: 0 PID: 26882 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 727.834765][T26882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 727.844808][T26882] Call Trace: [ 727.848086][T26882] dump_stack+0x172/0x1f0 [ 727.852405][T26882] should_fail.cold+0xa/0x15 [ 727.857025][T26882] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 727.862820][T26882] ? ___might_sleep+0x163/0x280 [ 727.867655][T26882] __should_failslab+0x121/0x190 [ 727.872596][T26882] should_failslab+0x9/0x14 [ 727.877107][T26882] __kmalloc+0x2dc/0x740 [ 727.881442][T26882] ? __local_bh_enable_ip+0x15a/0x270 [ 727.886811][T26882] ? lock_sock_nested+0xe2/0x120 [ 727.891738][T26882] ? __local_bh_enable_ip+0x15a/0x270 [ 727.897114][T26882] ? lockdep_hardirqs_on+0x418/0x5d0 [ 727.902398][T26882] ? lock_sock_nested+0x9a/0x120 [ 727.907341][T26882] ? sock_kmalloc+0xc6/0x120 [ 727.911916][T26882] sock_kmalloc+0xc6/0x120 [ 727.916330][T26882] hash_alloc_result.part.0+0x95/0x110 [ 727.921776][T26882] hash_sendpage+0x7b3/0x9e0 [ 727.926370][T26882] kernel_sendpage+0x95/0xf0 [ 727.930941][T26882] ? hash_sendmsg+0xad0/0xad0 [ 727.935614][T26882] sock_sendpage+0x8b/0xc0 [ 727.940057][T26882] ? lockdep_hardirqs_on+0x418/0x5d0 [ 727.945358][T26882] pipe_to_sendpage+0x299/0x370 [ 727.950192][T26882] ? kernel_sendpage+0xf0/0xf0 [ 727.954955][T26882] ? direct_splice_actor+0x1a0/0x1a0 [ 727.960233][T26882] ? __put_page+0x92/0xd0 [ 727.964633][T26882] ? anon_pipe_buf_release+0x1c6/0x270 [ 727.970082][T26882] __splice_from_pipe+0x395/0x7d0 [ 727.975107][T26882] ? direct_splice_actor+0x1a0/0x1a0 [ 727.980450][T26882] ? direct_splice_actor+0x1a0/0x1a0 [ 727.985742][T26882] splice_from_pipe+0x108/0x170 [ 727.990584][T26882] ? splice_shrink_spd+0xd0/0xd0 [ 727.995540][T26882] ? apparmor_file_permission+0x25/0x30 [ 728.001112][T26882] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 728.007360][T26882] ? security_file_permission+0x94/0x380 [ 728.012981][T26882] generic_splice_sendpage+0x3c/0x50 [ 728.018257][T26882] ? splice_from_pipe+0x170/0x170 [ 728.023285][T26882] do_splice+0x70a/0x13c0 [ 728.027609][T26882] ? opipe_prep.part.0+0x2d0/0x2d0 [ 728.032706][T26882] ? __fget_light+0x1a9/0x230 [ 728.037375][T26882] __ia32_sys_splice+0x2c4/0x330 [ 728.042307][T26882] do_fast_syscall_32+0x281/0xc98 [ 728.047330][T26882] entry_SYSENTER_compat+0x70/0x7f [ 728.052435][T26882] RIP: 0023:0xf7fb8869 [ 728.056492][T26882] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 728.076092][T26882] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 728.084489][T26882] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 728.092462][T26882] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 728.100446][T26882] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 728.108436][T26882] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 728.116419][T26882] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:24 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, 0x0) 05:07:24 executing program 3 (fault-call:6 fault-nth:37): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:24 executing program 4 (fault-call:6 fault-nth:36): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:24 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x02\xe5\xa9[\x00', @ifru_flags=0x1}) [ 728.397769][T26897] FAULT_INJECTION: forcing a failure. [ 728.397769][T26897] name failslab, interval 1, probability 0, space 0, times 0 [ 728.414050][T26897] CPU: 1 PID: 26897 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 728.421983][T26897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.432045][T26897] Call Trace: [ 728.435365][T26897] dump_stack+0x172/0x1f0 [ 728.439707][T26897] should_fail.cold+0xa/0x15 [ 728.444305][T26897] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 728.450117][T26897] ? ___might_sleep+0x163/0x280 [ 728.454980][T26897] __should_failslab+0x121/0x190 [ 728.460073][T26897] should_failslab+0x9/0x14 [ 728.464586][T26897] __kmalloc+0x2dc/0x740 [ 728.468851][T26897] ? __local_bh_enable_ip+0x15a/0x270 [ 728.474225][T26897] ? lock_sock_nested+0xe2/0x120 [ 728.479254][T26897] ? __local_bh_enable_ip+0x15a/0x270 [ 728.484641][T26897] ? lockdep_hardirqs_on+0x418/0x5d0 [ 728.489936][T26897] ? lock_sock_nested+0x9a/0x120 [ 728.490105][T26899] FAULT_INJECTION: forcing a failure. [ 728.490105][T26899] name failslab, interval 1, probability 0, space 0, times 0 [ 728.495052][T26897] ? sock_kmalloc+0xc6/0x120 [ 728.495081][T26897] sock_kmalloc+0xc6/0x120 [ 728.495104][T26897] hash_alloc_result.part.0+0x95/0x110 [ 728.522156][T26897] hash_sendpage+0x7b3/0x9e0 [ 728.526762][T26897] kernel_sendpage+0x95/0xf0 [ 728.531359][T26897] ? hash_sendmsg+0xad0/0xad0 [ 728.536039][T26897] sock_sendpage+0x8b/0xc0 [ 728.540473][T26897] ? lockdep_hardirqs_on+0x418/0x5d0 [ 728.545766][T26897] pipe_to_sendpage+0x299/0x370 [ 728.550621][T26897] ? kernel_sendpage+0xf0/0xf0 [ 728.555414][T26897] ? direct_splice_actor+0x1a0/0x1a0 [ 728.560717][T26897] ? __put_page+0x92/0xd0 [ 728.565067][T26897] ? anon_pipe_buf_release+0x1c6/0x270 [ 728.570541][T26897] __splice_from_pipe+0x395/0x7d0 [ 728.575576][T26897] ? direct_splice_actor+0x1a0/0x1a0 [ 728.580874][T26897] ? direct_splice_actor+0x1a0/0x1a0 [ 728.586168][T26897] splice_from_pipe+0x108/0x170 [ 728.591034][T26897] ? splice_shrink_spd+0xd0/0xd0 [ 728.596000][T26897] ? apparmor_file_permission+0x25/0x30 [ 728.601556][T26897] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 728.607802][T26897] ? security_file_permission+0x94/0x380 [ 728.613446][T26897] generic_splice_sendpage+0x3c/0x50 [ 728.618769][T26897] ? splice_from_pipe+0x170/0x170 [ 728.623795][T26897] do_splice+0x70a/0x13c0 [ 728.628137][T26897] ? opipe_prep.part.0+0x2d0/0x2d0 [ 728.633262][T26897] ? __fget_light+0x1a9/0x230 [ 728.637950][T26897] __ia32_sys_splice+0x2c4/0x330 [ 728.642898][T26897] do_fast_syscall_32+0x281/0xc98 [ 728.648030][T26897] entry_SYSENTER_compat+0x70/0x7f [ 728.653151][T26897] RIP: 0023:0xf7fb8869 [ 728.657219][T26897] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 728.678427][T26897] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 728.686852][T26897] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 728.694836][T26897] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 728.702902][T26897] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 728.710885][T26897] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 728.718869][T26897] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 728.727055][T26899] CPU: 0 PID: 26899 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 728.734966][T26899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 728.745060][T26899] Call Trace: [ 728.748371][T26899] dump_stack+0x172/0x1f0 [ 728.752739][T26899] should_fail.cold+0xa/0x15 [ 728.757521][T26899] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 728.763376][T26899] ? ___might_sleep+0x163/0x280 [ 728.768260][T26899] __should_failslab+0x121/0x190 [ 728.773215][T26899] should_failslab+0x9/0x14 [ 728.777733][T26899] __kmalloc+0x2dc/0x740 [ 728.781986][T26899] ? __local_bh_enable_ip+0x15a/0x270 [ 728.787352][T26899] ? lock_sock_nested+0xe2/0x120 [ 728.792285][T26899] ? __local_bh_enable_ip+0x15a/0x270 [ 728.797660][T26899] ? lockdep_hardirqs_on+0x418/0x5d0 [ 728.802940][T26899] ? lock_sock_nested+0x9a/0x120 [ 728.807875][T26899] ? sock_kmalloc+0xc6/0x120 [ 728.812476][T26899] sock_kmalloc+0xc6/0x120 [ 728.816915][T26899] hash_alloc_result.part.0+0x95/0x110 [ 728.822391][T26899] hash_sendpage+0x7b3/0x9e0 [ 728.827007][T26899] kernel_sendpage+0x95/0xf0 [ 728.831599][T26899] ? hash_sendmsg+0xad0/0xad0 [ 728.836264][T26899] sock_sendpage+0x8b/0xc0 [ 728.840666][T26899] ? lockdep_hardirqs_on+0x418/0x5d0 [ 728.845952][T26899] pipe_to_sendpage+0x299/0x370 [ 728.850819][T26899] ? kernel_sendpage+0xf0/0xf0 [ 728.855587][T26899] ? direct_splice_actor+0x1a0/0x1a0 [ 728.860855][T26899] ? __put_page+0x92/0xd0 [ 728.865196][T26899] ? anon_pipe_buf_release+0x1c6/0x270 [ 728.870641][T26899] __splice_from_pipe+0x395/0x7d0 [ 728.875648][T26899] ? direct_splice_actor+0x1a0/0x1a0 [ 728.880921][T26899] ? direct_splice_actor+0x1a0/0x1a0 [ 728.886207][T26899] splice_from_pipe+0x108/0x170 [ 728.891097][T26899] ? splice_shrink_spd+0xd0/0xd0 [ 728.896054][T26899] ? apparmor_file_permission+0x25/0x30 [ 728.901610][T26899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 728.907858][T26899] ? security_file_permission+0x94/0x380 [ 728.913496][T26899] generic_splice_sendpage+0x3c/0x50 [ 728.918811][T26899] ? splice_from_pipe+0x170/0x170 [ 728.923851][T26899] do_splice+0x70a/0x13c0 [ 728.928202][T26899] ? opipe_prep.part.0+0x2d0/0x2d0 [ 728.933328][T26899] ? __fget_light+0x1a9/0x230 [ 728.938021][T26899] __ia32_sys_splice+0x2c4/0x330 [ 728.943015][T26899] do_fast_syscall_32+0x281/0xc98 [ 728.948052][T26899] entry_SYSENTER_compat+0x70/0x7f [ 728.953178][T26899] RIP: 0023:0xf7fe7869 [ 728.957235][T26899] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 728.976843][T26899] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 728.985251][T26899] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 728.993245][T26899] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 729.001226][T26899] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 729.009192][T26899] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 729.017185][T26899] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:25 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:25 executing program 3 (fault-call:6 fault-nth:38): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:25 executing program 4 (fault-call:6 fault-nth:37): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:25 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, 0x0) [ 729.391654][T26911] FAULT_INJECTION: forcing a failure. [ 729.391654][T26911] name failslab, interval 1, probability 0, space 0, times 0 05:07:25 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 729.456632][T26912] FAULT_INJECTION: forcing a failure. [ 729.456632][T26912] name failslab, interval 1, probability 0, space 0, times 0 [ 729.489166][T26911] CPU: 1 PID: 26911 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 729.497113][T26911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.507182][T26911] Call Trace: [ 729.510519][T26911] dump_stack+0x172/0x1f0 [ 729.514867][T26911] should_fail.cold+0xa/0x15 [ 729.519490][T26911] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 729.525666][T26911] ? ___might_sleep+0x163/0x280 [ 729.530536][T26911] __should_failslab+0x121/0x190 [ 729.535506][T26911] should_failslab+0x9/0x14 [ 729.540023][T26911] __kmalloc+0x2dc/0x740 [ 729.544282][T26911] ? __local_bh_enable_ip+0x15a/0x270 [ 729.549662][T26911] ? lock_sock_nested+0xe2/0x120 [ 729.554614][T26911] ? __local_bh_enable_ip+0x15a/0x270 [ 729.559997][T26911] ? lockdep_hardirqs_on+0x418/0x5d0 [ 729.565293][T26911] ? lock_sock_nested+0x9a/0x120 [ 729.570999][T26911] ? sock_kmalloc+0xc6/0x120 [ 729.575606][T26911] sock_kmalloc+0xc6/0x120 [ 729.580041][T26911] hash_alloc_result.part.0+0x95/0x110 [ 729.585643][T26911] hash_sendpage+0x7b3/0x9e0 [ 729.590256][T26911] kernel_sendpage+0x95/0xf0 [ 729.594860][T26911] ? hash_sendmsg+0xad0/0xad0 [ 729.599566][T26911] sock_sendpage+0x8b/0xc0 [ 729.604091][T26911] ? lockdep_hardirqs_on+0x418/0x5d0 [ 729.609385][T26911] pipe_to_sendpage+0x299/0x370 [ 729.614250][T26911] ? kernel_sendpage+0xf0/0xf0 [ 729.619026][T26911] ? direct_splice_actor+0x1a0/0x1a0 [ 729.624323][T26911] ? __put_page+0x92/0xd0 [ 729.628663][T26911] ? anon_pipe_buf_release+0x1c6/0x270 [ 729.634134][T26911] __splice_from_pipe+0x395/0x7d0 [ 729.639176][T26911] ? direct_splice_actor+0x1a0/0x1a0 [ 729.644490][T26911] ? direct_splice_actor+0x1a0/0x1a0 [ 729.649794][T26911] splice_from_pipe+0x108/0x170 [ 729.654674][T26911] ? splice_shrink_spd+0xd0/0xd0 [ 729.659642][T26911] ? apparmor_file_permission+0x25/0x30 [ 729.665207][T26911] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.671475][T26911] ? security_file_permission+0x94/0x380 [ 729.677128][T26911] generic_splice_sendpage+0x3c/0x50 [ 729.682430][T26911] ? splice_from_pipe+0x170/0x170 [ 729.687477][T26911] do_splice+0x70a/0x13c0 [ 729.691928][T26911] ? opipe_prep.part.0+0x2d0/0x2d0 [ 729.697096][T26911] ? __fget_light+0x1a9/0x230 [ 729.701793][T26911] __ia32_sys_splice+0x2c4/0x330 [ 729.706754][T26911] do_fast_syscall_32+0x281/0xc98 [ 729.711800][T26911] entry_SYSENTER_compat+0x70/0x7f [ 729.716922][T26911] RIP: 0023:0xf7fb8869 [ 729.720997][T26911] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 729.740612][T26911] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 729.749033][T26911] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 729.757019][T26911] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 729.764997][T26911] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 729.772970][T26911] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 729.780945][T26911] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 729.798802][T26912] CPU: 1 PID: 26912 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 729.806898][T26912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 729.816959][T26912] Call Trace: [ 729.816986][T26912] dump_stack+0x172/0x1f0 [ 729.817009][T26912] should_fail.cold+0xa/0x15 [ 729.817028][T26912] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 729.817049][T26912] ? ___might_sleep+0x163/0x280 [ 729.817084][T26912] __should_failslab+0x121/0x190 [ 729.824703][T26912] should_failslab+0x9/0x14 [ 729.824720][T26912] __kmalloc+0x2dc/0x740 [ 729.824737][T26912] ? __local_bh_enable_ip+0x15a/0x270 [ 729.824752][T26912] ? lock_sock_nested+0xe2/0x120 [ 729.824766][T26912] ? __local_bh_enable_ip+0x15a/0x270 [ 729.824782][T26912] ? lockdep_hardirqs_on+0x418/0x5d0 [ 729.824802][T26912] ? lock_sock_nested+0x9a/0x120 [ 729.835189][T26912] ? sock_kmalloc+0xc6/0x120 [ 729.835209][T26912] sock_kmalloc+0xc6/0x120 [ 729.835232][T26912] hash_alloc_result.part.0+0x95/0x110 [ 729.835249][T26912] hash_sendpage+0x7b3/0x9e0 [ 729.835271][T26912] kernel_sendpage+0x95/0xf0 [ 729.835293][T26912] ? hash_sendmsg+0xad0/0xad0 [ 729.845089][T26912] sock_sendpage+0x8b/0xc0 [ 729.845107][T26912] ? lockdep_hardirqs_on+0x418/0x5d0 [ 729.845127][T26912] pipe_to_sendpage+0x299/0x370 [ 729.845143][T26912] ? kernel_sendpage+0xf0/0xf0 [ 729.845159][T26912] ? direct_splice_actor+0x1a0/0x1a0 [ 729.845182][T26912] ? __put_page+0x92/0xd0 [ 729.854009][T26912] ? anon_pipe_buf_release+0x1c6/0x270 [ 729.854031][T26912] __splice_from_pipe+0x395/0x7d0 [ 729.854048][T26912] ? direct_splice_actor+0x1a0/0x1a0 [ 729.854081][T26912] ? direct_splice_actor+0x1a0/0x1a0 [ 729.854097][T26912] splice_from_pipe+0x108/0x170 [ 729.854117][T26912] ? splice_shrink_spd+0xd0/0xd0 [ 729.864419][T26912] ? apparmor_file_permission+0x25/0x30 [ 729.864438][T26912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 729.864457][T26912] ? security_file_permission+0x94/0x380 [ 729.864479][T26912] generic_splice_sendpage+0x3c/0x50 [ 729.864494][T26912] ? splice_from_pipe+0x170/0x170 [ 729.864514][T26912] do_splice+0x70a/0x13c0 [ 730.000031][T26912] ? opipe_prep.part.0+0x2d0/0x2d0 [ 730.005155][T26912] ? __fget_light+0x1a9/0x230 [ 730.009822][T26912] __ia32_sys_splice+0x2c4/0x330 [ 730.014772][T26912] do_fast_syscall_32+0x281/0xc98 [ 730.019937][T26912] entry_SYSENTER_compat+0x70/0x7f [ 730.025074][T26912] RIP: 0023:0xf7fe7869 [ 730.029331][T26912] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 730.048943][T26912] RSP: 002b:00000000f5dc20cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 05:07:26 executing program 3 (fault-call:6 fault-nth:39): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 730.057352][T26912] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 730.065320][T26912] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 730.073295][T26912] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 730.081270][T26912] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 730.089226][T26912] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:26 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:26 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\xe6\xa9[\x00', @ifru_flags=0x1}) 05:07:26 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x891f, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 730.324500][T26927] FAULT_INJECTION: forcing a failure. [ 730.324500][T26927] name failslab, interval 1, probability 0, space 0, times 0 [ 730.342733][T26927] CPU: 1 PID: 26927 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 730.350669][T26927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 730.360745][T26927] Call Trace: [ 730.364071][T26927] dump_stack+0x172/0x1f0 [ 730.368452][T26927] should_fail.cold+0xa/0x15 [ 730.373079][T26927] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 730.378905][T26927] ? ___might_sleep+0x163/0x280 [ 730.383782][T26927] __should_failslab+0x121/0x190 [ 730.388730][T26927] should_failslab+0x9/0x14 [ 730.393251][T26927] __kmalloc+0x2dc/0x740 [ 730.397505][T26927] ? __local_bh_enable_ip+0x15a/0x270 [ 730.402888][T26927] ? lock_sock_nested+0xe2/0x120 [ 730.407848][T26927] ? __local_bh_enable_ip+0x15a/0x270 [ 730.413266][T26927] ? lockdep_hardirqs_on+0x418/0x5d0 [ 730.418656][T26927] ? lock_sock_nested+0x9a/0x120 [ 730.423599][T26927] ? sock_kmalloc+0xc6/0x120 [ 730.428247][T26927] sock_kmalloc+0xc6/0x120 [ 730.432679][T26927] hash_alloc_result.part.0+0x95/0x110 [ 730.438161][T26927] hash_sendpage+0x7b3/0x9e0 [ 730.442863][T26927] kernel_sendpage+0x95/0xf0 [ 730.447464][T26927] ? hash_sendmsg+0xad0/0xad0 [ 730.452173][T26927] sock_sendpage+0x8b/0xc0 [ 730.456611][T26927] ? lockdep_hardirqs_on+0x418/0x5d0 [ 730.461929][T26927] pipe_to_sendpage+0x299/0x370 [ 730.466799][T26927] ? kernel_sendpage+0xf0/0xf0 [ 730.471670][T26927] ? direct_splice_actor+0x1a0/0x1a0 [ 730.477071][T26927] ? __put_page+0x92/0xd0 [ 730.481422][T26927] ? anon_pipe_buf_release+0x1c6/0x270 [ 730.486899][T26927] __splice_from_pipe+0x395/0x7d0 [ 730.491951][T26927] ? direct_splice_actor+0x1a0/0x1a0 [ 730.497263][T26927] ? direct_splice_actor+0x1a0/0x1a0 [ 730.502561][T26927] splice_from_pipe+0x108/0x170 [ 730.507438][T26927] ? splice_shrink_spd+0xd0/0xd0 [ 730.512404][T26927] ? apparmor_file_permission+0x25/0x30 [ 730.517965][T26927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 730.524229][T26927] ? security_file_permission+0x94/0x380 [ 730.529890][T26927] generic_splice_sendpage+0x3c/0x50 [ 730.535196][T26927] ? splice_from_pipe+0x170/0x170 [ 730.540234][T26927] do_splice+0x70a/0x13c0 [ 730.544584][T26927] ? opipe_prep.part.0+0x2d0/0x2d0 [ 730.549829][T26927] ? __fget_light+0x1a9/0x230 [ 730.554532][T26927] __ia32_sys_splice+0x2c4/0x330 [ 730.559493][T26927] do_fast_syscall_32+0x281/0xc98 [ 730.564539][T26927] entry_SYSENTER_compat+0x70/0x7f [ 730.569661][T26927] RIP: 0023:0xf7fb8869 [ 730.573741][T26927] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 730.593359][T26927] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 730.601791][T26927] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 730.609783][T26927] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 730.617767][T26927] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 730.625834][T26927] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 730.633824][T26927] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:26 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags}) 05:07:27 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x7, 0x0) 05:07:27 executing program 3 (fault-call:6 fault-nth:40): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:27 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 731.189615][T26949] FAULT_INJECTION: forcing a failure. [ 731.189615][T26949] name failslab, interval 1, probability 0, space 0, times 0 [ 731.202807][T26949] CPU: 0 PID: 26949 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 731.210710][T26949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 731.220770][T26949] Call Trace: [ 731.224083][T26949] dump_stack+0x172/0x1f0 [ 731.228433][T26949] should_fail.cold+0xa/0x15 [ 731.233032][T26949] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 731.238862][T26949] ? ___might_sleep+0x163/0x280 [ 731.243728][T26949] __should_failslab+0x121/0x190 [ 731.248677][T26949] should_failslab+0x9/0x14 [ 731.253190][T26949] __kmalloc+0x2dc/0x740 [ 731.257446][T26949] ? __local_bh_enable_ip+0x15a/0x270 [ 731.262816][T26949] ? lock_sock_nested+0xe2/0x120 [ 731.267759][T26949] ? __local_bh_enable_ip+0x15a/0x270 [ 731.273142][T26949] ? lockdep_hardirqs_on+0x418/0x5d0 [ 731.278436][T26949] ? lock_sock_nested+0x9a/0x120 [ 731.283376][T26949] ? sock_kmalloc+0xc6/0x120 [ 731.287977][T26949] sock_kmalloc+0xc6/0x120 [ 731.292407][T26949] hash_alloc_result.part.0+0x95/0x110 [ 731.297883][T26949] hash_sendpage+0x7b3/0x9e0 [ 731.302488][T26949] kernel_sendpage+0x95/0xf0 [ 731.307092][T26949] ? hash_sendmsg+0xad0/0xad0 [ 731.311780][T26949] sock_sendpage+0x8b/0xc0 [ 731.316199][T26949] ? lockdep_hardirqs_on+0x418/0x5d0 [ 731.321494][T26949] pipe_to_sendpage+0x299/0x370 [ 731.326359][T26949] ? kernel_sendpage+0xf0/0xf0 [ 731.331135][T26949] ? direct_splice_actor+0x1a0/0x1a0 [ 731.336429][T26949] ? __put_page+0x92/0xd0 [ 731.340777][T26949] ? anon_pipe_buf_release+0x1c6/0x270 [ 731.346251][T26949] __splice_from_pipe+0x395/0x7d0 [ 731.351293][T26949] ? direct_splice_actor+0x1a0/0x1a0 [ 731.356593][T26949] ? direct_splice_actor+0x1a0/0x1a0 [ 731.361972][T26949] splice_from_pipe+0x108/0x170 [ 731.366834][T26949] ? splice_shrink_spd+0xd0/0xd0 [ 731.371785][T26949] ? apparmor_file_permission+0x25/0x30 [ 731.377338][T26949] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 731.383591][T26949] ? security_file_permission+0x94/0x380 [ 731.389241][T26949] generic_splice_sendpage+0x3c/0x50 [ 731.394542][T26949] ? splice_from_pipe+0x170/0x170 [ 731.399580][T26949] do_splice+0x70a/0x13c0 [ 731.403949][T26949] ? opipe_prep.part.0+0x2d0/0x2d0 [ 731.409082][T26949] ? __fget_light+0x1a9/0x230 [ 731.413776][T26949] __ia32_sys_splice+0x2c4/0x330 [ 731.418732][T26949] do_fast_syscall_32+0x281/0xc98 [ 731.423782][T26949] entry_SYSENTER_compat+0x70/0x7f [ 731.428898][T26949] RIP: 0023:0xf7fb8869 [ 731.432969][T26949] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 731.452583][T26949] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 731.461020][T26949] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 731.468998][T26949] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 731.476978][T26949] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:07:27 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags}) [ 731.484949][T26949] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 731.492932][T26949] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:27 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8920, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:27 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:27 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03\xe8\xa9[\x00', @ifru_flags=0x1}) 05:07:27 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags}) 05:07:27 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000070, 0x0) 05:07:28 executing program 3 (fault-call:6 fault-nth:41): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 732.057843][T26980] FAULT_INJECTION: forcing a failure. [ 732.057843][T26980] name failslab, interval 1, probability 0, space 0, times 0 [ 732.084609][T26980] CPU: 0 PID: 26980 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 732.092547][T26980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 732.102618][T26980] Call Trace: [ 732.105929][T26980] dump_stack+0x172/0x1f0 [ 732.110282][T26980] should_fail.cold+0xa/0x15 [ 732.114889][T26980] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 732.120814][T26980] ? ___might_sleep+0x163/0x280 [ 732.125677][T26980] __should_failslab+0x121/0x190 [ 732.130629][T26980] should_failslab+0x9/0x14 [ 732.135142][T26980] __kmalloc+0x2dc/0x740 [ 732.139390][T26980] ? __local_bh_enable_ip+0x15a/0x270 [ 732.144771][T26980] ? lock_sock_nested+0xe2/0x120 [ 732.149724][T26980] ? __local_bh_enable_ip+0x15a/0x270 [ 732.155118][T26980] ? lockdep_hardirqs_on+0x418/0x5d0 [ 732.160416][T26980] ? lock_sock_nested+0x9a/0x120 [ 732.165361][T26980] ? sock_kmalloc+0xc6/0x120 [ 732.169961][T26980] sock_kmalloc+0xc6/0x120 [ 732.174394][T26980] hash_alloc_result.part.0+0x95/0x110 [ 732.179874][T26980] hash_sendpage+0x7b3/0x9e0 [ 732.184496][T26980] kernel_sendpage+0x95/0xf0 [ 732.184511][T26980] ? hash_sendmsg+0xad0/0xad0 [ 732.184533][T26980] sock_sendpage+0x8b/0xc0 [ 732.193788][T26980] ? lockdep_hardirqs_on+0x418/0x5d0 [ 732.193808][T26980] pipe_to_sendpage+0x299/0x370 [ 732.193830][T26980] ? kernel_sendpage+0xf0/0xf0 [ 732.203517][T26980] ? direct_splice_actor+0x1a0/0x1a0 [ 732.203531][T26980] ? __put_page+0x92/0xd0 [ 732.203548][T26980] ? anon_pipe_buf_release+0x1c6/0x270 [ 732.203564][T26980] __splice_from_pipe+0x395/0x7d0 [ 732.203580][T26980] ? direct_splice_actor+0x1a0/0x1a0 [ 732.203599][T26980] ? direct_splice_actor+0x1a0/0x1a0 [ 732.203621][T26980] splice_from_pipe+0x108/0x170 [ 732.222839][T26980] ? splice_shrink_spd+0xd0/0xd0 [ 732.222865][T26980] ? apparmor_file_permission+0x25/0x30 [ 732.233352][T26980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 732.243907][T26980] ? security_file_permission+0x94/0x380 [ 732.243929][T26980] generic_splice_sendpage+0x3c/0x50 [ 732.243943][T26980] ? splice_from_pipe+0x170/0x170 [ 732.243955][T26980] do_splice+0x70a/0x13c0 [ 732.243977][T26980] ? opipe_prep.part.0+0x2d0/0x2d0 [ 732.243995][T26980] ? __fget_light+0x1a9/0x230 [ 732.244011][T26980] __ia32_sys_splice+0x2c4/0x330 [ 732.244032][T26980] do_fast_syscall_32+0x281/0xc98 [ 732.244052][T26980] entry_SYSENTER_compat+0x70/0x7f [ 732.244075][T26980] RIP: 0023:0xf7fb8869 [ 732.244093][T26980] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 732.244101][T26980] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 732.244115][T26980] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 732.244123][T26980] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 732.244132][T26980] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 732.244140][T26980] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 732.244149][T26980] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:28 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8921, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:28 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000300, 0x0) 05:07:28 executing program 3 (fault-call:6 fault-nth:42): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:29 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:29 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6009, 0x1) mount(&(0x7f00000002c0)=@filename='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='udf\x00', 0x0, 0x0) 05:07:29 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03\xec\xa9[\x00', @ifru_flags=0x1}) 05:07:29 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:29 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000100)={0x10, 0x0, {0x0, 0x0, 0x0, {}, {}, @ramp}}) [ 733.056038][T26999] FAULT_INJECTION: forcing a failure. [ 733.056038][T26999] name failslab, interval 1, probability 0, space 0, times 0 [ 733.088228][T27011] net_ratelimit: 12 callbacks suppressed [ 733.088253][T27011] eql: mtu less than device minimum [ 733.105029][T26999] CPU: 0 PID: 26999 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 733.112989][T26999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.123071][T26999] Call Trace: [ 733.126378][T26999] dump_stack+0x172/0x1f0 [ 733.130730][T26999] should_fail.cold+0xa/0x15 [ 733.135337][T26999] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 733.141157][T26999] ? ___might_sleep+0x163/0x280 [ 733.146023][T26999] __should_failslab+0x121/0x190 [ 733.150998][T26999] should_failslab+0x9/0x14 [ 733.155519][T26999] __kmalloc+0x2dc/0x740 [ 733.159772][T26999] ? __local_bh_enable_ip+0x15a/0x270 [ 733.165154][T26999] ? lock_sock_nested+0xe2/0x120 [ 733.170113][T26999] ? __local_bh_enable_ip+0x15a/0x270 [ 733.175504][T26999] ? lockdep_hardirqs_on+0x418/0x5d0 [ 733.180804][T26999] ? lock_sock_nested+0x9a/0x120 [ 733.185751][T26999] ? sock_kmalloc+0xc6/0x120 [ 733.190449][T26999] sock_kmalloc+0xc6/0x120 [ 733.194879][T26999] hash_alloc_result.part.0+0x95/0x110 [ 733.200358][T26999] hash_sendpage+0x7b3/0x9e0 [ 733.204977][T26999] kernel_sendpage+0x95/0xf0 [ 733.209578][T26999] ? hash_sendmsg+0xad0/0xad0 [ 733.214276][T26999] sock_sendpage+0x8b/0xc0 [ 733.218879][T26999] ? lockdep_hardirqs_on+0x418/0x5d0 [ 733.224182][T26999] pipe_to_sendpage+0x299/0x370 [ 733.229046][T26999] ? kernel_sendpage+0xf0/0xf0 [ 733.233841][T26999] ? direct_splice_actor+0x1a0/0x1a0 [ 733.239145][T26999] ? __put_page+0x92/0xd0 [ 733.243492][T26999] ? anon_pipe_buf_release+0x1c6/0x270 [ 733.249000][T26999] __splice_from_pipe+0x395/0x7d0 [ 733.254038][T26999] ? direct_splice_actor+0x1a0/0x1a0 [ 733.259355][T26999] ? direct_splice_actor+0x1a0/0x1a0 [ 733.264658][T26999] splice_from_pipe+0x108/0x170 [ 733.269530][T26999] ? splice_shrink_spd+0xd0/0xd0 [ 733.274490][T26999] ? apparmor_file_permission+0x25/0x30 [ 733.280055][T26999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 733.286328][T26999] ? security_file_permission+0x94/0x380 [ 733.292098][T26999] generic_splice_sendpage+0x3c/0x50 [ 733.297405][T26999] ? splice_from_pipe+0x170/0x170 [ 733.302460][T26999] do_splice+0x70a/0x13c0 [ 733.306812][T26999] ? opipe_prep.part.0+0x2d0/0x2d0 [ 733.311933][T26999] ? __fget_light+0x1a9/0x230 [ 733.316622][T26999] __ia32_sys_splice+0x2c4/0x330 [ 733.321582][T26999] do_fast_syscall_32+0x281/0xc98 [ 733.326626][T26999] entry_SYSENTER_compat+0x70/0x7f [ 733.331745][T26999] RIP: 0023:0xf7fb8869 [ 733.335826][T26999] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 05:07:29 executing program 0: mknod(&(0x7f0000000000)='./bus\x00', 0x2080008002, 0x28aa) r0 = open(&(0x7f0000000400)='./bus\x00', 0x1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="000000186004000000010008000000000000000000000000000000000000f509f6ceb74de0ba9e1f38928607", 0x2c}], 0x1) [ 733.355443][T26999] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 733.363880][T26999] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 733.371865][T26999] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 733.379941][T26999] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 733.387930][T26999] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 733.395915][T26999] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:29 executing program 0: mknod(&(0x7f0000000000)='./bus\x00', 0x2080008002, 0x28aa) r0 = open(&(0x7f0000000400)='./bus\x00', 0x1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)="000000186004000000002008000000000000000000000000000000000000f509f6ceb74de0ba9e1f38928607", 0x2c}], 0x1) 05:07:29 executing program 0: socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, 0x0) r2 = dup2(r0, r1) write$P9_RWRITE(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001cc0), &(0x7f0000001d00)=0xc) sendmsg$netlink(r2, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f00000001c0)={0x14, 0x28, 0x0, 0x0, 0x0, "", [@generic, @nested={0x4}]}, 0x14}, {0x0}, {&(0x7f0000000800)={0x10}, 0x10}], 0x3, 0x0, 0x0, 0x1}, 0x0) 05:07:29 executing program 3 (fault-call:6 fault-nth:43): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:29 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000600, 0x0) 05:07:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x400000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) dup(0xffffffffffffffff) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=""/241, 0x10}], 0x20000000000002f4) write$uinput_user_dev(r0, 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00\x00\x00\x00\x04\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) [ 733.856648][T27035] input: syz1 as /devices/virtual/input/input1039 [ 733.942146][T27033] FAULT_INJECTION: forcing a failure. [ 733.942146][T27033] name failslab, interval 1, probability 0, space 0, times 0 [ 733.961854][T27033] CPU: 0 PID: 27033 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 733.969789][T27033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 733.979938][T27033] Call Trace: [ 733.983247][T27033] dump_stack+0x172/0x1f0 [ 733.987594][T27033] should_fail.cold+0xa/0x15 [ 733.992197][T27033] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 733.998025][T27033] ? ___might_sleep+0x163/0x280 [ 734.002906][T27033] __should_failslab+0x121/0x190 [ 734.007855][T27033] should_failslab+0x9/0x14 [ 734.012365][T27033] __kmalloc+0x2dc/0x740 [ 734.016614][T27033] ? __local_bh_enable_ip+0x15a/0x270 [ 734.021996][T27033] ? lock_sock_nested+0xe2/0x120 [ 734.026942][T27033] ? __local_bh_enable_ip+0x15a/0x270 [ 734.032328][T27033] ? lockdep_hardirqs_on+0x418/0x5d0 [ 734.037627][T27033] ? lock_sock_nested+0x9a/0x120 [ 734.042568][T27033] ? sock_kmalloc+0xc6/0x120 [ 734.047165][T27033] sock_kmalloc+0xc6/0x120 [ 734.051768][T27033] hash_alloc_result.part.0+0x95/0x110 [ 734.057245][T27033] hash_sendpage+0x7b3/0x9e0 [ 734.061861][T27033] kernel_sendpage+0x95/0xf0 [ 734.066464][T27033] ? hash_sendmsg+0xad0/0xad0 [ 734.071156][T27033] sock_sendpage+0x8b/0xc0 [ 734.075591][T27033] ? lockdep_hardirqs_on+0x418/0x5d0 [ 734.080897][T27033] pipe_to_sendpage+0x299/0x370 [ 734.085764][T27033] ? kernel_sendpage+0xf0/0xf0 [ 734.090545][T27033] ? direct_splice_actor+0x1a0/0x1a0 [ 734.095833][T27033] ? __put_page+0x92/0xd0 [ 734.100175][T27033] ? anon_pipe_buf_release+0x1c6/0x270 [ 734.105651][T27033] __splice_from_pipe+0x395/0x7d0 [ 734.110700][T27033] ? direct_splice_actor+0x1a0/0x1a0 [ 734.116009][T27033] ? direct_splice_actor+0x1a0/0x1a0 [ 734.121310][T27033] splice_from_pipe+0x108/0x170 [ 734.126196][T27033] ? splice_shrink_spd+0xd0/0xd0 [ 734.131151][T27033] ? apparmor_file_permission+0x25/0x30 [ 734.136711][T27033] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 734.142964][T27033] ? security_file_permission+0x94/0x380 [ 734.148614][T27033] generic_splice_sendpage+0x3c/0x50 [ 734.153998][T27033] ? splice_from_pipe+0x170/0x170 [ 734.159031][T27033] do_splice+0x70a/0x13c0 [ 734.163393][T27033] ? opipe_prep.part.0+0x2d0/0x2d0 [ 734.168521][T27033] ? __fget_light+0x1a9/0x230 [ 734.173241][T27033] __ia32_sys_splice+0x2c4/0x330 [ 734.178198][T27033] do_fast_syscall_32+0x281/0xc98 [ 734.183252][T27033] entry_SYSENTER_compat+0x70/0x7f [ 734.188372][T27033] RIP: 0023:0xf7fb8869 [ 734.192468][T27033] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 734.212091][T27033] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 734.220530][T27033] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 734.228516][T27033] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 734.236501][T27033] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 734.244485][T27033] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 734.252460][T27033] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:30 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\xc3\xa9[\x00', @ifru_flags=0x1}) [ 734.294774][T27011] eql: mtu less than device minimum 05:07:30 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:30 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x3f00) 05:07:31 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03\xee\xa9[\x00', @ifru_flags=0x1}) 05:07:31 executing program 3 (fault-call:6 fault-nth:44): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:31 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 734.951789][T27060] FAULT_INJECTION: forcing a failure. [ 734.951789][T27060] name failslab, interval 1, probability 0, space 0, times 0 [ 734.964844][T27060] CPU: 0 PID: 27060 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 734.972744][T27060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 734.982814][T27060] Call Trace: [ 734.986121][T27060] dump_stack+0x172/0x1f0 [ 734.990462][T27060] should_fail.cold+0xa/0x15 [ 734.995078][T27060] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 735.000900][T27060] ? ___might_sleep+0x163/0x280 [ 735.005765][T27060] __should_failslab+0x121/0x190 [ 735.010717][T27060] should_failslab+0x9/0x14 [ 735.015233][T27060] __kmalloc+0x2dc/0x740 [ 735.019486][T27060] ? __local_bh_enable_ip+0x15a/0x270 [ 735.024855][T27060] ? lock_sock_nested+0xe2/0x120 [ 735.029794][T27060] ? __local_bh_enable_ip+0x15a/0x270 [ 735.035348][T27060] ? lockdep_hardirqs_on+0x418/0x5d0 [ 735.040640][T27060] ? lock_sock_nested+0x9a/0x120 [ 735.045576][T27060] ? sock_kmalloc+0xc6/0x120 [ 735.050172][T27060] sock_kmalloc+0xc6/0x120 [ 735.054602][T27060] hash_alloc_result.part.0+0x95/0x110 [ 735.060100][T27060] hash_sendpage+0x7b3/0x9e0 [ 735.064703][T27060] kernel_sendpage+0x95/0xf0 [ 735.069313][T27060] ? hash_sendmsg+0xad0/0xad0 [ 735.074104][T27060] sock_sendpage+0x8b/0xc0 [ 735.078530][T27060] ? lockdep_hardirqs_on+0x418/0x5d0 [ 735.083831][T27060] pipe_to_sendpage+0x299/0x370 [ 735.088687][T27060] ? kernel_sendpage+0xf0/0xf0 [ 735.093458][T27060] ? direct_splice_actor+0x1a0/0x1a0 [ 735.098744][T27060] ? __put_page+0x92/0xd0 [ 735.103091][T27060] ? anon_pipe_buf_release+0x1c6/0x270 [ 735.108562][T27060] __splice_from_pipe+0x395/0x7d0 [ 735.113589][T27060] ? direct_splice_actor+0x1a0/0x1a0 [ 735.118877][T27060] ? direct_splice_actor+0x1a0/0x1a0 [ 735.124167][T27060] splice_from_pipe+0x108/0x170 [ 735.129027][T27060] ? splice_shrink_spd+0xd0/0xd0 [ 735.133994][T27060] ? apparmor_file_permission+0x25/0x30 [ 735.139534][T27060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 735.145773][T27060] ? security_file_permission+0x94/0x380 [ 735.151394][T27060] generic_splice_sendpage+0x3c/0x50 [ 735.156667][T27060] ? splice_from_pipe+0x170/0x170 [ 735.161687][T27060] do_splice+0x70a/0x13c0 [ 735.166021][T27060] ? opipe_prep.part.0+0x2d0/0x2d0 [ 735.171131][T27060] ? __fget_light+0x1a9/0x230 [ 735.175795][T27060] __ia32_sys_splice+0x2c4/0x330 [ 735.180735][T27060] do_fast_syscall_32+0x281/0xc98 [ 735.185761][T27060] entry_SYSENTER_compat+0x70/0x7f [ 735.190858][T27060] RIP: 0023:0xf7fb8869 [ 735.194908][T27060] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 735.214503][T27060] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 735.222906][T27060] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 735.230872][T27060] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 735.238836][T27060] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 735.246821][T27060] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 735.254781][T27060] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:31 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x4000) [ 735.470901][T27061] : renamed from eql 05:07:31 executing program 3 (fault-call:6 fault-nth:45): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:31 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\xc3\xa9[\x00', @ifru_flags=0x1}) [ 735.874090][T27072] FAULT_INJECTION: forcing a failure. [ 735.874090][T27072] name failslab, interval 1, probability 0, space 0, times 0 [ 735.893299][T27072] CPU: 1 PID: 27072 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 735.901226][T27072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 735.911374][T27072] Call Trace: [ 735.914713][T27072] dump_stack+0x172/0x1f0 [ 735.919061][T27072] should_fail.cold+0xa/0x15 [ 735.923685][T27072] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 735.929508][T27072] ? ___might_sleep+0x163/0x280 [ 735.934380][T27072] __should_failslab+0x121/0x190 [ 735.939383][T27072] should_failslab+0x9/0x14 [ 735.943907][T27072] __kmalloc+0x2dc/0x740 [ 735.948171][T27072] ? __local_bh_enable_ip+0x15a/0x270 [ 735.953568][T27072] ? lock_sock_nested+0xe2/0x120 [ 735.958517][T27072] ? __local_bh_enable_ip+0x15a/0x270 [ 735.963908][T27072] ? lockdep_hardirqs_on+0x418/0x5d0 [ 735.969209][T27072] ? lock_sock_nested+0x9a/0x120 [ 735.974151][T27072] ? sock_kmalloc+0xc6/0x120 [ 735.978755][T27072] sock_kmalloc+0xc6/0x120 [ 735.983192][T27072] hash_alloc_result.part.0+0x95/0x110 [ 735.988664][T27072] hash_sendpage+0x7b3/0x9e0 [ 735.993348][T27072] kernel_sendpage+0x95/0xf0 [ 735.997932][T27072] ? hash_sendmsg+0xad0/0xad0 [ 736.002691][T27072] sock_sendpage+0x8b/0xc0 [ 736.007101][T27072] ? lockdep_hardirqs_on+0x418/0x5d0 [ 736.012375][T27072] pipe_to_sendpage+0x299/0x370 [ 736.017211][T27072] ? kernel_sendpage+0xf0/0xf0 [ 736.022030][T27072] ? direct_splice_actor+0x1a0/0x1a0 [ 736.027344][T27072] ? __put_page+0x92/0xd0 [ 736.031661][T27072] ? anon_pipe_buf_release+0x1c6/0x270 [ 736.037125][T27072] __splice_from_pipe+0x395/0x7d0 [ 736.042499][T27072] ? direct_splice_actor+0x1a0/0x1a0 [ 736.047773][T27072] ? direct_splice_actor+0x1a0/0x1a0 [ 736.053048][T27072] splice_from_pipe+0x108/0x170 [ 736.057898][T27072] ? splice_shrink_spd+0xd0/0xd0 [ 736.062878][T27072] ? apparmor_file_permission+0x25/0x30 [ 736.068419][T27072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 736.074745][T27072] ? security_file_permission+0x94/0x380 [ 736.080388][T27072] generic_splice_sendpage+0x3c/0x50 [ 736.085673][T27072] ? splice_from_pipe+0x170/0x170 [ 736.090717][T27072] do_splice+0x70a/0x13c0 [ 736.095078][T27072] ? opipe_prep.part.0+0x2d0/0x2d0 [ 736.100214][T27072] ? __fget_light+0x1a9/0x230 [ 736.104896][T27072] __ia32_sys_splice+0x2c4/0x330 [ 736.109839][T27072] do_fast_syscall_32+0x281/0xc98 [ 736.114873][T27072] entry_SYSENTER_compat+0x70/0x7f [ 736.119973][T27072] RIP: 0023:0xf7fb8869 [ 736.124141][T27072] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 736.143740][T27072] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 736.152138][T27072] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 736.160099][T27072] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 05:07:32 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x1000000) [ 736.168056][T27072] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 736.176037][T27072] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 736.184020][T27072] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:32 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:32 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:32 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03\xf0\xa9[\x00', @ifru_flags=0x1}) 05:07:32 executing program 3 (fault-call:6 fault-nth:46): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 736.813445][T27098] FAULT_INJECTION: forcing a failure. [ 736.813445][T27098] name failslab, interval 1, probability 0, space 0, times 0 [ 736.833038][T27098] CPU: 1 PID: 27098 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 736.841032][T27098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 736.851131][T27098] Call Trace: [ 736.854449][T27098] dump_stack+0x172/0x1f0 [ 736.858805][T27098] should_fail.cold+0xa/0x15 [ 736.863428][T27098] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 736.869285][T27098] ? ___might_sleep+0x163/0x280 [ 736.874168][T27098] __should_failslab+0x121/0x190 [ 736.879130][T27098] should_failslab+0x9/0x14 [ 736.883651][T27098] __kmalloc+0x2dc/0x740 [ 736.887907][T27098] ? __local_bh_enable_ip+0x15a/0x270 [ 736.893296][T27098] ? lock_sock_nested+0xe2/0x120 [ 736.898250][T27098] ? __local_bh_enable_ip+0x15a/0x270 [ 736.903636][T27098] ? lockdep_hardirqs_on+0x418/0x5d0 [ 736.908949][T27098] ? lock_sock_nested+0x9a/0x120 [ 736.913897][T27098] ? sock_kmalloc+0xc6/0x120 [ 736.918506][T27098] sock_kmalloc+0xc6/0x120 [ 736.922949][T27098] hash_alloc_result.part.0+0x95/0x110 [ 736.928419][T27098] hash_sendpage+0x7b3/0x9e0 [ 736.933003][T27098] kernel_sendpage+0x95/0xf0 [ 736.937580][T27098] ? hash_sendmsg+0xad0/0xad0 [ 736.942244][T27098] sock_sendpage+0x8b/0xc0 [ 736.946643][T27098] ? lockdep_hardirqs_on+0x418/0x5d0 [ 736.951939][T27098] pipe_to_sendpage+0x299/0x370 [ 736.956781][T27098] ? kernel_sendpage+0xf0/0xf0 [ 736.961559][T27098] ? direct_splice_actor+0x1a0/0x1a0 [ 736.966829][T27098] ? __put_page+0x92/0xd0 [ 736.971149][T27098] ? anon_pipe_buf_release+0x1c6/0x270 [ 736.976593][T27098] __splice_from_pipe+0x395/0x7d0 [ 736.981608][T27098] ? direct_splice_actor+0x1a0/0x1a0 [ 736.986900][T27098] ? direct_splice_actor+0x1a0/0x1a0 [ 736.992287][T27098] splice_from_pipe+0x108/0x170 [ 736.997162][T27098] ? splice_shrink_spd+0xd0/0xd0 [ 737.002106][T27098] ? apparmor_file_permission+0x25/0x30 [ 737.007657][T27098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 737.013897][T27098] ? security_file_permission+0x94/0x380 [ 737.019543][T27098] generic_splice_sendpage+0x3c/0x50 [ 737.024826][T27098] ? splice_from_pipe+0x170/0x170 [ 737.029847][T27098] do_splice+0x70a/0x13c0 [ 737.034199][T27098] ? opipe_prep.part.0+0x2d0/0x2d0 [ 737.039302][T27098] ? __fget_light+0x1a9/0x230 [ 737.043976][T27098] __ia32_sys_splice+0x2c4/0x330 [ 737.048908][T27098] do_fast_syscall_32+0x281/0xc98 [ 737.053930][T27098] entry_SYSENTER_compat+0x70/0x7f [ 737.059025][T27098] RIP: 0023:0xf7fb8869 [ 737.063080][T27098] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 737.082673][T27098] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 737.091078][T27098] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 737.099042][T27098] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 05:07:33 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x3f000000) [ 737.107025][T27098] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 737.114985][T27098] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 737.122956][T27098] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:33 executing program 3 (fault-call:6 fault-nth:47): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:33 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:33 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:33 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8927, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 737.682278][T27108] FAULT_INJECTION: forcing a failure. [ 737.682278][T27108] name failslab, interval 1, probability 0, space 0, times 0 05:07:33 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03\xf3\xa9[\x00', @ifru_flags=0x1}) [ 737.784463][T27108] CPU: 0 PID: 27108 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 737.793607][T27108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.804191][T27108] Call Trace: [ 737.804218][T27108] dump_stack+0x172/0x1f0 [ 737.804240][T27108] should_fail.cold+0xa/0x15 [ 737.804259][T27108] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 737.804285][T27108] ? ___might_sleep+0x163/0x280 [ 737.822307][T27108] __should_failslab+0x121/0x190 [ 737.822326][T27108] should_failslab+0x9/0x14 [ 737.822342][T27108] __kmalloc+0x2dc/0x740 [ 737.822357][T27108] ? __local_bh_enable_ip+0x15a/0x270 [ 737.822370][T27108] ? lock_sock_nested+0xe2/0x120 [ 737.822382][T27108] ? __local_bh_enable_ip+0x15a/0x270 [ 737.822398][T27108] ? lockdep_hardirqs_on+0x418/0x5d0 [ 737.822409][T27108] ? lock_sock_nested+0x9a/0x120 [ 737.822429][T27108] ? sock_kmalloc+0xc6/0x120 [ 737.822445][T27108] sock_kmalloc+0xc6/0x120 [ 737.822466][T27108] hash_alloc_result.part.0+0x95/0x110 [ 737.822482][T27108] hash_sendpage+0x7b3/0x9e0 [ 737.822504][T27108] kernel_sendpage+0x95/0xf0 [ 737.822518][T27108] ? hash_sendmsg+0xad0/0xad0 [ 737.822536][T27108] sock_sendpage+0x8b/0xc0 [ 737.822549][T27108] ? lockdep_hardirqs_on+0x418/0x5d0 [ 737.822568][T27108] pipe_to_sendpage+0x299/0x370 [ 737.822584][T27108] ? kernel_sendpage+0xf0/0xf0 [ 737.822600][T27108] ? direct_splice_actor+0x1a0/0x1a0 [ 737.822613][T27108] ? __put_page+0x92/0xd0 [ 737.822632][T27108] ? anon_pipe_buf_release+0x1c6/0x270 [ 737.822651][T27108] __splice_from_pipe+0x395/0x7d0 [ 737.822667][T27108] ? direct_splice_actor+0x1a0/0x1a0 [ 737.822690][T27108] ? direct_splice_actor+0x1a0/0x1a0 [ 737.822705][T27108] splice_from_pipe+0x108/0x170 [ 737.822723][T27108] ? splice_shrink_spd+0xd0/0xd0 [ 737.822746][T27108] ? apparmor_file_permission+0x25/0x30 [ 737.822769][T27108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 737.832822][T27108] ? security_file_permission+0x94/0x380 [ 737.832844][T27108] generic_splice_sendpage+0x3c/0x50 [ 737.832859][T27108] ? splice_from_pipe+0x170/0x170 [ 737.832874][T27108] do_splice+0x70a/0x13c0 [ 737.832899][T27108] ? opipe_prep.part.0+0x2d0/0x2d0 [ 737.832919][T27108] ? __fget_light+0x1a9/0x230 [ 737.832939][T27108] __ia32_sys_splice+0x2c4/0x330 [ 737.832965][T27108] do_fast_syscall_32+0x281/0xc98 [ 737.832989][T27108] entry_SYSENTER_compat+0x70/0x7f [ 737.841859][T27108] RIP: 0023:0xf7fb8869 [ 737.841876][T27108] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 737.841885][T27108] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 737.841899][T27108] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 737.841908][T27108] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 737.841915][T27108] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 737.841923][T27108] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 05:07:34 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x40000000) [ 737.841932][T27108] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 738.096243][T27113] : renamed from eql 05:07:34 executing program 3 (fault-call:6 fault-nth:48): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:34 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8929, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 738.540059][T27132] FAULT_INJECTION: forcing a failure. [ 738.540059][T27132] name failslab, interval 1, probability 0, space 0, times 0 [ 738.553077][T27132] CPU: 0 PID: 27132 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 738.560990][T27132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 738.571319][T27132] Call Trace: [ 738.574746][T27132] dump_stack+0x172/0x1f0 [ 738.579124][T27132] should_fail.cold+0xa/0x15 [ 738.583741][T27132] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 738.589833][T27132] ? ___might_sleep+0x163/0x280 [ 738.594710][T27132] __should_failslab+0x121/0x190 [ 738.599669][T27132] should_failslab+0x9/0x14 [ 738.604192][T27132] __kmalloc+0x2dc/0x740 [ 738.608468][T27132] ? __local_bh_enable_ip+0x15a/0x270 [ 738.613864][T27132] ? lock_sock_nested+0xe2/0x120 [ 738.618865][T27132] ? __local_bh_enable_ip+0x15a/0x270 [ 738.624286][T27132] ? lockdep_hardirqs_on+0x418/0x5d0 [ 738.629698][T27132] ? lock_sock_nested+0x9a/0x120 [ 738.634652][T27132] ? sock_kmalloc+0xc6/0x120 [ 738.639281][T27132] sock_kmalloc+0xc6/0x120 [ 738.643828][T27132] hash_alloc_result.part.0+0x95/0x110 [ 738.651001][T27132] hash_sendpage+0x7b3/0x9e0 [ 738.655629][T27132] kernel_sendpage+0x95/0xf0 [ 738.660243][T27132] ? hash_sendmsg+0xad0/0xad0 [ 738.664971][T27132] sock_sendpage+0x8b/0xc0 [ 738.669424][T27132] ? lockdep_hardirqs_on+0x418/0x5d0 [ 738.676380][T27132] pipe_to_sendpage+0x299/0x370 [ 738.681354][T27132] ? kernel_sendpage+0xf0/0xf0 [ 738.686145][T27132] ? direct_splice_actor+0x1a0/0x1a0 [ 738.691465][T27132] ? __put_page+0x92/0xd0 [ 738.695825][T27132] ? anon_pipe_buf_release+0x1c6/0x270 [ 738.701697][T27132] __splice_from_pipe+0x395/0x7d0 [ 738.707057][T27132] ? direct_splice_actor+0x1a0/0x1a0 [ 738.712371][T27132] ? direct_splice_actor+0x1a0/0x1a0 [ 738.718234][T27132] splice_from_pipe+0x108/0x170 [ 738.723106][T27132] ? splice_shrink_spd+0xd0/0xd0 [ 738.728234][T27132] ? apparmor_file_permission+0x25/0x30 [ 738.734299][T27132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.740729][T27132] ? security_file_permission+0x94/0x380 [ 738.747186][T27132] generic_splice_sendpage+0x3c/0x50 [ 738.754884][T27132] ? splice_from_pipe+0x170/0x170 [ 738.759963][T27132] do_splice+0x70a/0x13c0 [ 738.764330][T27132] ? opipe_prep.part.0+0x2d0/0x2d0 [ 738.769478][T27132] ? __fget_light+0x1a9/0x230 [ 738.774554][T27132] __ia32_sys_splice+0x2c4/0x330 [ 738.779697][T27132] do_fast_syscall_32+0x281/0xc98 [ 738.784761][T27132] entry_SYSENTER_compat+0x70/0x7f [ 738.789877][T27132] RIP: 0023:0xf7fb8869 [ 738.793953][T27132] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 738.813584][T27132] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 738.822021][T27132] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 738.830084][T27132] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 738.838069][T27132] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 738.846212][T27132] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 738.854182][T27132] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:35 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x8dffffff) 05:07:35 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:35 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\xf4\xa9[\x00', @ifru_flags=0x1}) 05:07:35 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:35 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8930, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:35 executing program 3 (fault-call:6 fault-nth:49): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 739.405564][T27161] FAULT_INJECTION: forcing a failure. [ 739.405564][T27161] name failslab, interval 1, probability 0, space 0, times 0 [ 739.426639][T27161] CPU: 0 PID: 27161 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 739.434578][T27161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 739.444667][T27161] Call Trace: [ 739.447968][T27161] dump_stack+0x172/0x1f0 [ 739.452308][T27161] should_fail.cold+0xa/0x15 [ 739.456909][T27161] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 739.462727][T27161] ? ___might_sleep+0x163/0x280 [ 739.467587][T27161] __should_failslab+0x121/0x190 [ 739.472560][T27161] should_failslab+0x9/0x14 [ 739.477083][T27161] __kmalloc+0x2dc/0x740 [ 739.481340][T27161] ? __local_bh_enable_ip+0x15a/0x270 [ 739.486721][T27161] ? lock_sock_nested+0xe2/0x120 [ 739.491670][T27161] ? __local_bh_enable_ip+0x15a/0x270 [ 739.497060][T27161] ? lockdep_hardirqs_on+0x418/0x5d0 [ 739.502355][T27161] ? lock_sock_nested+0x9a/0x120 [ 739.502367][T27161] ? sock_kmalloc+0xc6/0x120 [ 739.502381][T27161] sock_kmalloc+0xc6/0x120 [ 739.502400][T27161] hash_alloc_result.part.0+0x95/0x110 [ 739.502422][T27161] hash_sendpage+0x7b3/0x9e0 [ 739.502442][T27161] kernel_sendpage+0x95/0xf0 [ 739.502456][T27161] ? hash_sendmsg+0xad0/0xad0 [ 739.502475][T27161] sock_sendpage+0x8b/0xc0 [ 739.516424][T27161] ? lockdep_hardirqs_on+0x418/0x5d0 [ 739.526465][T27161] pipe_to_sendpage+0x299/0x370 [ 739.535760][T27161] ? kernel_sendpage+0xf0/0xf0 [ 739.545460][T27161] ? direct_splice_actor+0x1a0/0x1a0 [ 739.555081][T27161] ? __put_page+0x92/0xd0 [ 739.564669][T27161] ? anon_pipe_buf_release+0x1c6/0x270 [ 739.571627][T27161] __splice_from_pipe+0x395/0x7d0 [ 739.571643][T27161] ? direct_splice_actor+0x1a0/0x1a0 [ 739.571661][T27161] ? direct_splice_actor+0x1a0/0x1a0 [ 739.571674][T27161] splice_from_pipe+0x108/0x170 [ 739.571689][T27161] ? splice_shrink_spd+0xd0/0xd0 [ 739.571710][T27161] ? apparmor_file_permission+0x25/0x30 [ 739.571732][T27161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 739.582051][T27161] ? security_file_permission+0x94/0x380 [ 739.592166][T27161] generic_splice_sendpage+0x3c/0x50 [ 739.592180][T27161] ? splice_from_pipe+0x170/0x170 [ 739.592193][T27161] do_splice+0x70a/0x13c0 [ 739.592214][T27161] ? opipe_prep.part.0+0x2d0/0x2d0 [ 739.592230][T27161] ? __fget_light+0x1a9/0x230 [ 739.592247][T27161] __ia32_sys_splice+0x2c4/0x330 [ 739.592271][T27161] do_fast_syscall_32+0x281/0xc98 [ 739.602774][T27161] entry_SYSENTER_compat+0x70/0x7f [ 739.614647][T27161] RIP: 0023:0xf7fb8869 [ 739.624952][T27161] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 739.634361][T27161] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 739.643985][T27161] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 739.654101][T27161] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 739.654117][T27161] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 739.677876][T27161] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 739.677885][T27161] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:36 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xf0ffffff) 05:07:36 executing program 3 (fault-call:6 fault-nth:50): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 740.230194][T27170] FAULT_INJECTION: forcing a failure. [ 740.230194][T27170] name failslab, interval 1, probability 0, space 0, times 0 [ 740.249307][T27170] CPU: 0 PID: 27170 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 740.257231][T27170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 740.267296][T27170] Call Trace: [ 740.270603][T27170] dump_stack+0x172/0x1f0 [ 740.274936][T27170] should_fail.cold+0xa/0x15 [ 740.279519][T27170] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 740.285318][T27170] ? ___might_sleep+0x163/0x280 [ 740.290159][T27170] __should_failslab+0x121/0x190 [ 740.295090][T27170] should_failslab+0x9/0x14 [ 740.299609][T27170] __kmalloc+0x2dc/0x740 [ 740.303852][T27170] ? __local_bh_enable_ip+0x15a/0x270 [ 740.309224][T27170] ? lock_sock_nested+0xe2/0x120 [ 740.314147][T27170] ? __local_bh_enable_ip+0x15a/0x270 [ 740.319508][T27170] ? lockdep_hardirqs_on+0x418/0x5d0 [ 740.324794][T27170] ? lock_sock_nested+0x9a/0x120 [ 740.329727][T27170] ? sock_kmalloc+0xc6/0x120 [ 740.334336][T27170] sock_kmalloc+0xc6/0x120 [ 740.338761][T27170] hash_alloc_result.part.0+0x95/0x110 [ 740.344232][T27170] hash_sendpage+0x7b3/0x9e0 [ 740.348879][T27170] kernel_sendpage+0x95/0xf0 [ 740.353512][T27170] ? hash_sendmsg+0xad0/0xad0 [ 740.358195][T27170] sock_sendpage+0x8b/0xc0 [ 740.362606][T27170] ? lockdep_hardirqs_on+0x418/0x5d0 [ 740.367891][T27170] pipe_to_sendpage+0x299/0x370 [ 740.372753][T27170] ? kernel_sendpage+0xf0/0xf0 [ 740.377519][T27170] ? direct_splice_actor+0x1a0/0x1a0 [ 740.382784][T27170] ? __put_page+0x92/0xd0 [ 740.387114][T27170] ? anon_pipe_buf_release+0x1c6/0x270 [ 740.392560][T27170] __splice_from_pipe+0x395/0x7d0 [ 740.397576][T27170] ? direct_splice_actor+0x1a0/0x1a0 [ 740.402871][T27170] ? direct_splice_actor+0x1a0/0x1a0 [ 740.408270][T27170] splice_from_pipe+0x108/0x170 [ 740.413120][T27170] ? splice_shrink_spd+0xd0/0xd0 [ 740.418096][T27170] ? apparmor_file_permission+0x25/0x30 [ 740.423636][T27170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 740.429888][T27170] ? security_file_permission+0x94/0x380 [ 740.435599][T27170] generic_splice_sendpage+0x3c/0x50 [ 740.440883][T27170] ? splice_from_pipe+0x170/0x170 [ 740.445939][T27170] do_splice+0x70a/0x13c0 [ 740.450281][T27170] ? opipe_prep.part.0+0x2d0/0x2d0 [ 740.455403][T27170] ? __fget_light+0x1a9/0x230 [ 740.460088][T27170] __ia32_sys_splice+0x2c4/0x330 [ 740.465035][T27170] do_fast_syscall_32+0x281/0xc98 [ 740.470052][T27170] entry_SYSENTER_compat+0x70/0x7f [ 740.475148][T27170] RIP: 0023:0xf7fb8869 [ 740.479287][T27170] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 740.498882][T27170] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 740.507297][T27170] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 740.515278][T27170] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 740.523254][T27170] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 740.531211][T27170] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 740.539170][T27170] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:36 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xffffff8d) 05:07:37 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:37 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:37 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03\xf5\xa9[\x00', @ifru_flags=0x1}) 05:07:37 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:37 executing program 3 (fault-call:6 fault-nth:51): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 741.237594][T27194] FAULT_INJECTION: forcing a failure. [ 741.237594][T27194] name failslab, interval 1, probability 0, space 0, times 0 [ 741.260100][T27194] CPU: 1 PID: 27194 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 741.268040][T27194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 741.278148][T27194] Call Trace: [ 741.281464][T27194] dump_stack+0x172/0x1f0 [ 741.285821][T27194] should_fail.cold+0xa/0x15 [ 741.290437][T27194] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 741.296271][T27194] ? ___might_sleep+0x163/0x280 [ 741.301147][T27194] __should_failslab+0x121/0x190 [ 741.306117][T27194] should_failslab+0x9/0x14 [ 741.310651][T27194] __kmalloc+0x2dc/0x740 [ 741.314895][T27194] ? __local_bh_enable_ip+0x15a/0x270 [ 741.320283][T27194] ? lock_sock_nested+0xe2/0x120 [ 741.325210][T27194] ? __local_bh_enable_ip+0x15a/0x270 [ 741.330576][T27194] ? lockdep_hardirqs_on+0x418/0x5d0 [ 741.335848][T27194] ? lock_sock_nested+0x9a/0x120 [ 741.340775][T27194] ? sock_kmalloc+0xc6/0x120 [ 741.345381][T27194] sock_kmalloc+0xc6/0x120 [ 741.349825][T27194] hash_alloc_result.part.0+0x95/0x110 [ 741.355309][T27194] hash_sendpage+0x7b3/0x9e0 [ 741.359891][T27194] kernel_sendpage+0x95/0xf0 [ 741.364484][T27194] ? hash_sendmsg+0xad0/0xad0 [ 741.369163][T27194] sock_sendpage+0x8b/0xc0 [ 741.373565][T27194] ? lockdep_hardirqs_on+0x418/0x5d0 [ 741.378863][T27194] pipe_to_sendpage+0x299/0x370 [ 741.383737][T27194] ? kernel_sendpage+0xf0/0xf0 [ 741.388494][T27194] ? direct_splice_actor+0x1a0/0x1a0 [ 741.393765][T27194] ? __put_page+0x92/0xd0 [ 741.398112][T27194] ? anon_pipe_buf_release+0x1c6/0x270 [ 741.403578][T27194] __splice_from_pipe+0x395/0x7d0 [ 741.408593][T27194] ? direct_splice_actor+0x1a0/0x1a0 [ 741.413924][T27194] ? direct_splice_actor+0x1a0/0x1a0 [ 741.419398][T27194] splice_from_pipe+0x108/0x170 [ 741.424260][T27194] ? splice_shrink_spd+0xd0/0xd0 [ 741.429191][T27194] ? apparmor_file_permission+0x25/0x30 [ 741.434725][T27194] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.440967][T27194] ? security_file_permission+0x94/0x380 [ 741.446625][T27194] generic_splice_sendpage+0x3c/0x50 [ 741.451949][T27194] ? splice_from_pipe+0x170/0x170 [ 741.456964][T27194] do_splice+0x70a/0x13c0 [ 741.461304][T27194] ? opipe_prep.part.0+0x2d0/0x2d0 [ 741.466417][T27194] ? __fget_light+0x1a9/0x230 [ 741.471085][T27194] __ia32_sys_splice+0x2c4/0x330 [ 741.476035][T27194] do_fast_syscall_32+0x281/0xc98 [ 741.481055][T27194] entry_SYSENTER_compat+0x70/0x7f [ 741.486149][T27194] RIP: 0023:0xf7fb8869 [ 741.490224][T27194] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 741.509818][T27194] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 741.518217][T27194] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 741.526181][T27194] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 741.534151][T27194] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 741.542111][T27194] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 741.550075][T27194] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:37 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xfffffff0) 05:07:38 executing program 3 (fault-call:6 fault-nth:52): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 742.031661][T27204] FAULT_INJECTION: forcing a failure. [ 742.031661][T27204] name failslab, interval 1, probability 0, space 0, times 0 [ 742.044889][T27204] CPU: 0 PID: 27204 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 742.052807][T27204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 742.062869][T27204] Call Trace: [ 742.066174][T27204] dump_stack+0x172/0x1f0 [ 742.070518][T27204] should_fail.cold+0xa/0x15 [ 742.075202][T27204] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 742.081043][T27204] ? ___might_sleep+0x163/0x280 [ 742.085915][T27204] __should_failslab+0x121/0x190 [ 742.090956][T27204] should_failslab+0x9/0x14 [ 742.095470][T27204] __kmalloc+0x2dc/0x740 [ 742.099726][T27204] ? __local_bh_enable_ip+0x15a/0x270 [ 742.105112][T27204] ? lock_sock_nested+0xe2/0x120 [ 742.110068][T27204] ? __local_bh_enable_ip+0x15a/0x270 [ 742.115455][T27204] ? lockdep_hardirqs_on+0x418/0x5d0 [ 742.120771][T27204] ? lock_sock_nested+0x9a/0x120 [ 742.125737][T27204] ? sock_kmalloc+0xc6/0x120 [ 742.130419][T27204] sock_kmalloc+0xc6/0x120 [ 742.134843][T27204] hash_alloc_result.part.0+0x95/0x110 [ 742.140287][T27204] hash_sendpage+0x7b3/0x9e0 [ 742.144862][T27204] kernel_sendpage+0x95/0xf0 [ 742.149452][T27204] ? hash_sendmsg+0xad0/0xad0 [ 742.154143][T27204] sock_sendpage+0x8b/0xc0 [ 742.158558][T27204] ? lockdep_hardirqs_on+0x418/0x5d0 [ 742.163835][T27204] pipe_to_sendpage+0x299/0x370 [ 742.168671][T27204] ? kernel_sendpage+0xf0/0xf0 [ 742.173447][T27204] ? direct_splice_actor+0x1a0/0x1a0 [ 742.178735][T27204] ? __put_page+0x92/0xd0 [ 742.183061][T27204] ? anon_pipe_buf_release+0x1c6/0x270 [ 742.188505][T27204] __splice_from_pipe+0x395/0x7d0 [ 742.193531][T27204] ? direct_splice_actor+0x1a0/0x1a0 [ 742.198817][T27204] ? direct_splice_actor+0x1a0/0x1a0 [ 742.204106][T27204] splice_from_pipe+0x108/0x170 [ 742.208967][T27204] ? splice_shrink_spd+0xd0/0xd0 [ 742.213921][T27204] ? apparmor_file_permission+0x25/0x30 [ 742.219470][T27204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 742.225714][T27204] ? security_file_permission+0x94/0x380 [ 742.231347][T27204] generic_splice_sendpage+0x3c/0x50 [ 742.236654][T27204] ? splice_from_pipe+0x170/0x170 [ 742.241664][T27204] do_splice+0x70a/0x13c0 [ 742.245999][T27204] ? opipe_prep.part.0+0x2d0/0x2d0 [ 742.251107][T27204] ? __fget_light+0x1a9/0x230 [ 742.255781][T27204] __ia32_sys_splice+0x2c4/0x330 [ 742.260706][T27204] do_fast_syscall_32+0x281/0xc98 [ 742.265712][T27204] entry_SYSENTER_compat+0x70/0x7f [ 742.270815][T27204] RIP: 0023:0xf7fb8869 [ 742.274873][T27204] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 742.294483][T27204] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 742.303411][T27204] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 742.311378][T27204] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 742.319347][T27204] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:07:38 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8932, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 742.327301][T27204] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 742.335254][T27204] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:38 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x100000000000000) 05:07:38 executing program 3 (fault-call:6 fault-nth:53): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:38 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x01\xf6\xa9[\x00', @ifru_flags=0x1}) 05:07:39 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:39 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 742.994225][T27222] FAULT_INJECTION: forcing a failure. [ 742.994225][T27222] name failslab, interval 1, probability 0, space 0, times 0 [ 743.007282][T27222] CPU: 1 PID: 27222 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 743.015190][T27222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 743.025262][T27222] Call Trace: [ 743.028574][T27222] dump_stack+0x172/0x1f0 [ 743.032933][T27222] should_fail.cold+0xa/0x15 [ 743.037545][T27222] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 743.043373][T27222] ? ___might_sleep+0x163/0x280 [ 743.048241][T27222] __should_failslab+0x121/0x190 [ 743.053199][T27222] should_failslab+0x9/0x14 [ 743.057716][T27222] __kmalloc+0x2dc/0x740 [ 743.061973][T27222] ? __local_bh_enable_ip+0x15a/0x270 [ 743.067358][T27222] ? lock_sock_nested+0xe2/0x120 [ 743.072311][T27222] ? __local_bh_enable_ip+0x15a/0x270 [ 743.077707][T27222] ? lockdep_hardirqs_on+0x418/0x5d0 [ 743.083011][T27222] ? lock_sock_nested+0x9a/0x120 [ 743.087968][T27222] ? sock_kmalloc+0xc6/0x120 [ 743.092583][T27222] sock_kmalloc+0xc6/0x120 [ 743.097028][T27222] hash_alloc_result.part.0+0x95/0x110 [ 743.102511][T27222] hash_sendpage+0x7b3/0x9e0 [ 743.107132][T27222] kernel_sendpage+0x95/0xf0 [ 743.111741][T27222] ? hash_sendmsg+0xad0/0xad0 [ 743.116452][T27222] sock_sendpage+0x8b/0xc0 [ 743.120987][T27222] ? lockdep_hardirqs_on+0x418/0x5d0 [ 743.126293][T27222] pipe_to_sendpage+0x299/0x370 [ 743.131163][T27222] ? kernel_sendpage+0xf0/0xf0 [ 743.135949][T27222] ? direct_splice_actor+0x1a0/0x1a0 [ 743.141248][T27222] ? __put_page+0x92/0xd0 [ 743.145597][T27222] ? anon_pipe_buf_release+0x1c6/0x270 [ 743.151086][T27222] __splice_from_pipe+0x395/0x7d0 [ 743.156131][T27222] ? direct_splice_actor+0x1a0/0x1a0 [ 743.161437][T27222] ? direct_splice_actor+0x1a0/0x1a0 [ 743.166742][T27222] splice_from_pipe+0x108/0x170 [ 743.171609][T27222] ? splice_shrink_spd+0xd0/0xd0 [ 743.176566][T27222] ? apparmor_file_permission+0x25/0x30 [ 743.182126][T27222] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 743.188383][T27222] ? security_file_permission+0x94/0x380 [ 743.194055][T27222] generic_splice_sendpage+0x3c/0x50 [ 743.199368][T27222] ? splice_from_pipe+0x170/0x170 [ 743.204433][T27222] do_splice+0x70a/0x13c0 [ 743.208784][T27222] ? opipe_prep.part.0+0x2d0/0x2d0 [ 743.213909][T27222] ? __fget_light+0x1a9/0x230 [ 743.218613][T27222] __ia32_sys_splice+0x2c4/0x330 [ 743.223572][T27222] do_fast_syscall_32+0x281/0xc98 [ 743.228623][T27222] entry_SYSENTER_compat+0x70/0x7f [ 743.233745][T27222] RIP: 0023:0xf7fb8869 [ 743.237824][T27222] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 743.257446][T27222] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 743.265873][T27222] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 743.273867][T27222] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 743.281851][T27222] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 743.289843][T27222] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 743.297834][T27222] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:39 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:39 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x3f00000000000000) 05:07:39 executing program 3 (fault-call:6 fault-nth:54): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 743.933816][T27242] FAULT_INJECTION: forcing a failure. [ 743.933816][T27242] name failslab, interval 1, probability 0, space 0, times 0 [ 743.959528][T27242] CPU: 1 PID: 27242 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 743.967463][T27242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 743.977522][T27242] Call Trace: [ 743.980812][T27242] dump_stack+0x172/0x1f0 [ 743.985160][T27242] should_fail.cold+0xa/0x15 [ 743.989763][T27242] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 743.995581][T27242] ? ___might_sleep+0x163/0x280 [ 744.000445][T27242] __should_failslab+0x121/0x190 [ 744.005398][T27242] should_failslab+0x9/0x14 [ 744.009949][T27242] __kmalloc+0x2dc/0x740 [ 744.014208][T27242] ? __local_bh_enable_ip+0x15a/0x270 [ 744.019587][T27242] ? lock_sock_nested+0xe2/0x120 [ 744.024625][T27242] ? __local_bh_enable_ip+0x15a/0x270 [ 744.030012][T27242] ? lockdep_hardirqs_on+0x418/0x5d0 [ 744.035309][T27242] ? lock_sock_nested+0x9a/0x120 [ 744.040257][T27242] ? sock_kmalloc+0xc6/0x120 [ 744.044860][T27242] sock_kmalloc+0xc6/0x120 [ 744.049292][T27242] hash_alloc_result.part.0+0x95/0x110 [ 744.054769][T27242] hash_sendpage+0x7b3/0x9e0 [ 744.059380][T27242] kernel_sendpage+0x95/0xf0 [ 744.063988][T27242] ? hash_sendmsg+0xad0/0xad0 [ 744.068684][T27242] sock_sendpage+0x8b/0xc0 [ 744.073117][T27242] ? lockdep_hardirqs_on+0x418/0x5d0 [ 744.078416][T27242] pipe_to_sendpage+0x299/0x370 [ 744.083279][T27242] ? kernel_sendpage+0xf0/0xf0 [ 744.088056][T27242] ? direct_splice_actor+0x1a0/0x1a0 [ 744.093349][T27242] ? __put_page+0x92/0xd0 [ 744.097690][T27242] ? anon_pipe_buf_release+0x1c6/0x270 [ 744.103166][T27242] __splice_from_pipe+0x395/0x7d0 [ 744.108206][T27242] ? direct_splice_actor+0x1a0/0x1a0 [ 744.113507][T27242] ? direct_splice_actor+0x1a0/0x1a0 [ 744.118804][T27242] splice_from_pipe+0x108/0x170 [ 744.123675][T27242] ? splice_shrink_spd+0xd0/0xd0 [ 744.128638][T27242] ? apparmor_file_permission+0x25/0x30 [ 744.134225][T27242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 744.140480][T27242] ? security_file_permission+0x94/0x380 [ 744.146138][T27242] generic_splice_sendpage+0x3c/0x50 [ 744.151439][T27242] ? splice_from_pipe+0x170/0x170 [ 744.156480][T27242] do_splice+0x70a/0x13c0 [ 744.160844][T27242] ? opipe_prep.part.0+0x2d0/0x2d0 [ 744.165985][T27242] ? __fget_light+0x1a9/0x230 [ 744.170771][T27242] __ia32_sys_splice+0x2c4/0x330 [ 744.175734][T27242] do_fast_syscall_32+0x281/0xc98 [ 744.180780][T27242] entry_SYSENTER_compat+0x70/0x7f [ 744.185901][T27242] RIP: 0023:0xf7fb8869 [ 744.189989][T27242] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 744.209605][T27242] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 744.218065][T27242] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 744.226054][T27242] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 05:07:40 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x4000000000000000) [ 744.234048][T27242] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 744.242035][T27242] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 744.250054][T27242] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:40 executing program 3 (fault-call:6 fault-nth:55): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:41 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x8dffffff00000000) [ 744.815503][T27251] FAULT_INJECTION: forcing a failure. [ 744.815503][T27251] name failslab, interval 1, probability 0, space 0, times 0 [ 744.848825][T27251] CPU: 1 PID: 27251 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 744.856759][T27251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 744.866994][T27251] Call Trace: [ 744.870302][T27251] dump_stack+0x172/0x1f0 [ 744.874641][T27251] should_fail.cold+0xa/0x15 [ 744.879238][T27251] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 744.885048][T27251] ? ___might_sleep+0x163/0x280 [ 744.889885][T27251] __should_failslab+0x121/0x190 [ 744.894897][T27251] should_failslab+0x9/0x14 [ 744.899398][T27251] __kmalloc+0x2dc/0x740 [ 744.903625][T27251] ? __local_bh_enable_ip+0x15a/0x270 [ 744.908976][T27251] ? lock_sock_nested+0xe2/0x120 [ 744.913909][T27251] ? __local_bh_enable_ip+0x15a/0x270 [ 744.919296][T27251] ? lockdep_hardirqs_on+0x418/0x5d0 [ 744.924587][T27251] ? lock_sock_nested+0x9a/0x120 [ 744.929531][T27251] ? sock_kmalloc+0xc6/0x120 [ 744.934132][T27251] sock_kmalloc+0xc6/0x120 [ 744.938565][T27251] hash_alloc_result.part.0+0x95/0x110 [ 744.944035][T27251] hash_sendpage+0x7b3/0x9e0 [ 744.948654][T27251] kernel_sendpage+0x95/0xf0 [ 744.953248][T27251] ? hash_sendmsg+0xad0/0xad0 [ 744.957951][T27251] sock_sendpage+0x8b/0xc0 [ 744.962380][T27251] ? lockdep_hardirqs_on+0x418/0x5d0 [ 744.967678][T27251] pipe_to_sendpage+0x299/0x370 [ 744.972545][T27251] ? kernel_sendpage+0xf0/0xf0 [ 744.977323][T27251] ? direct_splice_actor+0x1a0/0x1a0 [ 744.982618][T27251] ? __put_page+0x92/0xd0 [ 744.986959][T27251] ? anon_pipe_buf_release+0x1c6/0x270 [ 744.992431][T27251] __splice_from_pipe+0x395/0x7d0 [ 744.997472][T27251] ? direct_splice_actor+0x1a0/0x1a0 [ 745.002776][T27251] ? direct_splice_actor+0x1a0/0x1a0 [ 745.008091][T27251] splice_from_pipe+0x108/0x170 [ 745.012962][T27251] ? splice_shrink_spd+0xd0/0xd0 [ 745.017927][T27251] ? apparmor_file_permission+0x25/0x30 [ 745.023501][T27251] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.029847][T27251] ? security_file_permission+0x94/0x380 [ 745.035500][T27251] generic_splice_sendpage+0x3c/0x50 [ 745.040813][T27251] ? splice_from_pipe+0x170/0x170 [ 745.045860][T27251] do_splice+0x70a/0x13c0 [ 745.050214][T27251] ? opipe_prep.part.0+0x2d0/0x2d0 [ 745.055342][T27251] ? __fget_light+0x1a9/0x230 [ 745.060048][T27251] __ia32_sys_splice+0x2c4/0x330 [ 745.065017][T27251] do_fast_syscall_32+0x281/0xc98 [ 745.070061][T27251] entry_SYSENTER_compat+0x70/0x7f [ 745.075194][T27251] RIP: 0023:0xf7fb8869 [ 745.079275][T27251] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 745.098891][T27251] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 745.107326][T27251] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 745.115339][T27251] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 745.123326][T27251] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 745.131314][T27251] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 745.139297][T27251] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:41 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xf0ffffff00000000) 05:07:41 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:41 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03\xf8\xa9[\x00', @ifru_flags=0x1}) 05:07:41 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:41 executing program 3 (fault-call:6 fault-nth:56): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 745.680454][T27277] FAULT_INJECTION: forcing a failure. [ 745.680454][T27277] name failslab, interval 1, probability 0, space 0, times 0 [ 745.708822][T27277] CPU: 0 PID: 27277 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 745.716751][T27277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 745.726807][T27277] Call Trace: [ 745.730125][T27277] dump_stack+0x172/0x1f0 [ 745.734464][T27277] should_fail.cold+0xa/0x15 [ 745.739064][T27277] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 745.744892][T27277] ? ___might_sleep+0x163/0x280 [ 745.749750][T27277] __should_failslab+0x121/0x190 [ 745.754699][T27277] should_failslab+0x9/0x14 [ 745.759207][T27277] __kmalloc+0x2dc/0x740 [ 745.763454][T27277] ? __local_bh_enable_ip+0x15a/0x270 [ 745.768826][T27277] ? lock_sock_nested+0xe2/0x120 [ 745.773773][T27277] ? __local_bh_enable_ip+0x15a/0x270 [ 745.779154][T27277] ? lockdep_hardirqs_on+0x418/0x5d0 [ 745.784449][T27277] ? lock_sock_nested+0x9a/0x120 [ 745.789409][T27277] ? sock_kmalloc+0xc6/0x120 [ 745.794017][T27277] sock_kmalloc+0xc6/0x120 [ 745.798451][T27277] hash_alloc_result.part.0+0x95/0x110 [ 745.803907][T27277] hash_sendpage+0x7b3/0x9e0 [ 745.808495][T27277] kernel_sendpage+0x95/0xf0 [ 745.813076][T27277] ? hash_sendmsg+0xad0/0xad0 [ 745.817738][T27277] sock_sendpage+0x8b/0xc0 [ 745.822149][T27277] ? lockdep_hardirqs_on+0x418/0x5d0 [ 745.827450][T27277] pipe_to_sendpage+0x299/0x370 [ 745.832314][T27277] ? kernel_sendpage+0xf0/0xf0 [ 745.837099][T27277] ? direct_splice_actor+0x1a0/0x1a0 [ 745.842429][T27277] ? __put_page+0x92/0xd0 [ 745.846771][T27277] ? anon_pipe_buf_release+0x1c6/0x270 [ 745.852245][T27277] __splice_from_pipe+0x395/0x7d0 [ 745.857276][T27277] ? direct_splice_actor+0x1a0/0x1a0 [ 745.862579][T27277] ? direct_splice_actor+0x1a0/0x1a0 [ 745.867870][T27277] splice_from_pipe+0x108/0x170 [ 745.872820][T27277] ? splice_shrink_spd+0xd0/0xd0 [ 745.877781][T27277] ? apparmor_file_permission+0x25/0x30 [ 745.883348][T27277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 745.889608][T27277] ? security_file_permission+0x94/0x380 [ 745.895260][T27277] generic_splice_sendpage+0x3c/0x50 [ 745.900566][T27277] ? splice_from_pipe+0x170/0x170 [ 745.905606][T27277] do_splice+0x70a/0x13c0 [ 745.909961][T27277] ? opipe_prep.part.0+0x2d0/0x2d0 [ 745.915091][T27277] ? __fget_light+0x1a9/0x230 [ 745.919790][T27277] __ia32_sys_splice+0x2c4/0x330 [ 745.924746][T27277] do_fast_syscall_32+0x281/0xc98 [ 745.929775][T27277] entry_SYSENTER_compat+0x70/0x7f [ 745.934894][T27277] RIP: 0023:0xf7fb8869 [ 745.938973][T27277] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 745.958589][T27277] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 745.967023][T27277] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 05:07:42 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xffffffff00000000) [ 745.975048][T27277] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 745.983041][T27277] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 745.991026][T27277] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 745.999003][T27277] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:42 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:42 executing program 3 (fault-call:6 fault-nth:57): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:42 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 746.587006][T27291] FAULT_INJECTION: forcing a failure. [ 746.587006][T27291] name failslab, interval 1, probability 0, space 0, times 0 [ 746.618974][T27291] CPU: 1 PID: 27291 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 746.627107][T27291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 746.637429][T27291] Call Trace: [ 746.640727][T27291] dump_stack+0x172/0x1f0 [ 746.645048][T27291] should_fail.cold+0xa/0x15 [ 746.649639][T27291] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 746.655461][T27291] ? ___might_sleep+0x163/0x280 [ 746.660321][T27291] __should_failslab+0x121/0x190 [ 746.665287][T27291] should_failslab+0x9/0x14 [ 746.669806][T27291] __kmalloc+0x2dc/0x740 [ 746.676004][T27291] ? __local_bh_enable_ip+0x15a/0x270 [ 746.681385][T27291] ? lock_sock_nested+0xe2/0x120 [ 746.686333][T27291] ? __local_bh_enable_ip+0x15a/0x270 [ 746.691721][T27291] ? lockdep_hardirqs_on+0x418/0x5d0 [ 746.697017][T27291] ? lock_sock_nested+0x9a/0x120 [ 746.701963][T27291] ? sock_kmalloc+0xc6/0x120 [ 746.706583][T27291] sock_kmalloc+0xc6/0x120 [ 746.711027][T27291] hash_alloc_result.part.0+0x95/0x110 [ 746.717126][T27291] hash_sendpage+0x7b3/0x9e0 [ 746.721740][T27291] kernel_sendpage+0x95/0xf0 [ 746.726339][T27291] ? hash_sendmsg+0xad0/0xad0 [ 746.731023][T27291] sock_sendpage+0x8b/0xc0 [ 746.735453][T27291] ? lockdep_hardirqs_on+0x418/0x5d0 [ 746.740751][T27291] pipe_to_sendpage+0x299/0x370 [ 746.745612][T27291] ? kernel_sendpage+0xf0/0xf0 [ 746.750385][T27291] ? direct_splice_actor+0x1a0/0x1a0 [ 746.755679][T27291] ? __put_page+0x92/0xd0 [ 746.760025][T27291] ? anon_pipe_buf_release+0x1c6/0x270 [ 746.765514][T27291] __splice_from_pipe+0x395/0x7d0 [ 746.770557][T27291] ? direct_splice_actor+0x1a0/0x1a0 [ 746.775864][T27291] ? direct_splice_actor+0x1a0/0x1a0 [ 746.781161][T27291] splice_from_pipe+0x108/0x170 [ 746.786023][T27291] ? splice_shrink_spd+0xd0/0xd0 [ 746.791150][T27291] ? apparmor_file_permission+0x25/0x30 [ 746.796716][T27291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 746.802960][T27291] ? security_file_permission+0x94/0x380 [ 746.808587][T27291] generic_splice_sendpage+0x3c/0x50 [ 746.813860][T27291] ? splice_from_pipe+0x170/0x170 [ 746.818883][T27291] do_splice+0x70a/0x13c0 [ 746.823533][T27291] ? opipe_prep.part.0+0x2d0/0x2d0 [ 746.828635][T27291] ? __fget_light+0x1a9/0x230 [ 746.833316][T27291] __ia32_sys_splice+0x2c4/0x330 [ 746.838282][T27291] do_fast_syscall_32+0x281/0xc98 [ 746.843317][T27291] entry_SYSENTER_compat+0x70/0x7f [ 746.848454][T27291] RIP: 0023:0xf7fb8869 [ 746.852506][T27291] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 746.872192][T27291] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 746.880683][T27291] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 746.888650][T27291] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 746.896618][T27291] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 746.904593][T27291] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 746.912552][T27291] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:43 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8940, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:43 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000040)={0x0, 0x80000000, 0x0, 0x1}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f0000000180)=[0x0, 0x3], 0x2) r4 = accept4(r3, 0x0, 0x0, 0x0) write$P9_RSETATTR(r2, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r2, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r1, 0x0, r4, 0x0, 0x80000001, 0x0) 05:07:43 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03\xfa\xa9[\x00', @ifru_flags=0x1}) 05:07:43 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:43 executing program 3 (fault-call:6 fault-nth:58): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 747.474095][T27316] FAULT_INJECTION: forcing a failure. [ 747.474095][T27316] name failslab, interval 1, probability 0, space 0, times 0 [ 747.493966][T27316] CPU: 0 PID: 27316 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 747.501908][T27316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.511978][T27316] Call Trace: [ 747.515284][T27316] dump_stack+0x172/0x1f0 [ 747.519646][T27316] should_fail.cold+0xa/0x15 [ 747.524260][T27316] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 747.530098][T27316] ? ___might_sleep+0x163/0x280 [ 747.534970][T27316] __should_failslab+0x121/0x190 [ 747.539938][T27316] should_failslab+0x9/0x14 [ 747.544481][T27316] __kmalloc+0x2dc/0x740 [ 747.548738][T27316] ? __local_bh_enable_ip+0x15a/0x270 [ 747.554131][T27316] ? lock_sock_nested+0xe2/0x120 [ 747.559100][T27316] ? __local_bh_enable_ip+0x15a/0x270 [ 747.564495][T27316] ? lockdep_hardirqs_on+0x418/0x5d0 [ 747.571297][T27316] ? lock_sock_nested+0x9a/0x120 [ 747.576258][T27316] ? sock_kmalloc+0xc6/0x120 [ 747.580868][T27316] sock_kmalloc+0xc6/0x120 [ 747.585309][T27316] hash_alloc_result.part.0+0x95/0x110 [ 747.590801][T27316] hash_sendpage+0x7b3/0x9e0 [ 747.595427][T27316] kernel_sendpage+0x95/0xf0 [ 747.600045][T27316] ? hash_sendmsg+0xad0/0xad0 [ 747.604759][T27316] sock_sendpage+0x8b/0xc0 [ 747.609200][T27316] ? lockdep_hardirqs_on+0x418/0x5d0 [ 747.614504][T27316] pipe_to_sendpage+0x299/0x370 [ 747.619378][T27316] ? kernel_sendpage+0xf0/0xf0 [ 747.624202][T27316] ? direct_splice_actor+0x1a0/0x1a0 [ 747.629501][T27316] ? __put_page+0x92/0xd0 [ 747.633847][T27316] ? anon_pipe_buf_release+0x1c6/0x270 [ 747.639327][T27316] __splice_from_pipe+0x395/0x7d0 [ 747.644375][T27316] ? direct_splice_actor+0x1a0/0x1a0 [ 747.649688][T27316] ? direct_splice_actor+0x1a0/0x1a0 [ 747.654997][T27316] splice_from_pipe+0x108/0x170 [ 747.659877][T27316] ? splice_shrink_spd+0xd0/0xd0 [ 747.664852][T27316] ? apparmor_file_permission+0x25/0x30 [ 747.670414][T27316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 747.676682][T27316] ? security_file_permission+0x94/0x380 [ 747.688627][T27316] generic_splice_sendpage+0x3c/0x50 [ 747.694021][T27316] ? splice_from_pipe+0x170/0x170 [ 747.699102][T27316] do_splice+0x70a/0x13c0 [ 747.703461][T27316] ? opipe_prep.part.0+0x2d0/0x2d0 [ 747.708588][T27316] ? __fget_light+0x1a9/0x230 [ 747.713278][T27316] __ia32_sys_splice+0x2c4/0x330 [ 747.718237][T27316] do_fast_syscall_32+0x281/0xc98 [ 747.723285][T27316] entry_SYSENTER_compat+0x70/0x7f [ 747.728408][T27316] RIP: 0023:0xf7fb8869 [ 747.732495][T27316] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 747.752113][T27316] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 747.760545][T27316] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 747.768709][T27316] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 747.776697][T27316] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 747.784682][T27316] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 747.792671][T27316] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:44 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:44 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8941, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:44 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="30000000ab6c392ed0030fdc16091cee53733ff57c53055e93df9cfd0ba23deabbe753e6b05c53282a5187b065d09754c7225180927a70441977ec70808264772cda8c25f6672136efd7a7964a558e7a29152e5754d33880d11550e23e3e59038f7423d952dae9d82eb0587d05b2f7ea87b019b434d42ea08233e0a77befd7f761148e49fcca0c874d322cbe23e71b8dad1af344aefe4e37b1c817402df5beed1a4b76df11f02b69b621fd20bcf8", @ANYRES16=r2, @ANYBLOB="04002abd7000fddbdf2501000000000000000b0000000014001462726f6164636173742d6c696e6b0000"], 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x40011) r3 = openat$cgroup_ro(r0, &(0x7f0000000240)='pids.events\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r3, 0x80404521, &(0x7f0000000280)=""/42) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)=0x0) ptrace$peek(0x2, r6, &(0x7f0000000200)) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000300)={0x40, 0x0, 0x2}, 0x10) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4004ae52, &(0x7f0000000080)=0x2) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 05:07:44 executing program 3 (fault-call:6 fault-nth:59): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 748.366351][T27338] FAULT_INJECTION: forcing a failure. [ 748.366351][T27338] name failslab, interval 1, probability 0, space 0, times 0 [ 748.390539][T27338] CPU: 0 PID: 27338 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 748.398485][T27338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 748.408666][T27338] Call Trace: [ 748.411980][T27338] dump_stack+0x172/0x1f0 [ 748.416331][T27338] should_fail.cold+0xa/0x15 [ 748.420963][T27338] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 748.426831][T27338] ? ___might_sleep+0x163/0x280 [ 748.431708][T27338] __should_failslab+0x121/0x190 [ 748.436664][T27338] should_failslab+0x9/0x14 [ 748.441188][T27338] __kmalloc+0x2dc/0x740 [ 748.445454][T27338] ? __local_bh_enable_ip+0x15a/0x270 [ 748.450836][T27338] ? lock_sock_nested+0xe2/0x120 [ 748.455794][T27338] ? __local_bh_enable_ip+0x15a/0x270 [ 748.461193][T27338] ? lockdep_hardirqs_on+0x418/0x5d0 [ 748.466493][T27338] ? lock_sock_nested+0x9a/0x120 [ 748.471446][T27338] ? sock_kmalloc+0xc6/0x120 [ 748.476058][T27338] sock_kmalloc+0xc6/0x120 [ 748.480519][T27338] hash_alloc_result.part.0+0x95/0x110 [ 748.486026][T27338] hash_sendpage+0x7b3/0x9e0 [ 748.490635][T27338] kernel_sendpage+0x95/0xf0 [ 748.495238][T27338] ? hash_sendmsg+0xad0/0xad0 [ 748.499922][T27338] sock_sendpage+0x8b/0xc0 [ 748.504650][T27338] ? lockdep_hardirqs_on+0x418/0x5d0 [ 748.509951][T27338] pipe_to_sendpage+0x299/0x370 [ 748.514837][T27338] ? kernel_sendpage+0xf0/0xf0 [ 748.519600][T27338] ? direct_splice_actor+0x1a0/0x1a0 [ 748.524886][T27338] ? __put_page+0x92/0xd0 [ 748.529220][T27338] ? anon_pipe_buf_release+0x1c6/0x270 [ 748.534708][T27338] __splice_from_pipe+0x395/0x7d0 [ 748.539737][T27338] ? direct_splice_actor+0x1a0/0x1a0 [ 748.545034][T27338] ? direct_splice_actor+0x1a0/0x1a0 [ 748.550366][T27338] splice_from_pipe+0x108/0x170 [ 748.555225][T27338] ? splice_shrink_spd+0xd0/0xd0 [ 748.560160][T27338] ? apparmor_file_permission+0x25/0x30 [ 748.565706][T27338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 748.571949][T27338] ? security_file_permission+0x94/0x380 [ 748.577616][T27338] generic_splice_sendpage+0x3c/0x50 [ 748.582923][T27338] ? splice_from_pipe+0x170/0x170 [ 748.587954][T27338] do_splice+0x70a/0x13c0 [ 748.592290][T27338] ? opipe_prep.part.0+0x2d0/0x2d0 [ 748.597390][T27338] ? __fget_light+0x1a9/0x230 [ 748.602063][T27338] __ia32_sys_splice+0x2c4/0x330 [ 748.607013][T27338] do_fast_syscall_32+0x281/0xc98 [ 748.612059][T27338] entry_SYSENTER_compat+0x70/0x7f [ 748.617180][T27338] RIP: 0023:0xf7fb8869 [ 748.621274][T27338] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 748.640893][T27338] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 748.649299][T27338] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 748.657281][T27338] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 748.665272][T27338] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 748.673253][T27338] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 748.682589][T27338] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:44 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03\xfc\xa9[\x00', @ifru_flags=0x1}) 05:07:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffffff2e) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000000)={0xffffffff, 0xff, 0x7}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 05:07:45 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000005340)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r4, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) close(r4) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:45 executing program 3 (fault-call:6 fault-nth:60): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:45 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:45 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8942, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 749.349770][T27361] FAULT_INJECTION: forcing a failure. [ 749.349770][T27361] name failslab, interval 1, probability 0, space 0, times 0 [ 749.411104][T27361] CPU: 1 PID: 27361 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 749.419042][T27361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 749.419049][T27361] Call Trace: [ 749.419087][T27361] dump_stack+0x172/0x1f0 [ 749.419107][T27361] should_fail.cold+0xa/0x15 [ 749.419124][T27361] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 749.419151][T27361] ? ___might_sleep+0x163/0x280 [ 749.441413][T27361] __should_failslab+0x121/0x190 [ 749.441433][T27361] should_failslab+0x9/0x14 [ 749.441447][T27361] __kmalloc+0x2dc/0x740 [ 749.441464][T27361] ? __local_bh_enable_ip+0x15a/0x270 [ 749.441478][T27361] ? lock_sock_nested+0xe2/0x120 [ 749.441499][T27361] ? __local_bh_enable_ip+0x15a/0x270 [ 749.481480][T27361] ? lockdep_hardirqs_on+0x418/0x5d0 [ 749.486783][T27361] ? lock_sock_nested+0x9a/0x120 [ 749.491738][T27361] ? sock_kmalloc+0xc6/0x120 [ 749.496349][T27361] sock_kmalloc+0xc6/0x120 [ 749.500787][T27361] hash_alloc_result.part.0+0x95/0x110 [ 749.506272][T27361] hash_sendpage+0x7b3/0x9e0 [ 749.510895][T27361] kernel_sendpage+0x95/0xf0 [ 749.515510][T27361] ? hash_sendmsg+0xad0/0xad0 [ 749.520214][T27361] sock_sendpage+0x8b/0xc0 [ 749.524643][T27361] ? lockdep_hardirqs_on+0x418/0x5d0 [ 749.529951][T27361] pipe_to_sendpage+0x299/0x370 [ 749.534825][T27361] ? kernel_sendpage+0xf0/0xf0 [ 749.539612][T27361] ? direct_splice_actor+0x1a0/0x1a0 [ 749.544913][T27361] ? __put_page+0x92/0xd0 [ 749.549303][T27361] ? anon_pipe_buf_release+0x1c6/0x270 [ 749.554794][T27361] __splice_from_pipe+0x395/0x7d0 [ 749.559839][T27361] ? direct_splice_actor+0x1a0/0x1a0 [ 749.565156][T27361] ? direct_splice_actor+0x1a0/0x1a0 [ 749.571245][T27361] splice_from_pipe+0x108/0x170 [ 749.576129][T27361] ? splice_shrink_spd+0xd0/0xd0 [ 749.581108][T27361] ? apparmor_file_permission+0x25/0x30 [ 749.586661][T27361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 749.592928][T27361] ? security_file_permission+0x94/0x380 [ 749.598974][T27361] generic_splice_sendpage+0x3c/0x50 [ 749.605157][T27361] ? splice_from_pipe+0x170/0x170 05:07:45 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f00000000c0)=0xe8) write$P9_RSTATu(r1, &(0x7f0000000300)={0x92, 0x7d, 0x2, {{0x0, 0x79, 0x4d, 0x800, {0x40, 0x3}, 0x2000000, 0xf13, 0x4, 0xffffffff, 0x0, '', 0x1b, 'selinux,GPLem0security@em0#', 0x1d, 'Leth1vboxnet0nodevem0keyring&', 0xe, '$ppp0mime_type'}, 0x4, 'eth0', r2, r3, r4}}, 0x92) semget$private(0x0, 0x6, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r6, 0x0, 0x80000001, 0x0) [ 749.611346][T27361] do_splice+0x70a/0x13c0 [ 749.615675][T27361] ? opipe_prep.part.0+0x2d0/0x2d0 [ 749.620782][T27361] ? __fget_light+0x1a9/0x230 [ 749.625471][T27361] __ia32_sys_splice+0x2c4/0x330 [ 749.630419][T27361] do_fast_syscall_32+0x281/0xc98 [ 749.635473][T27361] entry_SYSENTER_compat+0x70/0x7f [ 749.640594][T27361] RIP: 0023:0xf7fb8869 [ 749.644677][T27361] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 749.664301][T27361] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 749.672745][T27361] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 749.680717][T27361] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 749.688708][T27361] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 749.696700][T27361] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 749.704685][T27361] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:46 executing program 3 (fault-call:6 fault-nth:61): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:46 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8943, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:46 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:46 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 750.219503][T27379] FAULT_INJECTION: forcing a failure. [ 750.219503][T27379] name failslab, interval 1, probability 0, space 0, times 0 [ 750.266724][T27379] CPU: 1 PID: 27379 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 750.274670][T27379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 750.284741][T27379] Call Trace: [ 750.288064][T27379] dump_stack+0x172/0x1f0 [ 750.292426][T27379] should_fail.cold+0xa/0x15 [ 750.297035][T27379] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 750.302871][T27379] ? ___might_sleep+0x163/0x280 [ 750.307755][T27379] __should_failslab+0x121/0x190 [ 750.312713][T27379] should_failslab+0x9/0x14 [ 750.317263][T27379] __kmalloc+0x2dc/0x740 [ 750.321526][T27379] ? __local_bh_enable_ip+0x15a/0x270 [ 750.326914][T27379] ? lock_sock_nested+0xe2/0x120 [ 750.331880][T27379] ? __local_bh_enable_ip+0x15a/0x270 [ 750.337301][T27379] ? lockdep_hardirqs_on+0x418/0x5d0 [ 750.342606][T27379] ? lock_sock_nested+0x9a/0x120 [ 750.347563][T27379] ? sock_kmalloc+0xc6/0x120 [ 750.352170][T27379] sock_kmalloc+0xc6/0x120 [ 750.356697][T27379] hash_alloc_result.part.0+0x95/0x110 [ 750.362178][T27379] hash_sendpage+0x7b3/0x9e0 [ 750.366795][T27379] kernel_sendpage+0x95/0xf0 [ 750.371487][T27379] ? hash_sendmsg+0xad0/0xad0 [ 750.376188][T27379] sock_sendpage+0x8b/0xc0 [ 750.380626][T27379] ? lockdep_hardirqs_on+0x418/0x5d0 [ 750.385950][T27379] pipe_to_sendpage+0x299/0x370 [ 750.390844][T27379] ? kernel_sendpage+0xf0/0xf0 [ 750.395628][T27379] ? direct_splice_actor+0x1a0/0x1a0 [ 750.400932][T27379] ? __put_page+0x92/0xd0 [ 750.405292][T27379] ? anon_pipe_buf_release+0x1c6/0x270 [ 750.410779][T27379] __splice_from_pipe+0x395/0x7d0 [ 750.415825][T27379] ? direct_splice_actor+0x1a0/0x1a0 [ 750.421160][T27379] ? direct_splice_actor+0x1a0/0x1a0 [ 750.426477][T27379] splice_from_pipe+0x108/0x170 [ 750.431358][T27379] ? splice_shrink_spd+0xd0/0xd0 [ 750.436325][T27379] ? apparmor_file_permission+0x25/0x30 [ 750.441896][T27379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 750.448194][T27379] ? security_file_permission+0x94/0x380 [ 750.453856][T27379] generic_splice_sendpage+0x3c/0x50 [ 750.459156][T27379] ? splice_from_pipe+0x170/0x170 [ 750.464201][T27379] do_splice+0x70a/0x13c0 [ 750.468560][T27379] ? opipe_prep.part.0+0x2d0/0x2d0 [ 750.473697][T27379] ? __fget_light+0x1a9/0x230 [ 750.478405][T27379] __ia32_sys_splice+0x2c4/0x330 [ 750.483374][T27379] do_fast_syscall_32+0x281/0xc98 [ 750.488427][T27379] entry_SYSENTER_compat+0x70/0x7f [ 750.493573][T27379] RIP: 0023:0xf7fb8869 [ 750.497655][T27379] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 750.517282][T27379] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 750.525704][T27379] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 750.525714][T27379] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 750.525723][T27379] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 750.525731][T27379] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 750.525740][T27379] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:46 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:46 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, 0x0) 05:07:46 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000000)=0x7fffffff, 0x4) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:46 executing program 3 (fault-call:6 fault-nth:62): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:47 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x03\xa9[\x00', @ifru_flags=0x1}) 05:07:47 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:47 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, 0x0) 05:07:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 751.086246][T27414] FAULT_INJECTION: forcing a failure. [ 751.086246][T27414] name failslab, interval 1, probability 0, space 0, times 0 [ 751.164144][T27414] CPU: 0 PID: 27414 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 751.172097][T27414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 751.182153][T27414] Call Trace: [ 751.182179][T27414] dump_stack+0x172/0x1f0 [ 751.182198][T27414] should_fail.cold+0xa/0x15 [ 751.182217][T27414] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 751.182236][T27414] ? ___might_sleep+0x163/0x280 [ 751.182255][T27414] __should_failslab+0x121/0x190 [ 751.182273][T27414] should_failslab+0x9/0x14 [ 751.182288][T27414] __kmalloc+0x2dc/0x740 [ 751.182313][T27414] ? __local_bh_enable_ip+0x15a/0x270 [ 751.205134][T27414] ? lock_sock_nested+0xe2/0x120 [ 751.205151][T27414] ? __local_bh_enable_ip+0x15a/0x270 [ 751.205168][T27414] ? lockdep_hardirqs_on+0x418/0x5d0 [ 751.205181][T27414] ? lock_sock_nested+0x9a/0x120 [ 751.205200][T27414] ? sock_kmalloc+0xc6/0x120 [ 751.229172][T27414] sock_kmalloc+0xc6/0x120 [ 751.229196][T27414] hash_alloc_result.part.0+0x95/0x110 [ 751.229211][T27414] hash_sendpage+0x7b3/0x9e0 [ 751.229232][T27414] kernel_sendpage+0x95/0xf0 [ 751.229244][T27414] ? hash_sendmsg+0xad0/0xad0 [ 751.229261][T27414] sock_sendpage+0x8b/0xc0 [ 751.229277][T27414] ? lockdep_hardirqs_on+0x418/0x5d0 [ 751.229296][T27414] pipe_to_sendpage+0x299/0x370 [ 751.229317][T27414] ? kernel_sendpage+0xf0/0xf0 [ 751.244907][T27414] ? direct_splice_actor+0x1a0/0x1a0 [ 751.244922][T27414] ? __put_page+0x92/0xd0 [ 751.244941][T27414] ? anon_pipe_buf_release+0x1c6/0x270 [ 751.244961][T27414] __splice_from_pipe+0x395/0x7d0 [ 751.253960][T27414] ? direct_splice_actor+0x1a0/0x1a0 [ 751.263993][T27414] ? direct_splice_actor+0x1a0/0x1a0 [ 751.264009][T27414] splice_from_pipe+0x108/0x170 [ 751.264031][T27414] ? splice_shrink_spd+0xd0/0xd0 [ 751.273281][T27414] ? apparmor_file_permission+0x25/0x30 [ 751.282975][T27414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 751.282992][T27414] ? security_file_permission+0x94/0x380 [ 751.283012][T27414] generic_splice_sendpage+0x3c/0x50 [ 751.283026][T27414] ? splice_from_pipe+0x170/0x170 [ 751.283042][T27414] do_splice+0x70a/0x13c0 [ 751.283069][T27414] ? opipe_prep.part.0+0x2d0/0x2d0 [ 751.283098][T27414] ? __fget_light+0x1a9/0x230 [ 751.283117][T27414] __ia32_sys_splice+0x2c4/0x330 [ 751.283141][T27414] do_fast_syscall_32+0x281/0xc98 [ 751.283163][T27414] entry_SYSENTER_compat+0x70/0x7f [ 751.298043][T27414] RIP: 0023:0xf7fb8869 [ 751.298058][T27414] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 751.298065][T27414] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 751.298092][T27414] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 751.298100][T27414] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 751.298109][T27414] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 751.298117][T27414] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 751.298125][T27414] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:47 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000000), 0x4) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) openat$cgroup_procs(r1, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:47 executing program 3 (fault-call:6 fault-nth:63): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:48 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, 0x0) 05:07:48 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 751.864353][T27449] FAULT_INJECTION: forcing a failure. [ 751.864353][T27449] name failslab, interval 1, probability 0, space 0, times 0 [ 751.913003][T27449] CPU: 0 PID: 27449 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 751.920953][T27449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 751.931009][T27449] Call Trace: [ 751.931036][T27449] dump_stack+0x172/0x1f0 [ 751.931056][T27449] should_fail.cold+0xa/0x15 [ 751.931083][T27449] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 751.931103][T27449] ? ___might_sleep+0x163/0x280 [ 751.931121][T27449] __should_failslab+0x121/0x190 [ 751.931139][T27449] should_failslab+0x9/0x14 [ 751.931154][T27449] __kmalloc+0x2dc/0x740 [ 751.931176][T27449] ? __local_bh_enable_ip+0x15a/0x270 [ 751.963391][T27449] ? lock_sock_nested+0xe2/0x120 [ 751.963410][T27449] ? __local_bh_enable_ip+0x15a/0x270 [ 751.963436][T27449] ? lockdep_hardirqs_on+0x418/0x5d0 [ 751.963450][T27449] ? lock_sock_nested+0x9a/0x120 [ 751.963468][T27449] ? sock_kmalloc+0xc6/0x120 [ 751.998146][T27449] sock_kmalloc+0xc6/0x120 [ 752.002584][T27449] hash_alloc_result.part.0+0x95/0x110 [ 752.008162][T27449] hash_sendpage+0x7b3/0x9e0 [ 752.012770][T27449] kernel_sendpage+0x95/0xf0 [ 752.017373][T27449] ? hash_sendmsg+0xad0/0xad0 [ 752.022085][T27449] sock_sendpage+0x8b/0xc0 [ 752.026514][T27449] ? lockdep_hardirqs_on+0x418/0x5d0 [ 752.031903][T27449] pipe_to_sendpage+0x299/0x370 [ 752.036769][T27449] ? kernel_sendpage+0xf0/0xf0 [ 752.041547][T27449] ? direct_splice_actor+0x1a0/0x1a0 [ 752.046843][T27449] ? __put_page+0x92/0xd0 [ 752.051190][T27449] ? anon_pipe_buf_release+0x1c6/0x270 [ 752.056669][T27449] __splice_from_pipe+0x395/0x7d0 [ 752.061709][T27449] ? direct_splice_actor+0x1a0/0x1a0 [ 752.067016][T27449] ? direct_splice_actor+0x1a0/0x1a0 [ 752.072318][T27449] splice_from_pipe+0x108/0x170 [ 752.077182][T27449] ? splice_shrink_spd+0xd0/0xd0 [ 752.082135][T27449] ? apparmor_file_permission+0x25/0x30 [ 752.087697][T27449] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.093956][T27449] ? security_file_permission+0x94/0x380 [ 752.099610][T27449] generic_splice_sendpage+0x3c/0x50 [ 752.104996][T27449] ? splice_from_pipe+0x170/0x170 [ 752.110034][T27449] do_splice+0x70a/0x13c0 05:07:48 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x04\xa9[\x00', @ifru_flags=0x1}) [ 752.114407][T27449] ? opipe_prep.part.0+0x2d0/0x2d0 [ 752.119552][T27449] ? __fget_light+0x1a9/0x230 [ 752.124442][T27449] __ia32_sys_splice+0x2c4/0x330 [ 752.129408][T27449] do_fast_syscall_32+0x281/0xc98 [ 752.134544][T27449] entry_SYSENTER_compat+0x70/0x7f [ 752.139664][T27449] RIP: 0023:0xf7fb8869 [ 752.143770][T27449] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 752.163392][T27449] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 752.171828][T27449] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 752.179804][T27449] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 752.187869][T27449] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 752.195857][T27449] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 752.203858][T27449] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:48 executing program 3 (fault-call:6 fault-nth:64): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:48 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x0) r4 = mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3, 0x10, r0, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000180)={0x58, 0x0, &(0x7f0000000040)=[@free_buffer={0x40086303, r4}, @increfs={0x40046304, 0x4}, @request_death={0x400c630e, 0x1, 0x4}, @dead_binder_done={0x40086310, 0x3}, @request_death={0x400c630e, 0x0, 0x1}, @increfs={0x40046304, 0x3}, @request_death={0x400c630e, 0x3, 0x4}], 0x27, 0x0, &(0x7f00000000c0)="0005591695f950a20d167c87574243d5cada19a653b28f77403d055e366a9d9469fb66b79b5612"}) r5 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000340)={0xc, 0x8, 0xfa00, {&(0x7f00000001c0)}}, 0x10) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 05:07:48 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags}) [ 752.788129][T27472] FAULT_INJECTION: forcing a failure. [ 752.788129][T27472] name failslab, interval 1, probability 0, space 0, times 0 [ 752.822101][T27472] CPU: 1 PID: 27472 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 752.830041][T27472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 752.840117][T27472] Call Trace: [ 752.843433][T27472] dump_stack+0x172/0x1f0 [ 752.847786][T27472] should_fail.cold+0xa/0x15 [ 752.852396][T27472] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 752.858316][T27472] ? ___might_sleep+0x163/0x280 [ 752.863194][T27472] __should_failslab+0x121/0x190 [ 752.868153][T27472] should_failslab+0x9/0x14 [ 752.872674][T27472] __kmalloc+0x2dc/0x740 [ 752.876940][T27472] ? __local_bh_enable_ip+0x15a/0x270 [ 752.882321][T27472] ? lock_sock_nested+0xe2/0x120 [ 752.887268][T27472] ? __local_bh_enable_ip+0x15a/0x270 [ 752.887289][T27472] ? lockdep_hardirqs_on+0x418/0x5d0 [ 752.887305][T27472] ? lock_sock_nested+0x9a/0x120 [ 752.887318][T27472] ? sock_kmalloc+0xc6/0x120 [ 752.887337][T27472] sock_kmalloc+0xc6/0x120 [ 752.887359][T27472] hash_alloc_result.part.0+0x95/0x110 [ 752.887382][T27472] hash_sendpage+0x7b3/0x9e0 [ 752.898055][T27472] kernel_sendpage+0x95/0xf0 [ 752.898084][T27472] ? hash_sendmsg+0xad0/0xad0 [ 752.898105][T27472] sock_sendpage+0x8b/0xc0 05:07:49 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 752.898121][T27472] ? lockdep_hardirqs_on+0x418/0x5d0 [ 752.898147][T27472] pipe_to_sendpage+0x299/0x370 [ 752.907691][T27472] ? kernel_sendpage+0xf0/0xf0 [ 752.907710][T27472] ? direct_splice_actor+0x1a0/0x1a0 [ 752.907726][T27472] ? __put_page+0x92/0xd0 [ 752.907745][T27472] ? anon_pipe_buf_release+0x1c6/0x270 [ 752.907763][T27472] __splice_from_pipe+0x395/0x7d0 [ 752.907786][T27472] ? direct_splice_actor+0x1a0/0x1a0 [ 752.917682][T27472] ? direct_splice_actor+0x1a0/0x1a0 [ 752.917698][T27472] splice_from_pipe+0x108/0x170 [ 752.917716][T27472] ? splice_shrink_spd+0xd0/0xd0 [ 752.917739][T27472] ? apparmor_file_permission+0x25/0x30 [ 752.917756][T27472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 752.917772][T27472] ? security_file_permission+0x94/0x380 [ 752.917795][T27472] generic_splice_sendpage+0x3c/0x50 [ 752.926978][T27472] ? splice_from_pipe+0x170/0x170 [ 752.926993][T27472] do_splice+0x70a/0x13c0 [ 752.927019][T27472] ? opipe_prep.part.0+0x2d0/0x2d0 [ 752.927039][T27472] ? __fget_light+0x1a9/0x230 [ 752.927057][T27472] __ia32_sys_splice+0x2c4/0x330 [ 752.927090][T27472] do_fast_syscall_32+0x281/0xc98 [ 752.936194][T27472] entry_SYSENTER_compat+0x70/0x7f [ 752.936209][T27472] RIP: 0023:0xf7fb8869 [ 752.936224][T27472] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 752.936233][T27472] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 752.936247][T27472] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 752.936256][T27472] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 752.936264][T27472] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 752.936272][T27472] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 752.936287][T27472] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:49 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x05\xa9[\x00', @ifru_flags=0x1}) 05:07:49 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags}) 05:07:49 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:49 executing program 3 (fault-call:6 fault-nth:65): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:49 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000000)=0x13004) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000080)={0x1f, 0x5, 0x4}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FS_IOC_GETFLAGS(r2, 0x80046601, &(0x7f0000000040)) [ 753.742221][T27506] FAULT_INJECTION: forcing a failure. [ 753.742221][T27506] name failslab, interval 1, probability 0, space 0, times 0 [ 753.755366][T27506] CPU: 0 PID: 27506 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 753.763272][T27506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 753.763278][T27506] Call Trace: [ 753.763303][T27506] dump_stack+0x172/0x1f0 [ 753.763324][T27506] should_fail.cold+0xa/0x15 [ 753.763343][T27506] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 753.763364][T27506] ? ___might_sleep+0x163/0x280 [ 753.763387][T27506] __should_failslab+0x121/0x190 [ 753.801256][T27506] should_failslab+0x9/0x14 [ 753.805808][T27506] __kmalloc+0x2dc/0x740 [ 753.810059][T27506] ? __local_bh_enable_ip+0x15a/0x270 [ 753.815462][T27506] ? lock_sock_nested+0xe2/0x120 [ 753.820416][T27506] ? __local_bh_enable_ip+0x15a/0x270 [ 753.825812][T27506] ? lockdep_hardirqs_on+0x418/0x5d0 [ 753.831120][T27506] ? lock_sock_nested+0x9a/0x120 [ 753.836069][T27506] ? sock_kmalloc+0xc6/0x120 [ 753.840687][T27506] sock_kmalloc+0xc6/0x120 [ 753.845142][T27506] hash_alloc_result.part.0+0x95/0x110 [ 753.850614][T27506] hash_sendpage+0x7b3/0x9e0 [ 753.855234][T27506] kernel_sendpage+0x95/0xf0 [ 753.859858][T27506] ? hash_sendmsg+0xad0/0xad0 [ 753.864548][T27506] sock_sendpage+0x8b/0xc0 [ 753.868974][T27506] ? lockdep_hardirqs_on+0x418/0x5d0 [ 753.874268][T27506] pipe_to_sendpage+0x299/0x370 [ 753.879134][T27506] ? kernel_sendpage+0xf0/0xf0 [ 753.884003][T27506] ? direct_splice_actor+0x1a0/0x1a0 [ 753.889302][T27506] ? __put_page+0x92/0xd0 [ 753.893647][T27506] ? anon_pipe_buf_release+0x1c6/0x270 [ 753.899129][T27506] __splice_from_pipe+0x395/0x7d0 [ 753.904168][T27506] ? direct_splice_actor+0x1a0/0x1a0 [ 753.909480][T27506] ? direct_splice_actor+0x1a0/0x1a0 [ 753.914777][T27506] splice_from_pipe+0x108/0x170 [ 753.919643][T27506] ? splice_shrink_spd+0xd0/0xd0 [ 753.924599][T27506] ? apparmor_file_permission+0x25/0x30 [ 753.930162][T27506] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 753.936410][T27506] ? security_file_permission+0x94/0x380 [ 753.942084][T27506] generic_splice_sendpage+0x3c/0x50 [ 753.947384][T27506] ? splice_from_pipe+0x170/0x170 [ 753.952434][T27506] do_splice+0x70a/0x13c0 [ 753.956788][T27506] ? opipe_prep.part.0+0x2d0/0x2d0 [ 753.961912][T27506] ? __fget_light+0x1a9/0x230 [ 753.966609][T27506] __ia32_sys_splice+0x2c4/0x330 [ 753.971572][T27506] do_fast_syscall_32+0x281/0xc98 [ 753.976612][T27506] entry_SYSENTER_compat+0x70/0x7f [ 753.981739][T27506] RIP: 0023:0xf7fb8869 [ 753.985852][T27506] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 754.005468][T27506] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 754.013996][T27506] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 754.021991][T27506] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 754.029971][T27506] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 754.037948][T27506] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 754.045931][T27506] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:50 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags}) 05:07:50 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:50 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:50 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\a\xa9[\x00', @ifru_flags=0x1}) 05:07:50 executing program 3 (fault-call:6 fault-nth:66): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:50 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x894c, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 754.634885][T27529] FAULT_INJECTION: forcing a failure. [ 754.634885][T27529] name failslab, interval 1, probability 0, space 0, times 0 [ 754.657272][T27529] CPU: 0 PID: 27529 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 754.665215][T27529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 754.676605][T27529] Call Trace: [ 754.679934][T27529] dump_stack+0x172/0x1f0 [ 754.684279][T27529] should_fail.cold+0xa/0x15 [ 754.688884][T27529] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 754.694736][T27529] ? ___might_sleep+0x163/0x280 [ 754.699607][T27529] __should_failslab+0x121/0x190 [ 754.704560][T27529] should_failslab+0x9/0x14 [ 754.709086][T27529] __kmalloc+0x2dc/0x740 [ 754.713341][T27529] ? __local_bh_enable_ip+0x15a/0x270 [ 754.718719][T27529] ? lock_sock_nested+0xe2/0x120 [ 754.723686][T27529] ? __local_bh_enable_ip+0x15a/0x270 [ 754.729088][T27529] ? lockdep_hardirqs_on+0x418/0x5d0 [ 754.734385][T27529] ? lock_sock_nested+0x9a/0x120 [ 754.739336][T27529] ? sock_kmalloc+0xc6/0x120 [ 754.743940][T27529] sock_kmalloc+0xc6/0x120 [ 754.748380][T27529] hash_alloc_result.part.0+0x95/0x110 [ 754.753861][T27529] hash_sendpage+0x7b3/0x9e0 [ 754.758479][T27529] kernel_sendpage+0x95/0xf0 [ 754.763088][T27529] ? hash_sendmsg+0xad0/0xad0 [ 754.767778][T27529] sock_sendpage+0x8b/0xc0 [ 754.772205][T27529] ? lockdep_hardirqs_on+0x418/0x5d0 [ 754.777509][T27529] pipe_to_sendpage+0x299/0x370 [ 754.782374][T27529] ? kernel_sendpage+0xf0/0xf0 [ 754.787148][T27529] ? direct_splice_actor+0x1a0/0x1a0 [ 754.792455][T27529] ? __put_page+0x92/0xd0 [ 754.796803][T27529] ? anon_pipe_buf_release+0x1c6/0x270 [ 754.802281][T27529] __splice_from_pipe+0x395/0x7d0 [ 754.807320][T27529] ? direct_splice_actor+0x1a0/0x1a0 [ 754.812625][T27529] ? direct_splice_actor+0x1a0/0x1a0 [ 754.817923][T27529] splice_from_pipe+0x108/0x170 [ 754.822787][T27529] ? splice_shrink_spd+0xd0/0xd0 [ 754.827744][T27529] ? apparmor_file_permission+0x25/0x30 [ 754.833302][T27529] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 754.839586][T27529] ? security_file_permission+0x94/0x380 [ 754.845240][T27529] generic_splice_sendpage+0x3c/0x50 [ 754.850544][T27529] ? splice_from_pipe+0x170/0x170 [ 754.855585][T27529] do_splice+0x70a/0x13c0 [ 754.859934][T27529] ? opipe_prep.part.0+0x2d0/0x2d0 [ 754.865062][T27529] ? __fget_light+0x1a9/0x230 [ 754.869764][T27529] __ia32_sys_splice+0x2c4/0x330 [ 754.874724][T27529] do_fast_syscall_32+0x281/0xc98 [ 754.879764][T27529] entry_SYSENTER_compat+0x70/0x7f [ 754.884880][T27529] RIP: 0023:0xf7fb8869 [ 754.888956][T27529] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 754.908566][T27529] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 754.908582][T27529] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 754.908591][T27529] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 754.908600][T27529] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 754.908609][T27529] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 754.908618][T27529] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:51 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:51 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:51 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x400}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000180)={r4, @in6={{0xa, 0x4e24, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xe6ae}}, 0x6, 0x7, 0x0, 0x5, 0x8}, &(0x7f0000000240)=0x98) write$P9_RSETATTR(r0, &(0x7f0000000140)={0x7}, 0x7) write$P9_RSETATTR(r0, &(0x7f0000000040)={0x0, 0x1b, 0x1}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000000)={'veth1_to_hsr\x00', 0x8001}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:51 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\b\xa9[\x00', @ifru_flags=0x1}) 05:07:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:51 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8953, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:51 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:51 executing program 3 (fault-call:6 fault-nth:67): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 755.551957][T27563] FAULT_INJECTION: forcing a failure. [ 755.551957][T27563] name failslab, interval 1, probability 0, space 0, times 0 [ 755.578112][T27563] CPU: 1 PID: 27563 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 755.586065][T27563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 755.596147][T27563] Call Trace: [ 755.599456][T27563] dump_stack+0x172/0x1f0 [ 755.603806][T27563] should_fail.cold+0xa/0x15 [ 755.618597][T27563] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 755.624424][T27563] ? ___might_sleep+0x163/0x280 [ 755.629288][T27563] __should_failslab+0x121/0x190 [ 755.634242][T27563] should_failslab+0x9/0x14 [ 755.638753][T27563] __kmalloc+0x2dc/0x740 [ 755.643006][T27563] ? __local_bh_enable_ip+0x15a/0x270 [ 755.648391][T27563] ? lock_sock_nested+0xe2/0x120 [ 755.653367][T27563] ? __local_bh_enable_ip+0x15a/0x270 [ 755.658759][T27563] ? lockdep_hardirqs_on+0x418/0x5d0 [ 755.664062][T27563] ? lock_sock_nested+0x9a/0x120 [ 755.669028][T27563] ? sock_kmalloc+0xc6/0x120 [ 755.673632][T27563] sock_kmalloc+0xc6/0x120 [ 755.678577][T27563] hash_alloc_result.part.0+0x95/0x110 [ 755.684051][T27563] hash_sendpage+0x7b3/0x9e0 [ 755.688672][T27563] kernel_sendpage+0x95/0xf0 [ 755.693275][T27563] ? hash_sendmsg+0xad0/0xad0 [ 755.697971][T27563] sock_sendpage+0x8b/0xc0 [ 755.702400][T27563] ? lockdep_hardirqs_on+0x418/0x5d0 [ 755.707971][T27563] pipe_to_sendpage+0x299/0x370 [ 755.712837][T27563] ? kernel_sendpage+0xf0/0xf0 [ 755.717621][T27563] ? direct_splice_actor+0x1a0/0x1a0 [ 755.722926][T27563] ? __put_page+0x92/0xd0 [ 755.727275][T27563] ? anon_pipe_buf_release+0x1c6/0x270 [ 755.732753][T27563] __splice_from_pipe+0x395/0x7d0 [ 755.737785][T27563] ? direct_splice_actor+0x1a0/0x1a0 [ 755.743092][T27563] ? direct_splice_actor+0x1a0/0x1a0 [ 755.748421][T27563] splice_from_pipe+0x108/0x170 [ 755.753287][T27563] ? splice_shrink_spd+0xd0/0xd0 [ 755.753312][T27563] ? apparmor_file_permission+0x25/0x30 [ 755.753335][T27563] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 755.763818][T27563] ? security_file_permission+0x94/0x380 [ 755.763840][T27563] generic_splice_sendpage+0x3c/0x50 [ 755.763854][T27563] ? splice_from_pipe+0x170/0x170 [ 755.763869][T27563] do_splice+0x70a/0x13c0 [ 755.763893][T27563] ? opipe_prep.part.0+0x2d0/0x2d0 [ 755.775762][T27563] ? __fget_light+0x1a9/0x230 [ 755.775784][T27563] __ia32_sys_splice+0x2c4/0x330 [ 755.775808][T27563] do_fast_syscall_32+0x281/0xc98 [ 755.810143][T27563] entry_SYSENTER_compat+0x70/0x7f [ 755.815262][T27563] RIP: 0023:0xf7fb8869 [ 755.819330][T27563] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 755.838944][T27563] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 05:07:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) [ 755.847368][T27563] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 755.855360][T27563] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 755.863338][T27563] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 755.871323][T27563] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 755.879300][T27563] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:52 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r2, &(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYRES64=r3, @ANYRESHEX=r1, @ANYBLOB="09a57b2235ef912e35dbb8fe21b1ee2a666aa46626513afe7090e7aab7e6471c2186ffe3901b006b5a5ae0ea68bfc7cb7f412d06ab9518a708c6fac85075669f47a07c80ede397e02e0ad82afa89286f30dd1607537147cb05e547a9ebd89fa23b08c363e8f6f359fcd1140de92228abe333d1ae2f68371bbdbf1cd3b64f8e3632710a3a9cfe3e12ac646de6df9e425f5baf28836e65ae86c9a37e9e665e6cf860ce868b85e28bdcac63e2f4c4d212bfc1f33892d2f2326d4f2a18928408c0833788ff3a3e6823bf5f1f92c8b46ab80f2de4", @ANYRESHEX=r1], 0xfffffff7) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) 05:07:52 executing program 3 (fault-call:6 fault-nth:68): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:52 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) getpeername$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x7fffffff, 0x4) [ 756.484876][T27583] FAULT_INJECTION: forcing a failure. [ 756.484876][T27583] name failslab, interval 1, probability 0, space 0, times 0 [ 756.497804][T27583] CPU: 1 PID: 27583 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 756.505726][T27583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 756.515825][T27583] Call Trace: [ 756.519141][T27583] dump_stack+0x172/0x1f0 [ 756.523489][T27583] should_fail.cold+0xa/0x15 [ 756.528101][T27583] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 756.534019][T27583] ? ___might_sleep+0x163/0x280 [ 756.538887][T27583] __should_failslab+0x121/0x190 [ 756.543848][T27583] should_failslab+0x9/0x14 [ 756.548365][T27583] __kmalloc+0x2dc/0x740 [ 756.552621][T27583] ? __local_bh_enable_ip+0x15a/0x270 [ 756.558010][T27583] ? lock_sock_nested+0xe2/0x120 [ 756.562964][T27583] ? __local_bh_enable_ip+0x15a/0x270 [ 756.568359][T27583] ? lockdep_hardirqs_on+0x418/0x5d0 [ 756.573661][T27583] ? lock_sock_nested+0x9a/0x120 [ 756.578618][T27583] ? sock_kmalloc+0xc6/0x120 [ 756.583228][T27583] sock_kmalloc+0xc6/0x120 [ 756.587670][T27583] hash_alloc_result.part.0+0x95/0x110 [ 756.593155][T27583] hash_sendpage+0x7b3/0x9e0 [ 756.597768][T27583] kernel_sendpage+0x95/0xf0 [ 756.602369][T27583] ? hash_sendmsg+0xad0/0xad0 [ 756.607067][T27583] sock_sendpage+0x8b/0xc0 [ 756.611515][T27583] ? lockdep_hardirqs_on+0x418/0x5d0 [ 756.616818][T27583] pipe_to_sendpage+0x299/0x370 [ 756.621693][T27583] ? kernel_sendpage+0xf0/0xf0 [ 756.626480][T27583] ? direct_splice_actor+0x1a0/0x1a0 [ 756.631780][T27583] ? __put_page+0x92/0xd0 [ 756.636129][T27583] ? anon_pipe_buf_release+0x1c6/0x270 [ 756.641609][T27583] __splice_from_pipe+0x395/0x7d0 [ 756.646733][T27583] ? direct_splice_actor+0x1a0/0x1a0 [ 756.652051][T27583] ? direct_splice_actor+0x1a0/0x1a0 [ 756.657366][T27583] splice_from_pipe+0x108/0x170 [ 756.662231][T27583] ? splice_shrink_spd+0xd0/0xd0 [ 756.667187][T27583] ? apparmor_file_permission+0x25/0x30 [ 756.672742][T27583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 756.680524][T27583] ? security_file_permission+0x94/0x380 [ 756.686181][T27583] generic_splice_sendpage+0x3c/0x50 [ 756.691489][T27583] ? splice_from_pipe+0x170/0x170 [ 756.696552][T27583] do_splice+0x70a/0x13c0 [ 756.700914][T27583] ? opipe_prep.part.0+0x2d0/0x2d0 [ 756.706087][T27583] ? __fget_light+0x1a9/0x230 [ 756.710789][T27583] __ia32_sys_splice+0x2c4/0x330 [ 756.715759][T27583] do_fast_syscall_32+0x281/0xc98 [ 756.720809][T27583] entry_SYSENTER_compat+0x70/0x7f [ 756.725938][T27583] RIP: 0023:0xf7fb8869 [ 756.730016][T27583] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 756.749633][T27583] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 756.758089][T27583] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 756.766089][T27583] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 756.774090][T27583] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 05:07:53 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8955, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) [ 756.782111][T27583] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 756.790111][T27583] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:53 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x12\xa9[\x00', @ifru_flags=0x1}) 05:07:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:53 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:53 executing program 3 (fault-call:6 fault-nth:69): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:53 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000180)=0x60ec2c3d) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={0x0, 0x1f}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000240)={r4, 0x5e, "39cc96d23d2bdf94a21d6861e1fb3dc917dd33c7f74bc2d27a35ce14d5b8dce0220729a5ccadaaeb058dff0243a7e342b08f46bf936af6ff12cb74cfbdeca1ed178139dd4201f215d3056f32d00ee1fa9b8573e2e321dff3ba3b807cc28a"}, &(0x7f00000002c0)=0x66) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0', "d0660a1ec1a74c6f92a8c8a4dfa6dd5ab22990d586c22c11ca1e831e8057721a5970803544664055b60e5a5533658d55ebac0b09563d062b23bd42cc1019111d2383881c504143362ea349e7f060ea3263910ddf432ddf262d4b5258be1b0ebd3c18abef0b01f410fbbc16367943fd0d012644baae3c48781fcf173f54104f32ee87feaf74bdc6a42dece282c16eb67dd0a879becfd1cad0fb26262aa10c5f0566f8d12438a0ec4ead38be29c47d6e7e5ac9e06d0a5f15ed64497b89a206"}, 0xc2) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 757.307851][T27606] FAULT_INJECTION: forcing a failure. [ 757.307851][T27606] name failslab, interval 1, probability 0, space 0, times 0 [ 757.327894][T27606] CPU: 1 PID: 27606 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 757.335830][T27606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 757.345897][T27606] Call Trace: [ 757.349224][T27606] dump_stack+0x172/0x1f0 [ 757.353582][T27606] should_fail.cold+0xa/0x15 [ 757.358195][T27606] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 757.364018][T27606] ? ___might_sleep+0x163/0x280 [ 757.368886][T27606] __should_failslab+0x121/0x190 [ 757.373848][T27606] should_failslab+0x9/0x14 [ 757.378361][T27606] __kmalloc+0x2dc/0x740 [ 757.382617][T27606] ? __local_bh_enable_ip+0x15a/0x270 [ 757.388000][T27606] ? lock_sock_nested+0xe2/0x120 [ 757.392963][T27606] ? __local_bh_enable_ip+0x15a/0x270 [ 757.398357][T27606] ? lockdep_hardirqs_on+0x418/0x5d0 [ 757.403653][T27606] ? lock_sock_nested+0x9a/0x120 [ 757.408595][T27606] ? sock_kmalloc+0xc6/0x120 [ 757.413197][T27606] sock_kmalloc+0xc6/0x120 [ 757.417632][T27606] hash_alloc_result.part.0+0x95/0x110 [ 757.423113][T27606] hash_sendpage+0x7b3/0x9e0 [ 757.427721][T27606] kernel_sendpage+0x95/0xf0 [ 757.432319][T27606] ? hash_sendmsg+0xad0/0xad0 [ 757.437016][T27606] sock_sendpage+0x8b/0xc0 [ 757.441449][T27606] ? lockdep_hardirqs_on+0x418/0x5d0 [ 757.446748][T27606] pipe_to_sendpage+0x299/0x370 [ 757.446768][T27606] ? kernel_sendpage+0xf0/0xf0 [ 757.446785][T27606] ? direct_splice_actor+0x1a0/0x1a0 [ 757.446800][T27606] ? __put_page+0x92/0xd0 [ 757.446826][T27606] ? anon_pipe_buf_release+0x1c6/0x270 [ 757.461720][T27606] __splice_from_pipe+0x395/0x7d0 [ 757.471511][T27606] ? direct_splice_actor+0x1a0/0x1a0 [ 757.471535][T27606] ? direct_splice_actor+0x1a0/0x1a0 [ 757.471549][T27606] splice_from_pipe+0x108/0x170 [ 757.471566][T27606] ? splice_shrink_spd+0xd0/0xd0 [ 757.471588][T27606] ? apparmor_file_permission+0x25/0x30 [ 757.471610][T27606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 757.481908][T27606] ? security_file_permission+0x94/0x380 [ 757.481937][T27606] generic_splice_sendpage+0x3c/0x50 [ 757.481951][T27606] ? splice_from_pipe+0x170/0x170 [ 757.481965][T27606] do_splice+0x70a/0x13c0 [ 757.481989][T27606] ? opipe_prep.part.0+0x2d0/0x2d0 [ 757.482007][T27606] ? __fget_light+0x1a9/0x230 [ 757.482027][T27606] __ia32_sys_splice+0x2c4/0x330 [ 757.492170][T27606] do_fast_syscall_32+0x281/0xc98 [ 757.492193][T27606] entry_SYSENTER_compat+0x70/0x7f [ 757.492205][T27606] RIP: 0023:0xf7fb8869 [ 757.492220][T27606] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 757.492228][T27606] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 757.492240][T27606] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 757.492249][T27606] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 757.492256][T27606] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 757.492264][T27606] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 757.492272][T27606] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:53 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8970, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:54 executing program 3 (fault-call:6 fault-nth:70): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:54 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000080)={0x98f}) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000440)=0x7) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r4, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000180)={0x22c, r5, 0x0, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb0}]}, @TIPC_NLA_LINK={0x13c, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffa}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff7fff}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xdc6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xeb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8b96}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff80000000}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xc3b}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3d0f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd6d}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffffffe0}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xf6}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x22c}, 0x1, 0x0, 0x0, 0x8801}, 0x1) write$P9_RSETATTR(r2, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r2, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r1, 0x0, r4, 0x0, 0x80000001, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000000)={0x32, "462229dfaf873a0717b411208a9a50eb42c44108b30abb0ac30c8b9d188b9d8a811427518f6a525149caa067c4412c48f5da"}) [ 758.071592][T27620] FAULT_INJECTION: forcing a failure. [ 758.071592][T27620] name failslab, interval 1, probability 0, space 0, times 0 [ 758.097110][T27620] CPU: 0 PID: 27620 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 758.105051][T27620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 758.115133][T27620] Call Trace: [ 758.118446][T27620] dump_stack+0x172/0x1f0 [ 758.122795][T27620] should_fail.cold+0xa/0x15 [ 758.127484][T27620] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 758.133339][T27620] ? ___might_sleep+0x163/0x280 [ 758.138206][T27620] __should_failslab+0x121/0x190 [ 758.143158][T27620] should_failslab+0x9/0x14 [ 758.147682][T27620] __kmalloc+0x2dc/0x740 [ 758.151935][T27620] ? __local_bh_enable_ip+0x15a/0x270 [ 758.157323][T27620] ? lock_sock_nested+0xe2/0x120 [ 758.162273][T27620] ? __local_bh_enable_ip+0x15a/0x270 [ 758.167657][T27620] ? lockdep_hardirqs_on+0x418/0x5d0 [ 758.172956][T27620] ? lock_sock_nested+0x9a/0x120 [ 758.177907][T27620] ? sock_kmalloc+0xc6/0x120 [ 758.182508][T27620] sock_kmalloc+0xc6/0x120 [ 758.186929][T27620] hash_alloc_result.part.0+0x95/0x110 [ 758.192426][T27620] hash_sendpage+0x7b3/0x9e0 [ 758.197025][T27620] kernel_sendpage+0x95/0xf0 [ 758.201793][T27620] ? hash_sendmsg+0xad0/0xad0 [ 758.206461][T27620] sock_sendpage+0x8b/0xc0 [ 758.210878][T27620] ? lockdep_hardirqs_on+0x418/0x5d0 [ 758.216174][T27620] pipe_to_sendpage+0x299/0x370 [ 758.221107][T27620] ? kernel_sendpage+0xf0/0xf0 [ 758.225857][T27620] ? direct_splice_actor+0x1a0/0x1a0 [ 758.231142][T27620] ? __put_page+0x92/0xd0 [ 758.235471][T27620] ? anon_pipe_buf_release+0x1c6/0x270 [ 758.240947][T27620] __splice_from_pipe+0x395/0x7d0 [ 758.246060][T27620] ? direct_splice_actor+0x1a0/0x1a0 [ 758.251354][T27620] ? direct_splice_actor+0x1a0/0x1a0 [ 758.256637][T27620] splice_from_pipe+0x108/0x170 [ 758.261496][T27620] ? splice_shrink_spd+0xd0/0xd0 [ 758.266479][T27620] ? apparmor_file_permission+0x25/0x30 [ 758.272051][T27620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 758.278346][T27620] ? security_file_permission+0x94/0x380 [ 758.284179][T27620] generic_splice_sendpage+0x3c/0x50 [ 758.289481][T27620] ? splice_from_pipe+0x170/0x170 [ 758.294524][T27620] do_splice+0x70a/0x13c0 [ 758.298880][T27620] ? opipe_prep.part.0+0x2d0/0x2d0 [ 758.304003][T27620] ? __fget_light+0x1a9/0x230 [ 758.308702][T27620] __ia32_sys_splice+0x2c4/0x330 [ 758.313773][T27620] do_fast_syscall_32+0x281/0xc98 [ 758.318818][T27620] entry_SYSENTER_compat+0x70/0x7f [ 758.323940][T27620] RIP: 0023:0xf7fb8869 [ 758.328020][T27620] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 758.347636][T27620] RSP: 002b:00000000f5d930cc EFLAGS: 00000296 ORIG_RAX: 0000000000000139 [ 758.356066][T27620] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000000000 [ 758.364108][T27620] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000080000001 [ 758.372101][T27620] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 758.380093][T27620] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 758.388086][T27620] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:07:54 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x1c000000000, 0x8040) 05:07:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:54 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x14\xa9[\x00', @ifru_flags=0x1}) 05:07:54 executing program 3 (fault-call:6 fault-nth:71): pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:55 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:55 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8971, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:55 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:55 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)=0x0) fcntl$setown(r0, 0x8, r4) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:55 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x7, 0x0) 05:07:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:56 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYPTR64, @ANYRESDEC=r2, @ANYPTR], @ANYRES32=r3, @ANYBLOB="6fc30be7450c6f1c750c5581dc53933319f4a0a38647e6751313f1416b487c46be96b7d025e67ae4a4b517dcccaf21dde0d8769ef0d362e5150d60b309a4d17c699ac89f574cb6897d66c830f9c8c60a84e338ead31041da27fa5d84b256dae815d23aac99e1e5f39e9b15654c1d", @ANYRESHEX=r0, @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYRESDEC, @ANYRESDEC=r2, @ANYRES64=r3, @ANYRES64=r1, @ANYPTR], @ANYRES64, @ANYBLOB="ea5041d9979ac75e9e81a625ba8d2896c7e3919b91f126f1651532ceb91449e973b9d41cecba7fb56b0bb19b370feb0e7433bf0d", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES32=r0]], 0xffffffffffffff5c) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) r4 = syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0x3, 0x2) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f0000000300)={0xff, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x1007}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r4, &(0x7f0000000380)={0xa, 0x0, 0xfa00, {r5}}, 0xc) r6 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r6, 0xc058565d, &(0x7f0000000100)={0x0, 0x2, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "740e4b97"}, 0x0, 0x0, @fd, 0x4}) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r5, 0xfffffffffffffff7}}, 0x10) 05:07:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:56 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8980, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:56 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x16\xa9[\x00', @ifru_flags=0x1}) 05:07:56 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="14000000030101a5b748338d6c1320d2b260a0db"], 0x14}}, 0x0) 05:07:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:56 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000070, 0x0) 05:07:56 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x5) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 760.774653][T27702] input:  as /devices/virtual/input/input1041 [ 760.821523][T27705] input:  as /devices/virtual/input/input1042 05:07:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$unix(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_procfs(0x0, 0x0) r1 = socket(0x10, 0x80002, 0x0) write(r1, 0x0, 0x0) connect$netlink(r1, &(0x7f0000e8f000)=@proc, 0xc) 05:07:57 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r1, 0x0, 0x2, &(0x7f0000000000)='{\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) kcmp(r3, r5, 0x5, r4, r0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0xfffffffffffffffc, 0x0, 0x6, 0x9}, &(0x7f0000000180)=0x18) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r6, 0x1000}, 0x8) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) r7 = mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x10, r1, 0x0) r8 = mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x80013, r0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000340)={0x34, 0x0, &(0x7f0000000200)=[@exit_looper, @free_buffer={0x40086303, r7}, @free_buffer={0x40086303, r8}, @enter_looper, @exit_looper, @acquire={0x40046305, 0x3}, @acquire={0x40046305, 0x6}], 0xcd, 0x0, &(0x7f0000000240)="2a43966694d2ccdee787fa3c847367756cc854e68fc13349f9976075595bb58b539401f38ab566d24ce5366c2f5a730383de84a02d2ea337854874dd3437bf7ba562967d97f527b58d3805913240f0c8c45c942cbddeb356d7e39308e4d2db65ea97233679a9a7dd81a108958eaafafdb312ef52da7bf64946a09f8c79fdfe56af6d7173cfd2caa0615ecf0b5b34753066e3c434cece5b127c90c474d0607d6fc7adc86f7dea2ab5b084d9e1ee42627634eb5eb9bc843da9bd94b28e14855afe1df6bfdf0e020e7e489d664dec"}) splice(r0, 0x0, r2, 0x0, 0x80000002, 0x0) 05:07:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x7b, 0x0, [0x40000002], [0x187]}) 05:07:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x7b, 0x0, [0x40000002], [0x187]}) 05:07:57 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8983, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:58 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x18\xa9[\x00', @ifru_flags=0x1}) 05:07:58 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000300, 0x0) 05:07:58 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) r2 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r2, &(0x7f0000010ff0), 0x10) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000007ff0)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x1, 0x3, 0x0, {0x0, 0x2710}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0xfcd8}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) recvmmsg(r2, &(0x7f0000001940)=[{{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 05:07:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:58 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:58 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000080)=0x67, 0xfffffffffffffe46) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:07:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:58 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8992, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:58 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x1d\xa9[\x00', @ifru_flags=0x1}) 05:07:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:58 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:58 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000600, 0x0) 05:07:59 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0xab) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) statx(r0, &(0x7f0000000040)='./file0\x00', 0x2800, 0x6, &(0x7f0000000180)) r3 = accept4(r2, 0x0, 0x0, 0x0) write$FUSE_OPEN(r1, &(0x7f0000000000)={0x20, 0xffffffffffffffda, 0x5, {0x0, 0x2}}, 0x20) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000080)=0xe8) r5 = geteuid() setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000380)={{{@in=@remote, @in=@multicast1, 0x4e20, 0x8, 0x4e21, 0x3, 0x2, 0x20, 0x80, 0x3b, r4, r5}, {0x7fffffff, 0x20, 0x1, 0x9, 0x66e, 0x0, 0x2, 0x8}, {0x3, 0x80000001, 0x7, 0x4}, 0x6, 0x6e6bb8, 0x0, 0x0, 0x3}, {{@in6=@mcast1, 0x4d2, 0x3f}, 0x2, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x2, 0x2, 0x230, 0x401, 0x4c8}}, 0xe8) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x3) 05:07:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_INFO(0x0, 0x0, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x143, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) linkat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file1\x00', 0x400) ioctl(r0, 0x800000000008982, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000680)=""/179) 05:07:59 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8993, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:07:59 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x009\xa9[\x00', @ifru_flags=0x1}) 05:07:59 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x3f00) 05:08:00 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:00 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:00 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8994, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:00 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:00 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:00 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:00 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00A\xa9[\x00', @ifru_flags=0x1}) 05:08:00 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:00 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:00 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:00 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x4000) 05:08:00 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:00 executing program 2: ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(0xffffffffffffffff, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:00 executing program 2: ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(0xffffffffffffffff, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:01 executing program 2: ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(0xffffffffffffffff, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:01 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$clear(0x7, r3) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x3, 0xf, 0x19, 0x0, "93fb2f69597399ef41aa129534fb3bab2ac193674fffe1c08845a69610a1ce54fd193c935075475fc6cad3237ddc024d7b580f1e9c9f179e14e802cce09ddf61", "eb338498f430b7a7ef3f2e9f86b078815f7c6bf90f3fae3bb70cb78880fa0baa", [0x3, 0x8]}) r4 = accept4(r2, 0x0, 0x0, 0x80000) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 05:08:01 executing program 2: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:01 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:01 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x86\xa9[\x00', @ifru_flags=0x1}) 05:08:01 executing program 2: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:01 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x1000000) 05:08:01 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000140)={0x7}, 0x7) socketpair$unix(0x1, 0x6, 0x0, 0x0) pipe(&(0x7f0000000a00)) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x41, &(0x7f0000002640)) r6 = dup2(r5, r3) sendmsg$netlink(r6, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)}, 0x0) recvmmsg(r4, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0xb, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r2, 0x0, r0, 0x0, 0x80000001, 0x2) 05:08:01 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89a0, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:01 executing program 2: r0 = syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:01 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:01 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:01 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:02 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:02 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:02 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\xc3\xa9[\x00', @ifru_flags=0x1}) 05:08:02 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:02 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x3f000000) 05:08:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xffffffff, 0x44003) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @multicast1}}, [0x8, 0xc3, 0x5, 0x5, 0x0, 0xf84c, 0x80, 0x5, 0x65b44fc6, 0x0, 0x0, 0x800, 0x0, 0xffffffffffffff7f, 0x4]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000001c0)={r2, 0x925d}, &(0x7f0000000200)=0x8) r3 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:02 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89a1, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:02 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:02 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:02 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:02 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:02 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x0, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:02 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x0, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:03 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\xc8\xa9[\x00', @ifru_flags=0x1}) 05:08:03 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x0, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:03 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x40000000) 05:08:03 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x5) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) read$rfkill(r0, &(0x7f0000000380), 0x8) r3 = accept4(r2, 0x0, 0x0, 0x80800) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) ioctl$sock_bt_cmtp_CMTPCONNADD(r3, 0x400443c8, &(0x7f0000000000)={r0}) ioctl$sock_inet6_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000100)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_RM_MAP(r4, 0x4018641b, &(0x7f0000000340)={&(0x7f0000ffc000/0x4000)=nil, 0x93, 0x0, 0x81, &(0x7f0000ffe000/0x1000)=nil, 0x69ff5eb1}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000180)=0xc) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x2, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r6, 0x114, 0x1, &(0x7f00000001c0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) ioctl$sock_proto_private(r5, 0x89ed, &(0x7f0000000240)="07a9f033d655765c3794ac4b815b5af992b2607dd1484335dbd2185ecb56952544f7392292b2843c02bda15e2b8f96130e3eb30b48356bd90898883b00d7c179aaa1f024b5426f170fa9bba8b2ce68cec8e745ac9949c585f64725b8b40703f846f34c4d24c8e0bcc04ec6d7387555c2f3d5d96d1f64dc4e478e45a82d05756aae9e3fef07bb793f9c0516feeeb12fe97004cceb03f10641e24490cfaf0bbe9eef8de0c6fd5098c40a39d9a46f56a735ed1a18aaa8f883385a1f3c09131ba00b8dd0841335ebd170") 05:08:03 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89a2, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:03 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:03 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:03 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:03 executing program 2: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(0xffffffffffffffff, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:03 executing program 2: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(0xffffffffffffffff, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:03 executing program 2: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(0xffffffffffffffff, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:04 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\xdc\xa9[\x00', @ifru_flags=0x1}) 05:08:04 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0x0, &(0x7f0000000040)) 05:08:04 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7, 0x1b, 0xfffffffffffffffd}, 0xffffffffffffffb6) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:04 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x8dffffff) 05:08:04 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89a3, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:04 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0x0, &(0x7f0000000040)) 05:08:04 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0x0, &(0x7f0000000040)) 05:08:04 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, 0x0) 05:08:04 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, 0x0) 05:08:04 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, 0x0) 05:08:04 executing program 2: 05:08:05 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:05 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\xe6\xa9[\x00', @ifru_flags=0x1}) 05:08:05 executing program 2: 05:08:05 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xf0ffffff) 05:08:05 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:05 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_FPEMU(0xa, 0x2) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000180)={0xcb, 0x1b, 0x87f}, 0xfffffffffffffdfe) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) 05:08:05 executing program 2: 05:08:05 executing program 2: 05:08:05 executing program 2: 05:08:05 executing program 2: 05:08:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x200000005, 0xa, 0x2000000000000006, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000000), 0x0}, 0x18) 05:08:05 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x6) ioctl$TCSETS(r0, 0x5423, &(0x7f0000000000)) 05:08:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:06 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\xf4\xa9[\x00', @ifru_flags=0x1}) 05:08:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000880)='mounts\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 05:08:06 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xffffff8d) 05:08:06 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:06 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) r4 = shmget$private(0x0, 0x1000, 0x812, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_STAT(r4, 0x2, &(0x7f0000000000)=""/28) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:06 executing program 2: r0 = socket$inet6(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000140)=@in={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x80, 0x0, 0x0, &(0x7f000001ef80)=[{0x10, 0x0, 0x7}], 0x10}, 0x0) 05:08:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0}}], 0x57b, 0x2, 0x0) [ 770.322262][T28124] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 05:08:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0}}], 0x57b, 0x2, 0x0) 05:08:07 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xfffffff0) 05:08:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:07 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x80800) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80080000001, 0x0) 05:08:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0}}], 0x57b, 0x2, 0x0) 05:08:07 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x02\x00', @ifru_flags=0x1}) 05:08:07 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x89e0, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0}}], 0x57b, 0x2, 0x0) 05:08:08 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\xf4\xa9[\x00', @ifru_flags=0x1}) 05:08:08 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x100000000000000) 05:08:08 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$BLKRRPART(r0, 0x125f, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x10000, 0x4) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:08 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x3f00000000000000) 05:08:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:08 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x03\x00', @ifru_flags=0x1}) 05:08:09 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x9204, 0x7ffe) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) r4 = accept4(r3, 0x0, 0x0, 0x0) write$P9_RSETATTR(r2, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r2, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r1, 0x0, r4, 0x0, 0x80000001, 0x0) 05:08:09 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x40049409, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:09 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x4000000000000000) 05:08:09 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x8a000, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) r4 = getpgid(0xffffffffffffffff) ptrace$getsig(0x4202, r4, 0x2, &(0x7f0000000040)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x400800, 0x0) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:10 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\xdc\xa9[\x00', @ifru_flags=0x1}) 05:08:10 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x04\x00', @ifru_flags=0x1}) 05:08:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:10 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x4020940d, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:10 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x8dffffff00000000) 05:08:11 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xf0ffffff00000000) 05:08:11 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000180)=0x4000000000, 0x4) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) 05:08:11 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xffffffff00000000) 05:08:11 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x4000000000000000) 05:08:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:11 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x402c5828, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:11 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x05\x00', @ifru_flags=0x1}) 05:08:12 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000240)) r2 = socket$alg(0x26, 0x5, 0x0) r3 = getpid() perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0xffff, 0x5, 0x7, 0xfffffffffffffffe, 0x0, 0x1, 0x8110, 0x3, 0x6f, 0xdb, 0x1, 0xa00000000000000, 0x8, 0x8, 0x9, 0x6, 0x9779, 0x3, 0x0, 0x3, 0x200, 0x6, 0x7, 0x20, 0x8, 0x100, 0x9, 0x0, 0x5, 0x2, 0x8, 0x69, 0x2, 0x3ff, 0x2, 0x69b6885b, 0x0, 0xca, 0x5, @perf_bp={&(0x7f0000000280), 0xe}, 0x20041, 0x7, 0x5, 0xb, 0x2, 0x80}, r3, 0xd, r0, 0x1) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0x9, 0x57, 0x3, 0x400, 0x3}, &(0x7f00000000c0)=0x98) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000180)={r5, @in6={{0xa, 0x4e24, 0x1, @ipv4, 0x81}}, 0x9, 0x9, 0x9, 0xffff, 0x5}, 0x98) 05:08:12 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x2, [0x0, 0x0]}, &(0x7f0000000040)=0xc) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000080)={0x525, 0xfffffffffffffffe, 0x7, 0xfffffffffffffffb, 0xffffffffffffff4f, 0x800}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:12 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x402c582a, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:12 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x402c5828, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:13 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:13 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x40, 0xe000000000000000, 0x3}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha256\x00'}, 0xfffffffffffffe61) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) write$binfmt_elf32(r1, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x91b, 0x8, 0x7, 0x7fff, 0x3, 0x7, 0xe58, 0x1f2, 0x38, 0x25, 0xfffffffffffffffd, 0xd256, 0x20, 0x1, 0x68, 0x20, 0x8}, [{0x6474e551, 0xfffffffffffffffe, 0x101, 0x2b, 0x4, 0x0, 0x481, 0x6}], "31c20130db8deed7e879225be60f7b23243a2f96d736ce0cfe513d1a8aa17c5c4085786ca4d674488f2c7089b42825b49970d192d7fb4178252c2b6b02a61c1aea3cadcc71af4ba2719721cc1aa2a54771912991960d04988107910761574a5ef74682fe9704452e21e85974d5745606edcb4ae28b8330fb9afe861c6e841bfc8e2c602871e50cec29cf5ca01f6382ef74b63bd4fbde0e85aead3553390ca1444c33469bf17b2ee831ac3949f23c4c1a6b27720ed3", [[], [], [], []]}, 0x50d) 05:08:13 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\a\x00', @ifru_flags=0x1}) 05:08:13 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x05\x00', @ifru_flags=0x1}) 05:08:13 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) ioctl$NBD_DO_IT(r2, 0xab03) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) ioctl$NBD_DISCONNECT(r0, 0xab08) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000180)={r1, r1, 0x8, 0x9d, &(0x7f0000000000)="d8f4e5af32a785d48772ae1e620418f2f4a0b6f8702c1e4f58ce814dcccfa39e59bde4df365d08b8563310ce5f63dba4cfb16d9eab0096e67b72bb2df94b6d07c2fbd28de64b157931b2e566e3217edcd9bd4d4d0a9a210e920a8da4f926e3654fbdef256a6ad04d2c3c0ab8305a28088b2d56adac00745b4f9ec762f7d6d4dd473f6dcf10d54b8cb4f1b7544d7f7fef4f51896d94f332235eb6ec73c0", 0x400, 0x400, 0x100000001, 0x7, 0x5, 0x0, 0x10000, 'syz0\x00'}) 05:08:13 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0xc0189436, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:13 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r3, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000420}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x164, r4, 0x80b, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4f}]}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1000}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4c30a95a}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_BEARER={0xb8, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e21, @local}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @rand_addr=0x1}}, {0x14, 0x2, @in={0x2, 0x4e21, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x427, @remote, 0xb09}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'sit0\x00'}}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x90}, 0x40000) 05:08:14 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r3, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 05:08:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000040)=@buf={0x27, &(0x7f0000000000)="98bf322a7af203402b863d3ccbe1080ce4da9e084cface03f609ce39e4a6da68e3e2306f1de064"}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 05:08:14 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\b\x00', @ifru_flags=0x1}) 05:08:14 executing program 3: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000000)="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") ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000280)="e385807a4cfef8b9ddecab91aacd67b711dfd0fd4ef84edf7e696222ce5414fda51a52185a0203321d02775a4988f466a77a8173b67eaaedc69fa171b211e3e00a82222906d85c11b27307f7d98adeb7e9f83049050d4156c834d8278d03fea7fd110b39e83816a8e8b2ffd110a65587d5a4de18178469c75ee38dcc6b9b12e41ddab79d42d0a310a57eebbfdc82ce67d3700f6ae51da33c3e7f6a7f450e62946bef802b41b7a3ef7237acac38c6a7910c955a90b7a9c405ad973cf732f235bfad57f2623d17b207f5f4c2df9c035eac5156211e752b1447a3a4b90c821dbbc08462a53f7225d7209fa8aa9a9c3aa758008d") r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100), 0x10) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) ioctl$TIOCMGET(r3, 0x5415, &(0x7f0000000180)) 05:08:14 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:14 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x05\x00', @ifru_flags=0x1}) 05:08:14 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0xc020660b, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:14 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:15 executing program 3: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) r4 = getpgrp(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r4, 0x7, &(0x7f0000000280)=""/215) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000000)={0x0, @bt={0x7, 0x2, 0x1, 0x3, 0xda2, 0x100000000, 0x252, 0x10001, 0x6, 0x7, 0xffffffff, 0x4, 0x800, 0x2, 0x10, 0x14}}) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f00000000c0)={0x3, r1}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:15 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x800) write$P9_RSETATTR(r1, &(0x7f0000000000)={0x7}, 0x217) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:16 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000000)={0x4, 0x80000001}) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:16 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000040)=@buf={0x27, &(0x7f0000000000)="98bf322a7af203402b863d3ccbe1080ce4da9e084cface03f609ce39e4a6da68e3e2306f1de064"}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 05:08:16 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00\x00\x00\x01\x00', @ifru_flags=0x1}) 05:08:16 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x12\x00', @ifru_flags=0x1}) 05:08:16 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) ioctl$DRM_IOCTL_VERSION(r0, 0xc0246400, &(0x7f0000000180)={0xd32d, 0x1, 0x0, 0x1000, &(0x7f00000009c0)=""/4096, 0xa6, &(0x7f0000000000)=""/166, 0x29, &(0x7f00000000c0)=""/41}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) 05:08:16 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$clear(0x7, r3) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x3, 0xf, 0x19, 0x0, "93fb2f69597399ef41aa129534fb3bab2ac193674fffe1c08845a69610a1ce54fd193c935075475fc6cad3237ddc024d7b580f1e9c9f179e14e802cce09ddf61", "eb338498f430b7a7ef3f2e9f86b078815f7c6bf90f3fae3bb70cb78880fa0baa", [0x3, 0x8]}) r4 = accept4(r2, 0x0, 0x0, 0x80000) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 05:08:16 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r2, 0x20}, &(0x7f00000001c0)=0x8) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) getsockopt$bt_hci(r3, 0x0, 0x1, &(0x7f0000000000)=""/11, &(0x7f0000000040)=0xb) r4 = request_key(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='sha512-avx\x00', 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f00000003c0)="2df3b2d3bb329087b4e5ebd31e59f36c4d6712cac62005446400867895a4764661aaca9c5be56e25a5b0a1a7d04860438532e1073a0c9b101614d6f66522625fd7e21788e484a7e172a8b5406fd30d9d5e1479ffef1c2cc183cc305d07537e0384fbb61ade1f700b53b19810500c4cbaf8cf9d4c5fbf97d73e5acfdd7ba7c99814c7593477700fab9c142b6140163703c92f8f8609a3f0d798556ea0be6c9a951e0153c9f7d7df660b9eaa31d76d4433855b9ca785b1d3a9ab3e50d5c3b7507aabc30c52d227007b90b891c14efb3d", 0xcf) r5 = accept4(r3, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x9e, 0x0, 0x13, 0x11, 0xc, "589fb24776df5b9e2a7b802a7266310ae08c1e335fea377fa8734eb00a4f03cec4050913867337849d3772edd537c617bbb0c2f0f2ea1b03c305311d3c2c3ab3", "2654612b172418e0bd8934ef84631ff8f64fe60effefdf74760d27e22c186a10a3596fd13cc89588df4420bd4bac85ab3c256d7cb111b1ae00058fdb5b74cbdb", "96b28ad55cdc5cd647a009d280ff6e4c603569539ebe7d4b58bbbbea7b218071", [0x6, 0x5]}) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 05:08:17 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:17 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) setxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x2) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000040)={0xd53, 0x30, "c667563e902083806cc7dfba67d6e0994cc528e52ba2bdd3298ea373e12243cc7c8605a72a9ee2378c45877fbf8df109"}) sync_file_range(r2, 0x9, 0x80000000, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:17 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$clear(0x7, r3) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x3, 0xf, 0x19, 0x0, "93fb2f69597399ef41aa129534fb3bab2ac193674fffe1c08845a69610a1ce54fd193c935075475fc6cad3237ddc024d7b580f1e9c9f179e14e802cce09ddf61", "eb338498f430b7a7ef3f2e9f86b078815f7c6bf90f3fae3bb70cb78880fa0baa", [0x3, 0x8]}) r4 = accept4(r2, 0x0, 0x0, 0x80000) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 05:08:17 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000180)={{0x80000000, 0x7fffffff, 0x1, 0x7fffffff, 0x5, 0x3c8}, 0x2, 0x0, 0x1, 0x7, 0x10000000000000, "6bd39f416d702bb1f7c1dba6de6b8c9310daac10fe40812addffc812e113ae88ac1d632ed0643192636137a9c0409b7ecbd76c38c07faa7ba18e680bbe036bd1604fe1f888440fee419784910c52817f6fa015f9e601882dc76f4689f7424616312b082b5d2a7cae00f0b479a1ab56ccadd6179456d3a64842e3554ec3e6f4db"}) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:18 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00\x00\x00\x00\x00\x00\x00\x01', @ifru_flags=0x1}) 05:08:18 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x14\x00', @ifru_flags=0x1}) 05:08:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:18 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = semget$private(0x0, 0x3, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000180)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f00000000c0)=0xe8) r6 = getegid() semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000280)={{0xb1, r3, r4, r5, r6, 0x0, 0x6}, 0xffffffff, 0xf719, 0x1}) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) getsockopt$IP6T_SO_GET_INFO(r7, 0x29, 0x40, &(0x7f00000002c0)={'raw\x00'}, &(0x7f0000000340)=0x54) r8 = accept4(r7, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r8, 0x0, 0x80000001, 0x0) 05:08:18 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="97060e345cee351d8d9970cdd66cb0706d", 0x11, 0xfffffffffffffff9) keyctl$read(0xb, r2, &(0x7f00000000c0)=""/50, 0x32) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000180)={0x7, 0x1b, 0x8}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 05:08:19 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$clear(0x7, r3) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x3, 0xf, 0x19, 0x0, "93fb2f69597399ef41aa129534fb3bab2ac193674fffe1c08845a69610a1ce54fd193c935075475fc6cad3237ddc024d7b580f1e9c9f179e14e802cce09ddf61", "eb338498f430b7a7ef3f2e9f86b078815f7c6bf90f3fae3bb70cb78880fa0baa", [0x3, 0x8]}) r4 = accept4(r2, 0x0, 0x0, 0x80000) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 05:08:19 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:19 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x16\x00', @ifru_flags=0x1}) 05:08:19 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00\x00\x00\x00\x01\x00', @ifru_flags=0x1}) 05:08:19 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) getresgid(&(0x7f00000000c0), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) lchown(&(0x7f0000000000)='./file0\x00', r2, r3) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 05:08:19 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0xfffffffffffffe8e) r3 = accept4(r2, 0x0, 0x0, 0x800) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:20 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r2, 0x20}, &(0x7f00000001c0)=0x8) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) getsockopt$bt_hci(r3, 0x0, 0x1, &(0x7f0000000000)=""/11, &(0x7f0000000040)=0xb) r4 = request_key(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='sha512-avx\x00', 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f00000003c0)="2df3b2d3bb329087b4e5ebd31e59f36c4d6712cac62005446400867895a4764661aaca9c5be56e25a5b0a1a7d04860438532e1073a0c9b101614d6f66522625fd7e21788e484a7e172a8b5406fd30d9d5e1479ffef1c2cc183cc305d07537e0384fbb61ade1f700b53b19810500c4cbaf8cf9d4c5fbf97d73e5acfdd7ba7c99814c7593477700fab9c142b6140163703c92f8f8609a3f0d798556ea0be6c9a951e0153c9f7d7df660b9eaa31d76d4433855b9ca785b1d3a9ab3e50d5c3b7507aabc30c52d227007b90b891c14efb3d", 0xcf) r5 = accept4(r3, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x9e, 0x0, 0x13, 0x11, 0xc, "589fb24776df5b9e2a7b802a7266310ae08c1e335fea377fa8734eb00a4f03cec4050913867337849d3772edd537c617bbb0c2f0f2ea1b03c305311d3c2c3ab3", "2654612b172418e0bd8934ef84631ff8f64fe60effefdf74760d27e22c186a10a3596fd13cc89588df4420bd4bac85ab3c256d7cb111b1ae00058fdb5b74cbdb", "96b28ad55cdc5cd647a009d280ff6e4c603569539ebe7d4b58bbbbea7b218071", [0x6, 0x5]}) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 05:08:20 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f00000009c0)={0x0, 0x0, 0x2080}) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x801) 05:08:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:20 executing program 3: getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000080)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 05:08:20 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x18\x00', @ifru_flags=0x1}) 05:08:20 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:20 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x804) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7, 0x1b, 0x2}, 0x7) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = semget(0x0, 0x5, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000200), &(0x7f0000000240)=0x4) semctl$GETALL(r6, 0x0, 0xd, &(0x7f0000000040)=""/67) r7 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) r8 = socket(0x21, 0x4, 0x0) setsockopt$packet_tx_ring(r8, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r8) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40000, 0x0) r9 = dup2(r4, r7) setsockopt$RXRPC_SECURITY_KEY(r9, 0x110, 0x1, &(0x7f0000000180)='#-vboxnet1usermime_type\x00', 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r7, r5, 0x0) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) pipe(&(0x7f00000001c0)) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:21 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r2, 0x20}, &(0x7f00000001c0)=0x8) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) getsockopt$bt_hci(r3, 0x0, 0x1, &(0x7f0000000000)=""/11, &(0x7f0000000040)=0xb) r4 = request_key(&(0x7f0000000300)='ceph\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='sha512-avx\x00', 0xfffffffffffffffe) keyctl$update(0x2, r4, &(0x7f00000003c0)="2df3b2d3bb329087b4e5ebd31e59f36c4d6712cac62005446400867895a4764661aaca9c5be56e25a5b0a1a7d04860438532e1073a0c9b101614d6f66522625fd7e21788e484a7e172a8b5406fd30d9d5e1479ffef1c2cc183cc305d07537e0384fbb61ade1f700b53b19810500c4cbaf8cf9d4c5fbf97d73e5acfdd7ba7c99814c7593477700fab9c142b6140163703c92f8f8609a3f0d798556ea0be6c9a951e0153c9f7d7df660b9eaa31d76d4433855b9ca785b1d3a9ab3e50d5c3b7507aabc30c52d227007b90b891c14efb3d", 0xcf) r5 = accept4(r3, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x5, 0x9e, 0x0, 0x13, 0x11, 0xc, "589fb24776df5b9e2a7b802a7266310ae08c1e335fea377fa8734eb00a4f03cec4050913867337849d3772edd537c617bbb0c2f0f2ea1b03c305311d3c2c3ab3", "2654612b172418e0bd8934ef84631ff8f64fe60effefdf74760d27e22c186a10a3596fd13cc89588df4420bd4bac85ab3c256d7cb111b1ae00058fdb5b74cbdb", "96b28ad55cdc5cd647a009d280ff6e4c603569539ebe7d4b58bbbbea7b218071", [0x6, 0x5]}) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 05:08:21 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r0, 0x0, 0x7ffffffe, 0x0) ioctl$VIDIOC_G_EDID(r1, 0xc0245628, &(0x7f0000000040)={0x0, 0x7, 0x29a2c53f, [], &(0x7f0000000000)=0x7ff}) ioctl$VIDIOC_S_PRIORITY(r0, 0x40045644, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000080)={0xf005, 0x100000}) 05:08:21 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x800) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 05:08:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:22 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x1d\x00', @ifru_flags=0x1}) 05:08:22 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00\x00\x00\x00\x00\x01\x00', @ifru_flags=0x1}) 05:08:22 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x804) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7, 0x1b, 0x2}, 0x7) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = semget(0x0, 0x5, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000200), &(0x7f0000000240)=0x4) semctl$GETALL(r6, 0x0, 0xd, &(0x7f0000000040)=""/67) r7 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_RUN(r7, 0xae80, 0x0) r8 = socket(0x21, 0x4, 0x0) setsockopt$packet_tx_ring(r8, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r8) getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40000, 0x0) r9 = dup2(r4, r7) setsockopt$RXRPC_SECURITY_KEY(r9, 0x110, 0x1, &(0x7f0000000180)='#-vboxnet1usermime_type\x00', 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r7, r5, 0x0) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) pipe(&(0x7f00000001c0)) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:22 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) msync(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:22 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, 0x0) 05:08:22 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[9\x00', @ifru_flags=0x1}) 05:08:22 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:22 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) preadv(r2, &(0x7f0000000400)=[{&(0x7f0000000000)=""/193, 0xc1}, {&(0x7f0000000180)=""/173, 0xad}, {&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f0000000240)=""/235, 0xeb}, {&(0x7f0000000340)=""/48, 0x30}, {&(0x7f0000000380)=""/106, 0x6a}], 0x6, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000440)={0x1fe, 0x0, &(0x7f0000ffd000/0x1000)=nil}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcs\x00', 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:23 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00\x00\x00\x00\x01\x00', @ifru_flags=0x1}) 05:08:23 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000000)={0x2, [0x4, 0x5]}) r3 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x10000) r4 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r4, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYRES16=r4, @ANYBLOB="38081fe354fb5727adc595798dcd19204665e3f35caf0d235113fe7814290b4337db7d6b182e36f6cc36edebc0", @ANYRESDEC=r1, @ANYPTR, @ANYBLOB="bda57d68f5c0472738707a480b598bf7aa3a8b3d4742824bf8f160c059a32f5da3ebc2d4be0028efeeb58743add8adb9a8bc39f6d59042bb5dbdc80fc8c000f25224fb00e29ab4053cad", @ANYBLOB="8308405aedc222059e8d5eb01596ac36432b606a0f", @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB="3911cd2d6494dfb31d755abe10e28f313f17a8cd4d33138de2daabb7028cd0746bad58b9d381ec4284ae9fb63874b5f57f6199f48cd67e40b129f883f15dc1ea1bc60d1af41365ba5441223b20d7ad3b3c4b658f2020bcee8b80ab0b89e2dcfe187d6a554cd43e349d06a8847a419ae4bad57949af1d8aa27e15", @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRES32=r3, @ANYRES64=r2, @ANYPTR64, @ANYPTR64, @ANYPTR64], @ANYBLOB="ea0cbe163bb6e0fe288bbf43"]], 0xae) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 05:08:23 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000002, 0x0) 05:08:23 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e20, 0x10000, @loopback, 0x2}}, [0x3, 0xea0, 0x100000001, 0x5, 0x1000, 0x8, 0x8, 0x4, 0x85, 0x20, 0x3, 0x2, 0x4, 0x3, 0x2]}, &(0x7f0000000180)=0x100) setsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f00000001c0)={r4, 0x8, 0x20, 0x9}, 0x10) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, 0x0) 05:08:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:24 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00\x00\x00\x00\x00\x00\x01\x00', @ifru_flags=0x1}) 05:08:24 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[A\x00', @ifru_flags=0x1}) 05:08:24 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, 0x0) 05:08:24 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[9\x00', @ifru_flags=0x1}) 05:08:24 executing program 3: r0 = syz_open_dev$vbi(&(0x7f00000003c0)='/dev/vbi#\x00', 0x0, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) ioctl$VIDIOC_G_EDID(r1, 0xc0245628, &(0x7f0000000040)={0x0, 0x3}) ioctl$sock_ifreq(r3, 0x8933, &(0x7f0000000680)={'nlmon0\x00', @ifru_data=&(0x7f0000000640)="d64f3156aba94d3b23f0f644047e59b9870c530b5f59a86b1bb6aa7e5ebae95c"}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x134, r4, 0x310, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x90f}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x81}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8000}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}]}, @IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8000}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3f}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffffffffff9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x134}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$IPVS_CMD_ZERO(r2, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x6000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x8c, r4, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xeb66}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5160}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffffffffffd}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}]}]}, 0x8c}}, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f00000006c0)=""/183, &(0x7f0000000780)=0xb7) r5 = accept4(r3, 0x0, 0x0, 0x0) write$P9_RSETATTR(r2, &(0x7f0000000140)={0x7}, 0x7) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000600)={'hsr0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x15}}}) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000500)) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) write$binfmt_aout(r2, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r1, 0x0, r5, 0x0, 0x80000001, 0x0) 05:08:24 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="cc203d695085c68713980f7d08bb4d3fafd85c4df8878985b19b08240dd8e8a9ae8d5867006609b7252ea91045dfc2664585eac808c1d8174d0865bcb1af7f600c41f6e6bc5a", 0x46) ioctl$FS_IOC_GETFLAGS(r0, 0x80046601, &(0x7f0000000000)) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000200)={"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"}) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000040)={0x4, 0xf006}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:24 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x9}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x2197, 0x9152, 0x1, 0x4, 0x6, 0x100000000, 0x5, 0x2, r4}, &(0x7f00000000c0)=0x20) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x5, 0x1) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) 05:08:25 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x86\x00', @ifru_flags=0x1}) 05:08:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags}) 05:08:25 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000200)={0x84, 0x3f, 0x7}) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x4e21, @broadcast}, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x114, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='ipddp0\x00', 0x6, 0x10001, 0xfffffffffffffff7}) 05:08:25 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:25 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[9\x00', @ifru_flags=0x1}) 05:08:25 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40047705, &(0x7f0000000000)={0x2, 0x7}) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:25 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) epoll_create(0x8) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x4, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x100}, &(0x7f0000000200)=0x8) timer_create(0x7, &(0x7f0000000180)={0x0, 0xe, 0x5, @thr={&(0x7f0000000240)="7eb5afcf5525f7e82fcb48f12cde49cd42f6091db9651c03cb1a89cf0400a50c6bb42e159fbce5fd0ad721ed62e5531cfe992c75fd7cd4d03a04c2bac7fbf6432ef2823a5fcf08a5b1e0188156a5a5c24814bd0fd18043294232cba5ad4da88a5c516649aa81e06b6a574cee3ed12c22dfc8c4b1de1a5100389c1218a1dd0c6c6050e4a1264e254937e76863349dbe6ec0a872a1bfe71d3f9e63a8b37a5671af2159fd20898b2b3b9b8b5fbc42b276096e9789824341e7416fe4260304e6b060711c72d238d2971bb024de304d2a00", &(0x7f0000000040)="afe819de3c5d00e3c8037cbf7f8495e7414294b2bf66d6a94a1e1f0feea29b81237e8c2b7837915fb63259b3f12c516018a759847caf7cf703b644ada3b515bd5aa740333cc0bacf5e3217b6fcc9972533af751d7b8181582aad49cf8b71c8f01b58f3bd0c773c3c5d0b89a93a9621bd0925e8494b7c27a9bc2f84cd02d616b572a9cabb35a3d46771ef5f131cc426c458d837ac6a904fa0c7ef38a8cd43bc7f5e5dccaba39c8f556d797c5fee749890f3fa"}}, &(0x7f0000000340)=0x0) timer_delete(r4) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:26 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags}) 05:08:26 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) r4 = semget$private(0x0, 0x3, 0x2) semctl$GETALL(r4, 0x0, 0xd, &(0x7f0000000000)=""/41) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:26 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) getpid() 05:08:26 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00\x00\x00\x00\x00\x00\x00\x01', @ifru_flags=0x1}) 05:08:26 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\xc3\x00', @ifru_flags=0x1}) 05:08:26 executing program 2: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[9\x00', @ifru_flags=0x1}) 05:08:27 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags}) 05:08:27 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x7) r3 = syz_open_dev$cec(0x0, 0x1, 0x2) bind$alg(r2, &(0x7f0000000940)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cast5-avx\x00'}, 0x58) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000180)=0x800, 0x4) r4 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000001c0)) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f0000000000)=""/243) 05:08:27 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:28 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000040)="21397c7da859d238842f953c8f23e93c01ff4ff1677f6279b5a9c574143d8175d89e805ec10073c7ea3032b770f5b8a9dc552ebe491f548ed2eedd2601f8cb78010ae8fdec5bf0a296cfb6c9ef2ad674cb12196b", &(0x7f0000000180)="1264292bc69b52cc9583d0b8b883c29d8273dfa60ed659874bd029dc0fb274da9c818bc685c7cec1a4646f1c599dcea8e05fba30e2113d53b035abd86fccf0deb439f8ea95fe19b1a9ad74b143cf5fd07ced0ec506f07708b79f9f36905439333d558b270ea0f73f2f7deb18dfaee1d41e6c8282cd9a1d1c7a8a7384d694f1ab5b3761c6fe29eb589de85033"}, 0x20) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:28 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0xfffffffffffffffc) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f0000000000)="a957f75e") write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:28 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x800) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:28 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\xc8\x00', @ifru_flags=0x1}) 05:08:28 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:28 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00\x00\x00\x00\x00\x00\x00\x01', @ifru_flags=0x1}) 05:08:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags}) 05:08:28 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="141cb0f285e130f8ffca8259dd2db6c61a4f25d78d5f0b3319f6", 0x1a, 0xfffffffffffffff9) keyctl$setperm(0x5, r4, 0x20000b00) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:29 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0xfffffffffffffecf}, 0x7) connect$l2tp(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x26}}, 0x1, 0x3}}, 0x2e) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:29 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) getsockopt$inet_buf(r3, 0x0, 0x29, &(0x7f0000000040)=""/55, &(0x7f0000000080)=0x37) ioctl$NBD_SET_SIZE(r0, 0xab02, 0x1) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000401, 0x0) signalfd(r0, &(0x7f0000000000)={0x3dd3}, 0x8) 05:08:29 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\xdc\x00', @ifru_flags=0x1}) 05:08:29 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00\x00\x00\x00\x00\x00\x00\x01', @ifru_flags=0x1}) 05:08:29 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags}) 05:08:29 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:30 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000000)={{0x2, 0x7, 0x0, 0x5, 0x80, 0xe159}, 0x6, 0xffff, 0x10001, 0xfff, 0x101, "85df485b6515213b0a540bfdd0d85c2ce304e55c083ec1fd994530db5a054687adca2b3a730f3dbfee18b7c023cbd58ef52d3ebeacdad748140c13e048c0f06540c1e46196c7744f7322b74692289fbf5e6d21ffc9e002eda2472659f1066a5c5c69246c8633c8dadae20e5c972ef898480b47c6e87f85bd1cf4c378199c052b"}) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:30 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) fremovexattr(r0, &(0x7f0000000040)=@known='trusted.overlay.impure\x00') bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r1, 0x0, 0x0, 0xfffffffffffffffe) connect$can_bcm(r3, &(0x7f0000000000), 0x10) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:30 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x100) 05:08:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) io_setup(0x10000, &(0x7f0000000000)=0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x2b0142, 0x0) io_cancel(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x81, r1, &(0x7f0000000040)="ee44768493aebb570edaf0bebc951b90c59f9a009152203efad7e7a25d547513ed9858f7bd58a39a0663eef2f9e6024cbf3d7d7e3c6ade818e0baa533523d21ad1bfc9a704e0f775b6d0fbb2a4ff4ac5e78967cf3c498601aeaab5215925caf3f40f22e4e7d0eefb0178de24113ca80d8583879680993ea53e421ff84009414f821941533a3063e110382df20c6bc37a0a3a878193f68859192909a38298bac0f9dee26126dc43265b7a0fcf3d3dd18382bb6c6cb6789ba5", 0xb8, 0x7, 0x0, 0x2, r3}, &(0x7f00000001c0)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r3, 0x40086408, &(0x7f0000000200)={0x0, 0x5}) 05:08:30 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000180)=""/90, &(0x7f0000000200)=0x5a) write$P9_RSETATTR(r1, &(0x7f0000000240)={0x7, 0x1b, 0x1}, 0xda375938) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000280)={0x7}, 0x4) pwrite64(r3, &(0x7f0000000000)="ef02f0edf3cfd6a1219f763cbfd5f1f9809d43e5b9ff3a608bcb496784bc9bf6adbea92b893e31b7e5a05a3844fbcabc6104644a7110878629a8ef0540f56be6ffc9f8", 0x43, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0xbcfc) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000140)=0x8, 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) r5 = getegid() write$FUSE_ATTR(r0, &(0x7f0000000340)={0x78, 0x0, 0x1, {0x2, 0x10001, 0x0, {0x3, 0x6, 0x4008, 0x8, 0x4, 0x7, 0x7, 0x100000000, 0x20, 0x1f, 0xffff, r4, r5, 0x4, 0x1ff}}}, 0x78) close(r1) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:31 executing program 3: pipe(&(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000001180)=0x1e) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x4000004) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0xffffffffffffff0b) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) write$cgroup_subtree(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="2f6d656d6f7279202f6d656d6f7279202d696f202b696f202f00100000000000006f727920"], 0x25) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000001480)) recvfrom$inet6(r0, &(0x7f0000001380)=""/155, 0x9b, 0x0, &(0x7f0000001440)={0xa, 0x4e24, 0xfd, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000000180)=""/4096, &(0x7f0000000080)=0x1000) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000011c0)={0x0}, &(0x7f0000001200)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000012c0)={r4, @in6={{0xa, 0x4e21, 0x0, @mcast1}}, 0x9, 0x0, 0x3d2c, 0x1ff, 0x80000000}, &(0x7f0000001240)=0x98) 05:08:31 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40047705, &(0x7f0000000000)={0x2, 0x7}) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:31 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x16\xa9[\x00', @ifru_flags=0x1}) 05:08:31 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\xe6\x00', @ifru_flags=0x1}) 05:08:31 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:31 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0xfffffffffffffe79) r3 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7, 0x1b, 0x2}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:32 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000040)={r3, r4/1000+10000}, 0x8) r5 = accept4(r2, 0x0, 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000080)) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 05:08:32 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000200)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYPTR64, @ANYRESDEC=r2, @ANYPTR], @ANYRES32=r3, @ANYBLOB="6fc30be7450c6f1c750c5581dc53933319f4a0a38647e6751313f1416b487c46be96b7d025e67ae4a4b517dcccaf21dde0d8769ef0d362e5150d60b309a4d17c699ac89f574cb6897d66c830f9c8c60a84e338ead31041da27fa5d84b256dae815d23aac99e1e5f39e9b15654c1d", @ANYRESHEX=r0, @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYRESDEC, @ANYRESDEC=r2, @ANYRES64=r3, @ANYRES64=r1, @ANYPTR], @ANYRES64, @ANYBLOB="ea5041d9979ac75e9e81a625ba8d2896c7e3919b91f126f1651532ceb91449e973b9d41cecba7fb56b0bb19b370feb0e7433bf0d", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES32=r0]], 0xffffffffffffff5c) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) r4 = syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0x3, 0x2) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f0000000300)={0xff, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x1007}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r4, &(0x7f0000000380)={0xa, 0x0, 0xfa00, {r5}}, 0xc) r6 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQBUF(r6, 0xc058565d, &(0x7f0000000100)={0x0, 0x2, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "740e4b97"}, 0x0, 0x0, @fd, 0x4}) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000080)={0x4, 0x8, 0xfa00, {r5, 0xfffffffffffffff7}}, 0x10) 05:08:32 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) 05:08:32 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000040)={0xfeec, 0x1b, 0x1}, 0x375) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x7, 0x200000) 05:08:33 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000040)={r3, r4/1000+10000}, 0x8) r5 = accept4(r2, 0x0, 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000080)) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 05:08:33 executing program 0: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x03\xfc\xa9[\x00', @ifru_flags=0x1}) 05:08:33 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:33 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\xf4\x00', @ifru_flags=0x1}) 05:08:33 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:33 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x1cc, r4, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000000}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x40}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1b7b}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x8, @mcast2, 0x615}}, {0x14, 0x2, @in={0x2, 0x4e21, @empty}}}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'eth', 0x3a, 'lo\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'yam0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e21, @broadcast}}}}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}]}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x8000}, 0x4000014) 05:08:34 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000040)={r3, r4/1000+10000}, 0x8) r5 = accept4(r2, 0x0, 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000080)) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 05:08:34 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000000)={0x7, 0x1b, 0xffffffffffffffff}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@v1={0x2, "a86e7179e9f9912264206ca50fd9a28f24f7df"}, 0x14, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f0000000540)='!\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f00000006c0)=0xe8) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = fcntl$getown(r3, 0x9) r8 = getuid() fstat(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000840)=0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000880)=0xe8) getgroups(0x1, &(0x7f00000008c0)=[0xee01]) r13 = getpid() r14 = getuid() getresgid(&(0x7f0000000900), &(0x7f0000000ac0)=0x0, &(0x7f0000000b00)) sendmsg$unix(r0, &(0x7f0000000c00)={&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000380)="63fc88b1d60538dd7a248e9dfbcdd178b9e68e1b6cca1411b2c461c59e810f21e13b5bb812f49642923fa1a673865187f7e0a3c7463a404a03a6f34735eaaa89c7dae529b3f0a9b4d9a4f5cbe34b5b3566bd11c540070b1c37966f39aa0e597860466a0033b62291122bf7c13d856ebbbbd8aa95dadbfff100f2d88289", 0x7d}, {&(0x7f0000000400)="643b97b51b4f44a8d8f0a9de114712ffee72156b9d6a6540568e5c0d0b0360e487e8a08a740ba3ea97eb0b5b02097293932d47e7f0b5979ddbf927510cd94fe17577e5a92ffdb9df98224c910b22b6e2ca15af94f96ef7cf3f7232130564bbc6b831d8eb95a69fb87d1adebdceb0d9da17d03a93fac9bfec926c5b84926e2129209cb0fd1659c0d8b97cb82236d9f2b384b519434cf44641a5c72dd14f4b9007ff6643d5a1d754687879b0157aa4964de4b5ca1e92d5bb914471f3ac99706d4e312e560783c54c2b95b472b2d22abde23df3d1e0d26d5880117f5a54c7da023d7459676bff6901da656e10d42be76658f9278d", 0xf3}], 0x2, &(0x7f0000000b40)=[@cred={0x18, 0x1, 0x2, r4, r5, r6}, @rights={0x18, 0x1, 0x1, [r2, r3, r2]}, @cred={0x18, 0x1, 0x2, r7, r8, r9}, @rights={0x18, 0x1, 0x1, [r3, r3, r2]}, @cred={0x18, 0x1, 0x2, r10, r11, r12}, @cred={0x18, 0x1, 0x2, r13, r14, r15}], 0x90, 0x20000000}, 0x40080) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000240)={0x7ff, 0x200, 0x8, 0x7, 0x0}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000002c0)={r16, 0x40}, 0x8) accept4$alg(r1, 0x0, 0x0, 0x80000) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000140)) 05:08:34 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:35 executing program 2 (fault-call:4 fault-nth:0): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:35 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x80000) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r2, 0x0, 0x80000000, 0x0) readlinkat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/85, 0x55) [ 799.020308][T28875] FAULT_INJECTION: forcing a failure. [ 799.020308][T28875] name failslab, interval 1, probability 0, space 0, times 0 [ 799.036976][T28875] CPU: 1 PID: 28875 Comm: syz-executor.2 Not tainted 5.1.0-rc1 #28 [ 799.044883][T28875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 799.055068][T28875] Call Trace: [ 799.058445][T28875] dump_stack+0x172/0x1f0 [ 799.062786][T28875] should_fail.cold+0xa/0x15 [ 799.067386][T28875] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 799.073181][T28875] ? ___might_sleep+0x163/0x280 [ 799.078035][T28875] __should_failslab+0x121/0x190 [ 799.082986][T28875] should_failslab+0x9/0x14 [ 799.087501][T28875] kmem_cache_alloc_node_trace+0x270/0x720 [ 799.093304][T28875] ? lockdep_hardirqs_on+0x418/0x5d0 [ 799.098608][T28875] ? retint_kernel+0x2d/0x2d [ 799.103219][T28875] ? trace_hardirqs_on_caller+0x6a/0x220 [ 799.108849][T28875] __kmalloc_node+0x3d/0x70 [ 799.113343][T28875] qdisc_alloc+0xbb/0xa60 [ 799.117675][T28875] ? retint_kernel+0x2d/0x2d [ 799.122290][T28875] qdisc_create_dflt+0x78/0x1e0 [ 799.127139][T28875] dev_activate+0x8d2/0xb30 [ 799.131634][T28875] ? _raw_spin_unlock_bh+0x31/0x40 [ 799.136740][T28875] __dev_open+0x292/0x3d0 [ 799.141071][T28875] ? dev_set_rx_mode+0x40/0x40 [ 799.145833][T28875] ? __local_bh_enable_ip+0x15a/0x270 [ 799.151206][T28875] __dev_change_flags+0x568/0x6e0 [ 799.156246][T28875] ? dev_set_allmulti+0x30/0x30 [ 799.161124][T28875] ? __dev_change_flags+0x21/0x6e0 [ 799.166245][T28875] dev_change_flags+0x92/0x170 [ 799.171006][T28875] dev_ifsioc+0x5bf/0x990 [ 799.175341][T28875] ? register_gifconf+0x70/0x70 [ 799.180198][T28875] dev_ioctl+0x1b8/0xc90 [ 799.184448][T28875] sock_do_ioctl+0x1bd/0x300 [ 799.189021][T28875] ? compat_ifr_data_ioctl+0x160/0x160 [ 799.194466][T28875] ? retint_kernel+0x2d/0x2d [ 799.199045][T28875] ? compat_sock_ioctl+0x440/0x1d50 [ 799.204519][T28875] compat_sock_ioctl+0x4d7/0x1d50 [ 799.209538][T28875] ? sock_unregister+0xa0/0xa0 [ 799.214295][T28875] ? retint_kernel+0x2d/0x2d [ 799.218904][T28875] ? __sanitizer_cov_trace_switch+0x13/0x80 [ 799.224808][T28875] ? sock_unregister+0xa0/0xa0 [ 799.229559][T28875] __ia32_compat_sys_ioctl+0x197/0x620 [ 799.235008][T28875] do_fast_syscall_32+0x281/0xc98 [ 799.240020][T28875] entry_SYSENTER_compat+0x70/0x7f [ 799.245117][T28875] RIP: 0023:0xf7f4f869 [ 799.249181][T28875] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 05:08:35 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000000)={0x7, 0x1b, 0xffffffffffffffff}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@v1={0x2, "a86e7179e9f9912264206ca50fd9a28f24f7df"}, 0x14, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f0000000540)='!\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000005c0)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f00000006c0)=0xe8) lstat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = fcntl$getown(r3, 0x9) r8 = getuid() fstat(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000840)=0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000000880)=0xe8) getgroups(0x1, &(0x7f00000008c0)=[0xee01]) r13 = getpid() r14 = getuid() getresgid(&(0x7f0000000900), &(0x7f0000000ac0)=0x0, &(0x7f0000000b00)) sendmsg$unix(r0, &(0x7f0000000c00)={&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000380)="63fc88b1d60538dd7a248e9dfbcdd178b9e68e1b6cca1411b2c461c59e810f21e13b5bb812f49642923fa1a673865187f7e0a3c7463a404a03a6f34735eaaa89c7dae529b3f0a9b4d9a4f5cbe34b5b3566bd11c540070b1c37966f39aa0e597860466a0033b62291122bf7c13d856ebbbbd8aa95dadbfff100f2d88289", 0x7d}, {&(0x7f0000000400)="643b97b51b4f44a8d8f0a9de114712ffee72156b9d6a6540568e5c0d0b0360e487e8a08a740ba3ea97eb0b5b02097293932d47e7f0b5979ddbf927510cd94fe17577e5a92ffdb9df98224c910b22b6e2ca15af94f96ef7cf3f7232130564bbc6b831d8eb95a69fb87d1adebdceb0d9da17d03a93fac9bfec926c5b84926e2129209cb0fd1659c0d8b97cb82236d9f2b384b519434cf44641a5c72dd14f4b9007ff6643d5a1d754687879b0157aa4964de4b5ca1e92d5bb914471f3ac99706d4e312e560783c54c2b95b472b2d22abde23df3d1e0d26d5880117f5a54c7da023d7459676bff6901da656e10d42be76658f9278d", 0xf3}], 0x2, &(0x7f0000000b40)=[@cred={0x18, 0x1, 0x2, r4, r5, r6}, @rights={0x18, 0x1, 0x1, [r2, r3, r2]}, @cred={0x18, 0x1, 0x2, r7, r8, r9}, @rights={0x18, 0x1, 0x1, [r3, r3, r2]}, @cred={0x18, 0x1, 0x2, r10, r11, r12}, @cred={0x18, 0x1, 0x2, r13, r14, r15}], 0x90, 0x20000000}, 0x40080) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000240)={0x7ff, 0x200, 0x8, 0x7, 0x0}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000002c0)={r16, 0x40}, 0x8) accept4$alg(r1, 0x0, 0x0, 0x80000) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000140)) [ 799.268904][T28875] RSP: 002b:00000000f5d2a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 799.277332][T28875] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000008914 [ 799.285300][T28875] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 799.293277][T28875] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 799.301344][T28875] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 799.309303][T28875] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:08:35 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[2\x01\x00', @ifru_flags=0x1}) 05:08:35 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) 05:08:35 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:35 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x24) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={r4, 0xffffffff}, &(0x7f00000000c0)=0xc) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x1) 05:08:36 executing program 2 (fault-call:4 fault-nth:1): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:36 executing program 0 (fault-call:2 fault-nth:0): r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) [ 800.288001][T28910] FAULT_INJECTION: forcing a failure. [ 800.288001][T28910] name failslab, interval 1, probability 0, space 0, times 0 [ 800.337395][T28910] CPU: 0 PID: 28910 Comm: syz-executor.0 Not tainted 5.1.0-rc1 #28 [ 800.345354][T28910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 800.355424][T28910] Call Trace: [ 800.358845][T28910] dump_stack+0x172/0x1f0 [ 800.363212][T28910] should_fail.cold+0xa/0x15 [ 800.367824][T28910] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 800.373654][T28910] ? ___might_sleep+0x163/0x280 [ 800.378528][T28910] __should_failslab+0x121/0x190 [ 800.383492][T28910] should_failslab+0x9/0x14 [ 800.388004][T28910] __kmalloc+0x2dc/0x740 [ 800.392404][T28910] ? drm_ioctl+0x45c/0xa50 [ 800.396850][T28910] drm_ioctl+0x45c/0xa50 [ 800.401180][T28910] ? drm_mode_create_dumb+0x310/0x310 [ 800.406578][T28910] ? drm_version+0x3d0/0x3d0 [ 800.411356][T28910] ? __fget+0x381/0x550 [ 800.415528][T28910] ? ksys_dup3+0x3e0/0x3e0 [ 800.419963][T28910] ? fput_many+0x12c/0x1a0 [ 800.424475][T28910] drm_compat_ioctl+0x241/0x310 [ 800.429351][T28910] ? security_file_ioctl+0x93/0xc0 [ 800.434481][T28910] ? compat_drm_setunique+0x10/0x10 [ 800.439691][T28910] __ia32_compat_sys_ioctl+0x197/0x620 [ 800.445172][T28910] do_fast_syscall_32+0x281/0xc98 [ 800.450215][T28910] entry_SYSENTER_compat+0x70/0x7f [ 800.455501][T28910] RIP: 0023:0xf7f59869 [ 800.459577][T28910] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 800.479198][T28910] RSP: 002b:00000000f5d550cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 800.487643][T28910] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000ffffffb2 [ 800.495637][T28910] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 800.503624][T28910] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 800.511613][T28910] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 800.519596][T28910] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:08:36 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_MCE_KILL(0x21, 0x0, 0x1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a45321, &(0x7f0000000000)={{0x6, 0x3f}, 'port0\x00', 0xb82d1ca757ecc744, 0x80000, 0x80000001, 0xcbc, 0x1, 0xb9f, 0x5, 0x0, 0x4}) r4 = getpgrp(0xffffffffffffffff) tkill(r4, 0x5) 05:08:36 executing program 0 (fault-call:2 fault-nth:1): r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:37 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000000)) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x2, [0x0, 0x0]}, &(0x7f0000000080)=0xc) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 800.773756][T28922] FAULT_INJECTION: forcing a failure. [ 800.773756][T28922] name failslab, interval 1, probability 0, space 0, times 0 [ 800.827061][T28922] CPU: 0 PID: 28922 Comm: syz-executor.0 Not tainted 5.1.0-rc1 #28 [ 800.835010][T28922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 800.845085][T28922] Call Trace: [ 800.848412][T28922] dump_stack+0x172/0x1f0 [ 800.852948][T28922] should_fail.cold+0xa/0x15 [ 800.857565][T28922] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 800.863394][T28922] ? ___might_sleep+0x163/0x280 [ 800.868249][T28922] __should_failslab+0x121/0x190 [ 800.873186][T28922] should_failslab+0x9/0x14 [ 800.877698][T28922] kmem_cache_alloc_trace+0x2d1/0x760 [ 800.883078][T28922] ? drm_dev_exit+0x22/0x60 [ 800.883197][T28922] vkms_gem_create.part.0+0x5f/0x170 [ 800.883219][T28922] vkms_dumb_create+0x11e/0x240 [ 800.893012][T28922] drm_mode_create_dumb+0x288/0x310 [ 800.903068][T28922] drm_mode_create_dumb_ioctl+0x26/0x30 [ 800.903085][T28922] drm_ioctl_kernel+0x23e/0x2e0 [ 800.903109][T28922] ? drm_mode_create_dumb+0x310/0x310 [ 800.903124][T28922] ? drm_setversion+0x8c0/0x8c0 [ 800.903144][T28922] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 800.903161][T28922] ? _copy_from_user+0xdd/0x150 [ 800.903178][T28922] drm_ioctl+0x545/0xa50 [ 800.903192][T28922] ? drm_mode_create_dumb+0x310/0x310 [ 800.903211][T28922] ? drm_version+0x3d0/0x3d0 [ 800.903233][T28922] ? __fget+0x381/0x550 [ 800.913649][T28922] ? ksys_dup3+0x3e0/0x3e0 [ 800.913664][T28922] ? fput_many+0x12c/0x1a0 [ 800.913692][T28922] drm_compat_ioctl+0x241/0x310 [ 800.913709][T28922] ? security_file_ioctl+0x93/0xc0 [ 800.913733][T28922] ? compat_drm_setunique+0x10/0x10 [ 800.977338][T28922] __ia32_compat_sys_ioctl+0x197/0x620 [ 800.982805][T28922] do_fast_syscall_32+0x281/0xc98 [ 800.987846][T28922] entry_SYSENTER_compat+0x70/0x7f [ 800.992956][T28922] RIP: 0023:0xf7f59869 [ 800.997026][T28922] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 801.016633][T28922] RSP: 002b:00000000f5d550cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 05:08:37 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000180)={0x1, {{0x2, 0xfc0f, @empty}}, {{0x2, 0x4e24, @rand_addr=0x7}}}, 0x104) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 801.025067][T28922] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000ffffffb2 [ 801.033061][T28922] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 801.041059][T28922] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 801.049236][T28922] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 801.057220][T28922] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:08:37 executing program 0 (fault-call:2 fault-nth:2): r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) [ 801.077370][T28907] FAULT_INJECTION: forcing a failure. [ 801.077370][T28907] name failslab, interval 1, probability 0, space 0, times 0 [ 801.114710][T28907] CPU: 1 PID: 28907 Comm: syz-executor.2 Not tainted 5.1.0-rc1 #28 [ 801.122658][T28907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 801.130662][T28932] FAULT_INJECTION: forcing a failure. [ 801.130662][T28932] name failslab, interval 1, probability 0, space 0, times 0 [ 801.132722][T28907] Call Trace: [ 801.132751][T28907] dump_stack+0x172/0x1f0 [ 801.132784][T28907] should_fail.cold+0xa/0x15 [ 801.157575][T28907] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 801.163395][T28907] ? ___might_sleep+0x163/0x280 [ 801.168260][T28907] __should_failslab+0x121/0x190 [ 801.173206][T28907] should_failslab+0x9/0x14 [ 801.177725][T28907] __kmalloc+0x2dc/0x740 [ 801.182158][T28907] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 801.187631][T28907] ? mq_init+0x11b/0x4b0 [ 801.191890][T28907] mq_init+0x11b/0x4b0 [ 801.195977][T28907] ? mq_graft+0x670/0x670 [ 801.200314][T28907] qdisc_create_dflt+0x10d/0x1e0 [ 801.205263][T28907] dev_activate+0x8d2/0xb30 [ 801.209780][T28907] ? __local_bh_enable_ip+0x15a/0x270 [ 801.215170][T28907] ? _raw_spin_unlock_bh+0x31/0x40 [ 801.220297][T28907] __dev_open+0x292/0x3d0 [ 801.224650][T28907] ? dev_set_rx_mode+0x40/0x40 [ 801.229436][T28907] ? __local_bh_enable_ip+0x15a/0x270 [ 801.234848][T28907] __dev_change_flags+0x568/0x6e0 [ 801.239888][T28907] ? dev_set_allmulti+0x30/0x30 [ 801.244758][T28907] ? retint_kernel+0x2d/0x2d [ 801.249367][T28907] dev_change_flags+0x92/0x170 [ 801.254149][T28907] dev_ifsioc+0x5bf/0x990 [ 801.258490][T28907] ? register_gifconf+0x70/0x70 [ 801.263442][T28907] dev_ioctl+0x1b8/0xc90 [ 801.267698][T28907] sock_do_ioctl+0x1bd/0x300 [ 801.272305][T28907] ? compat_ifr_data_ioctl+0x160/0x160 [ 801.277797][T28907] compat_sock_ioctl+0x4d7/0x1d50 [ 801.282842][T28907] ? sock_unregister+0xa0/0xa0 [ 801.287620][T28907] ? ksys_dup3+0x3e0/0x3e0 [ 801.292057][T28907] ? retint_kernel+0x2d/0x2d [ 801.296669][T28907] ? tomoyo_file_ioctl+0x23/0x30 [ 801.301608][T28907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 801.307858][T28907] ? security_file_ioctl+0x93/0xc0 [ 801.312985][T28907] ? sock_unregister+0xa0/0xa0 [ 801.317930][T28907] __ia32_compat_sys_ioctl+0x197/0x620 [ 801.323411][T28907] do_fast_syscall_32+0x281/0xc98 [ 801.328444][T28907] entry_SYSENTER_compat+0x70/0x7f [ 801.333575][T28907] RIP: 0023:0xf7f4f869 [ 801.337643][T28907] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 801.357253][T28907] RSP: 002b:00000000f5d2a0cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 801.365766][T28907] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000008914 [ 801.373749][T28907] RDX: 0000000020000180 RSI: 0000000000000000 RDI: 0000000000000000 [ 801.381727][T28907] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 801.389710][T28907] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 801.398037][T28907] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 801.406106][T28932] CPU: 0 PID: 28932 Comm: syz-executor.0 Not tainted 5.1.0-rc1 #28 [ 801.414041][T28932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 801.414048][T28932] Call Trace: [ 801.414074][T28932] dump_stack+0x172/0x1f0 [ 801.414102][T28932] should_fail.cold+0xa/0x15 [ 801.414121][T28932] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 801.414141][T28932] ? ___might_sleep+0x163/0x280 [ 801.414164][T28932] __should_failslab+0x121/0x190 [ 801.451952][T28932] ? shmem_destroy_callback+0xc0/0xc0 [ 801.451971][T28932] should_failslab+0x9/0x14 [ 801.451988][T28932] kmem_cache_alloc+0x2b2/0x6f0 [ 801.452058][T28932] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 801.452076][T28932] ? shmem_destroy_callback+0xc0/0xc0 [ 801.452091][T28932] shmem_alloc_inode+0x1c/0x50 [ 801.452119][T28932] alloc_inode+0x66/0x190 [ 801.452135][T28932] new_inode_pseudo+0x19/0xf0 [ 801.452154][T28932] new_inode+0x1f/0x40 [ 801.495763][T28932] shmem_get_inode+0x84/0x780 [ 801.500457][T28932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 801.506739][T28932] __shmem_file_setup.part.0+0x7e/0x2b0 [ 801.512307][T28932] shmem_file_setup+0x66/0x90 [ 801.517172][T28932] drm_gem_object_init+0x3b/0xb0 [ 801.522131][T28932] vkms_gem_create.part.0+0x8d/0x170 [ 801.527432][T28932] vkms_dumb_create+0x11e/0x240 [ 801.532313][T28932] drm_mode_create_dumb+0x288/0x310 [ 801.537527][T28932] drm_mode_create_dumb_ioctl+0x26/0x30 [ 801.543083][T28932] drm_ioctl_kernel+0x23e/0x2e0 [ 801.547956][T28932] ? drm_mode_create_dumb+0x310/0x310 [ 801.553341][T28932] ? drm_setversion+0x8c0/0x8c0 [ 801.558203][T28932] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 801.564462][T28932] ? _copy_from_user+0xdd/0x150 [ 801.570802][T28932] drm_ioctl+0x545/0xa50 [ 801.575054][T28932] ? drm_mode_create_dumb+0x310/0x310 [ 801.580455][T28932] ? drm_version+0x3d0/0x3d0 [ 801.585061][T28932] ? __fget+0x381/0x550 [ 801.589242][T28932] ? ksys_dup3+0x3e0/0x3e0 [ 801.593664][T28932] ? fput_many+0x12c/0x1a0 [ 801.609659][T28932] drm_compat_ioctl+0x241/0x310 [ 801.614536][T28932] ? security_file_ioctl+0x93/0xc0 [ 801.619678][T28932] ? compat_drm_setunique+0x10/0x10 [ 801.624890][T28932] __ia32_compat_sys_ioctl+0x197/0x620 [ 801.630369][T28932] do_fast_syscall_32+0x281/0xc98 [ 801.635417][T28932] entry_SYSENTER_compat+0x70/0x7f [ 801.640546][T28932] RIP: 0023:0xf7f59869 [ 801.644628][T28932] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 801.664244][T28932] RSP: 002b:00000000f5d550cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 801.672674][T28932] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000ffffffb2 [ 801.680666][T28932] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 801.688652][T28932] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 801.696642][T28932] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 801.704627][T28932] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:08:37 executing program 0 (fault-call:2 fault-nth:3): r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) [ 801.803701][T28938] FAULT_INJECTION: forcing a failure. [ 801.803701][T28938] name failslab, interval 1, probability 0, space 0, times 0 [ 801.827090][T28938] CPU: 0 PID: 28938 Comm: syz-executor.0 Not tainted 5.1.0-rc1 #28 [ 801.835040][T28938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 801.845122][T28938] Call Trace: [ 801.848437][T28938] dump_stack+0x172/0x1f0 [ 801.852794][T28938] should_fail.cold+0xa/0x15 [ 801.857410][T28938] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 801.863240][T28938] ? ___might_sleep+0x163/0x280 [ 801.868118][T28938] __should_failslab+0x121/0x190 [ 801.873074][T28938] should_failslab+0x9/0x14 [ 801.877598][T28938] kmem_cache_alloc+0x2b2/0x6f0 [ 801.882468][T28938] ? current_time+0x6b/0x140 [ 801.887129][T28938] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 801.892981][T28938] ? lockdep_hardirqs_on+0x418/0x5d0 [ 801.898277][T28938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 801.904537][T28938] ? timespec64_trunc+0xf0/0x180 [ 801.909570][T28938] __d_alloc+0x2e/0x8c0 [ 801.913741][T28938] d_alloc_pseudo+0x1e/0x30 [ 801.918257][T28938] alloc_file_pseudo+0xe2/0x280 [ 801.923205][T28938] ? alloc_file+0x4d0/0x4d0 [ 801.927724][T28938] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 801.933981][T28938] __shmem_file_setup.part.0+0x108/0x2b0 [ 801.939621][T28938] shmem_file_setup+0x66/0x90 [ 801.939639][T28938] drm_gem_object_init+0x3b/0xb0 [ 801.939657][T28938] vkms_gem_create.part.0+0x8d/0x170 [ 801.939675][T28938] vkms_dumb_create+0x11e/0x240 [ 801.939693][T28938] drm_mode_create_dumb+0x288/0x310 [ 801.939711][T28938] drm_mode_create_dumb_ioctl+0x26/0x30 [ 801.939727][T28938] drm_ioctl_kernel+0x23e/0x2e0 [ 801.939748][T28938] ? drm_mode_create_dumb+0x310/0x310 [ 801.975045][T28938] ? drm_setversion+0x8c0/0x8c0 [ 801.975068][T28938] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 801.975085][T28938] ? _copy_from_user+0xdd/0x150 [ 801.975116][T28938] drm_ioctl+0x545/0xa50 [ 801.985329][T28938] ? drm_mode_create_dumb+0x310/0x310 [ 801.985354][T28938] ? drm_version+0x3d0/0x3d0 [ 801.985374][T28938] ? __fget+0x381/0x550 [ 801.985395][T28938] ? ksys_dup3+0x3e0/0x3e0 [ 802.005065][T28938] ? fput_many+0x12c/0x1a0 [ 802.005103][T28938] drm_compat_ioctl+0x241/0x310 [ 802.005121][T28938] ? security_file_ioctl+0x93/0xc0 [ 802.005139][T28938] ? compat_drm_setunique+0x10/0x10 [ 802.005156][T28938] __ia32_compat_sys_ioctl+0x197/0x620 [ 802.005179][T28938] do_fast_syscall_32+0x281/0xc98 [ 802.005201][T28938] entry_SYSENTER_compat+0x70/0x7f [ 802.005213][T28938] RIP: 0023:0xf7f59869 [ 802.005227][T28938] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 802.005234][T28938] RSP: 002b:00000000f5d550cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 802.005246][T28938] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000ffffffb2 [ 802.005254][T28938] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 802.005270][T28938] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 802.015251][T28938] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 802.015260][T28938] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:08:38 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[=\x01\x00', @ifru_flags=0x1}) 05:08:38 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000000)={0x7}, 0x119) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000140)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000440)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000640)={0x0, 0x0}, &(0x7f0000000680)=0xc) r11 = geteuid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) fsetxattr$system_posix_acl(r2, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000740)={{}, {0x1, 0x4}, [{0x2, 0x2, r4}, {0x2, 0x5, r5}, {0x2, 0x1, r6}, {0x2, 0x1, r7}, {0x2, 0x7, r8}, {0x2, 0x1, r9}, {0x2, 0x5, r10}, {0x2, 0x4, r11}], {0x4, 0x4}, [{0x8, 0x4, r12}], {0x10, 0x5}, {0x20, 0x6}}, 0x6c, 0x3) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:38 executing program 5: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x84\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:38 executing program 0 (fault-call:2 fault-nth:4): r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00r\x02\xa9[\x00', @ifru_flags=0x1}) 05:08:38 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000180)) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@local, @multicast1}, &(0x7f0000000040)=0x8) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 802.594273][T28954] FAULT_INJECTION: forcing a failure. [ 802.594273][T28954] name failslab, interval 1, probability 0, space 0, times 0 [ 802.650981][T28954] CPU: 1 PID: 28954 Comm: syz-executor.0 Not tainted 5.1.0-rc1 #28 [ 802.658933][T28954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 802.669002][T28954] Call Trace: [ 802.669033][T28954] dump_stack+0x172/0x1f0 [ 802.669057][T28954] should_fail.cold+0xa/0x15 [ 802.669076][T28954] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 802.669114][T28954] ? ___might_sleep+0x163/0x280 [ 802.693419][T28954] __should_failslab+0x121/0x190 [ 802.698424][T28954] should_failslab+0x9/0x14 [ 802.702991][T28954] kmem_cache_alloc+0x2b2/0x6f0 [ 802.703016][T28954] __alloc_file+0x27/0x300 [ 802.703032][T28954] alloc_empty_file+0x72/0x170 [ 802.703051][T28954] alloc_file+0x5e/0x4d0 [ 802.717936][T28954] alloc_file_pseudo+0x189/0x280 [ 802.717962][T28954] ? alloc_file+0x4d0/0x4d0 [ 802.717987][T28954] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 802.737903][T28954] __shmem_file_setup.part.0+0x108/0x2b0 [ 802.743575][T28954] shmem_file_setup+0x66/0x90 [ 802.743594][T28954] drm_gem_object_init+0x3b/0xb0 [ 802.743614][T28954] vkms_gem_create.part.0+0x8d/0x170 [ 802.743634][T28954] vkms_dumb_create+0x11e/0x240 [ 802.743655][T28954] drm_mode_create_dumb+0x288/0x310 [ 802.743674][T28954] drm_mode_create_dumb_ioctl+0x26/0x30 [ 802.743695][T28954] drm_ioctl_kernel+0x23e/0x2e0 [ 802.763429][T28954] ? drm_mode_create_dumb+0x310/0x310 [ 802.763447][T28954] ? drm_setversion+0x8c0/0x8c0 [ 802.763468][T28954] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 802.763485][T28954] ? _copy_from_user+0xdd/0x150 [ 802.763503][T28954] drm_ioctl+0x545/0xa50 [ 802.763524][T28954] ? drm_mode_create_dumb+0x310/0x310 [ 802.789345][T28954] ? drm_version+0x3d0/0x3d0 [ 802.789368][T28954] ? __fget+0x381/0x550 [ 802.789387][T28954] ? ksys_dup3+0x3e0/0x3e0 [ 802.789398][T28954] ? fput_many+0x12c/0x1a0 [ 802.789432][T28954] drm_compat_ioctl+0x241/0x310 [ 802.832610][T28954] ? security_file_ioctl+0x93/0xc0 [ 802.837752][T28954] ? compat_drm_setunique+0x10/0x10 [ 802.842973][T28954] __ia32_compat_sys_ioctl+0x197/0x620 [ 802.848458][T28954] do_fast_syscall_32+0x281/0xc98 [ 802.853506][T28954] entry_SYSENTER_compat+0x70/0x7f [ 802.858625][T28954] RIP: 0023:0xf7f59869 [ 802.862698][T28954] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 802.882338][T28954] RSP: 002b:00000000f5d550cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 802.890765][T28954] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000ffffffb2 [ 802.898747][T28954] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 802.906732][T28954] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 802.914710][T28954] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 802.922687][T28954] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:08:39 executing program 0 (fault-call:2 fault-nth:5): r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 05:08:39 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000140)={0xffffffffffffff46, 0x1b, 0x2}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 05:08:39 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0x40a45321, &(0x7f0000000040)={0x0, 0x0, 'client1\x00', 0x0, "d8363fd4b9171dda", "e9a20270e6af69661d445e1f8171372d7685795232ecabc2348ba35a00fa423a"}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000004d80)={{{@in6=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000000900)=0xe8) sendmmsg(r1, &(0x7f0000007400)=[{{&(0x7f00000001c0)=@rc={0x1f, {0x7fffffff, 0x2, 0x5, 0x6, 0x100000000, 0x9}, 0x1}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000240)="0727a8d7200dabf205ecf7a6e6a479b6f2c5aeda94a9b0e56d25be789a9b4e16c0cfbdd2a731c7df2a57f32cb1263253fe75c3a0cc96be625c0eb5e198b6c8ecafa5c86674a05393c7b1a0caa668ad4836c6e2e083825eff6a4a30189c8493c2beb6637c318856b4628a16412d7bab111efaee96a05303408bfc9c99443f14a6b17b72c56dc83bcb83d1636b05b2ed58675804efe7a1a341bafc60559f1d7f685d2fd6a8de11528e44b977b77b9b3915795aadf4c5cabce6a78b9d07e49489a0e968aa41", 0xc4}, {&(0x7f00000009c0)="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", 0x1000}], 0x2, &(0x7f00000019c0)=[{0x100c, 0x3a, 0x1, "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"}, {0x10, 0x13f, 0x0, "bc950f91"}], 0x101c}, 0x100}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)="62977000f4d76a0902bf52f94ee470da9b9b414bf33aea582bfd92a82586db2795f1136aec44d52be4c386", 0x2b}, {&(0x7f00000003c0)="de4e", 0x2}, {&(0x7f0000000400)}], 0x3, &(0x7f0000002a00)=[{0xe0, 0x11f, 0x101, "aafec563ede3c8044a17ee709043e8299a69679ccd8e5e8a4b3a0b91ca60f067843293af55e59a84164966f90f11ac06a8deee8ba0f2a80a7241eed52df578363285ea8f16c146c4e7b3fb93d3bd86e01d93a6ca399eb4a08b01b806613337b95b42b858c4f61d2218b967973355df5bd2c4bcb44676650cd83c061f0d423efde8c1ab75f1f2a5a529b4ba94c5768abc515b2bbbeeec6a8fc806e1b3d4b97156282e912112d56cf012f4d982f64f4349f8c3d13c2fcc5363b828c8cd98c00d4c434c467cbe94182125c53c8903cab4f05adf"}, {0x24, 0x19f, 0x7fffffff, "9d67abb4280805d8596a239ddc70eaf6b9fe285eef"}, {0xe8, 0x13b, 0x9, "51c6940d45b656c22d73bebd20d2aaad11a999e7645ac9f34dce4d7e5f65bdf31eca400d77e531dbc870b6a14ac8732099d87952b9c0c3af84bd26c5605c95a2020c542b28f792c0a5ca9b141b8c19648d627a578b9409f29190fd002ac2ea77958040c85cb49f4b875d96d0030d0e305928c02f021336bf9f767d0fed57dbd6d4b78d669a5304dd67ebe00d481bdfb87cf86c3790444c5a3b3165a83c9f3a3a0fad246c3ac1ad1c6cf4fd1f202146c32083d86068426fe8862184b8a47846123872b4a0d8cc9971c1534d448405f22a7bfb6892f0c03ed2a76357"}, {0x64, 0x117, 0x9, "e6631b4761ea690eea80c8389f27fd5b4a8741920a6ddc871940e992f82a0dff63ab0f1500a09e8b9ea6483fb061ee6238a84dc6c3224b28c72392fda75f8d09c200f60a3f410938d78b634f9c43501b350dd64545b5"}, {0xac, 0x0, 0xffffffff, "e9373005448e59a1ba1b4e040d060e9b5a47f2e8787599d97f79fc2c91ad9245fb254cdbba2b6767c79078d520cb7ad3ed7fff3ceee2c864b262f4cbde3f0996fb23476ba51f5bfd79f8cd7fde29ce557080fa569d1e66f8d831a1fe40e02032241809e01c4ef84f07d8d8efb03926254022e154254f40d879e53ce1429b91c80076c5c7e2f3497559bebc78454bf1a7f7dadcafbe3b0ff0f9f7e5d021251d4d"}, {0x50, 0x10b, 0x7ad, "bb0778389a38d5b8b812979f0c929da59039f134cd7d90d553659f58566fb6e55be235c83144d0234ce3ebd21a64dd58d287b39fc2ab187bb37c2aa1e5bc1c89bf739d2d"}], 0x34c}, 0xc336}, {{0xffffffffffffffff, 0x0, &(0x7f0000000800)=[{&(0x7f0000000480)="3ae530af695291fcb72545f8dd14cbd1a75862f83590cca6b9956c15991a4bc4f11c7566", 0x24}, {&(0x7f0000002d80)="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", 0x1000}, {&(0x7f00000004c0)="dc8d1ed5e4a6a7ab152c10e43d2a1b1fb51a515b97036abcd80722ab77fad9657b7ac722aa5cac7fcc5248fc414f74bc8a83032267cf02997120d3b52232bc7d02699f99209662923f452943277adf62", 0x50}, {&(0x7f0000000540)="136a8ec32640f8a826710de3c2f24a960fef0ec4c10a75fe16a051ab752a809f7db997a80c65555b680930b551f8f27ea32d4ef404d75e51f690bf97263ca26667c3e2cf02f0a6cdcece2437cb3c5f4fef435724c1d3a877eae231b9434713a61456b621b6e3bb6b1836ef713eee003a0003b2c7046fd42862ad2aa84ed4faac2040fec7397cae772e05f3ba01d84cd767", 0x91}, {&(0x7f0000000600)="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", 0xfe}, {&(0x7f0000003d80)="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", 0x1000}, {&(0x7f0000000740)="4d4960792d5b3793b25319f165578533c889388cbb9689d333ef752f6168a842894d9296b2bf441f0259d5b0cb8d1e99f0d711a19e8e97b734e8b930a3136f27b55803d246323ecffe049b5cb6e78adc3b005411130ac9421ba5f82a4c9955a91bc735dbdf8b36b52d17f6c067cd44847c9c6c597f20176f469cd000715bb15fb65e330df30f04c2bda03ab15cf6f78f46a91962d8185f3287be891a6cc7b59e76f0", 0xa2}], 0x7, &(0x7f0000000840)=[{0x94, 0x1, 0x1000, "6efe900f50de9946ddfd8394312a22c8e51de4f1a2ab8168a7e938a6d9f086dde200e88b703eeafbc8ea64ef85a785cd18bbd8ea07b4d886a9c8d9af3b94c7c57f6297129aa1cf796c844a2bd51c8ef337a169d2e6c9abaedac8668d2d44fd40ee862b5f6e8001d7d4142f10c40d72f8b09a51ef8a910e263f0f166245aa0afb5e39d787a1"}], 0x94}, 0x2}, {{&(0x7f0000004e80)=@ll={0x11, 0xf7, r5, 0x1, 0xfffffffffffffff9, 0x6, @broadcast}, 0x80, &(0x7f0000004f00)}, 0x8}, {{&(0x7f0000004f40)=@pppoe={0x18, 0x0, {0x2, @link_local, 'veth0_to_bond\x00'}}, 0x80, &(0x7f0000005fc0)=[{&(0x7f0000004fc0)="6cb93b607ca41fb46e38e1026db02349dc21e31828d3e4d9db6feb018cc7bd3a63c2c110f9247bcc5e0a1abbb145a9ab4434261d036bf8f5a71fad3d664a62d239ee0569d215c1f5ae97dd80dc99975861208f813c7554cf6f9ecfac0354195ddc06807dfc8872d1f8f6f8c41ebcd5adbd0aec6a870d23f4b04f7c5da27fae91de78eb3ab6854eafe6e06d00459e67efc413b42a1117debd77f04f736da5c816d6f9ea9dba9de7d942a855effadb0aa629e76f095ec799d46832c932ef5b5a0a2b1f142c28ac0ad858132e621267b84586d3d867e4c7a6b1bd047543ccc11f6ad5c46e14845c093b4d9532defc6a1f2ad582af3b8ccc64e7afac00b4f8fa022e3d4828bc9a72c2002d651e4fd8dea18dda1c85c87f1594f6c50fd6709a24e50c030dc5f7884f883ddcaeb61e405cc5c2d5c078a89bd55f7c21701e2585f3604ea46e80c072ad86c02b83ff39741c7879c9fa55d2ae56925e610816fe974be034286192ea329b2cb3027d92deb1c512b9978d6377758cce1ceb5bce112350449336d877b41f258313bbd89c24caa178e6e3090d48103cf44c40f6304c9a8b7c64735844df4dd9fcfba26892fbf5d54cb14f7cd3db23977fe8c2cd1993daf5a3f50b186d178f2be054ad533a7d0b750523e4db5aa9f4ed2b6d6f6aadcf318cd43c90b1a9f4f6d7fe481a8fea3eef7b9ce8d062f1b311c44b9066ac04b3e0d33e3359e646bcae847cfe389f3792c31f3a1144a08dd2c696d0fbd8b407723591f778d20d0621157c4530abcf6af2704b4c36bf768880b37a3da5435e728d8a1718560cbac71243f94c7fc13edf45f3c3bb7916f760b0f92547552cba17bed8a821e433045ad277cd0a0097430b83afbb95bc550c7ababd17740822ee7f1fa56e00757b599e5c9bf1582d2706167f56cdfc88c85df57b1f171b2b336815036f2d73b1d5e973df5ed131a2e31e760ce632e3dd8502da8154a1a96c9a711595500e3229b8cff9cf63956978deba913750afa36100f782f424b22090a429b1ddfdb907e39bcf16112f439d114edc6bf26e997b985044dcba0cd49575386a0258e3b79172e1bbffac50f99e8d38bc9cfe8eea7a681bc9f0a5844759e53102d126ee1d29663059cdb57fd16e280e061619daeed77d4bab74ebe8bb2e0234211336b48fb521fa2e8a0dddbdb58b3a753d6ff8aa41eed8bbf653dea8e0fb2cc2f3d83ff5f2f9c13eb3fb22bb2574bb4a0af09c7a36fb00b8cddae70cc4cf106db3a5a794c799ca1a03020a465551b6d90cbf7b6b31d635f4013931fb6d799d452b9b72b71ca0f6491d6828a6d846af32a28a1fe7a73cac2abb2135f03093abf91d0d58c6660c3f18ec0d1c8154ace92d50c65b62c7c9b71b466f5b32b154d3adcbb5889443da3977aba219a8c6db68414d7b7e75a0ebeda918264d238fde087e29067eebfdeef194232a9409d037deca65f82d3069e1eeb4972243d0e2605a515077f432e0858188e07fd1649c06396b7fdc9bf3410d418b03c2a2aa3fdd93bbd648a5ae2b672ff49f6ac3e70448921f5f02b250788684ece19bd1284d1c383e291d4337dd9bd51e78a4d75ba6199b6355b6f77a0637994f117a92f3b7fd29c3bd3f8293f2090807d9e2572c3c709e7a6023f1f4ca860f539ab67c48eb98af296697d794c13d91fc0745327d7b2fb87c8a1f5f2d30329757f9168d6ffc0401c6f17a3340ccda4107fd33ef3ff1c7d6b77dccc8ee83bc19b9d3aa249189779a694df6355cd843225577e260b45fd95aea2c2282841d0b372ef3cbb935d4f9447e44bda9f22775d4608876f87fc673fc7e8b0f3862c983f1cb1578cb3d756ba9f460b5065f5921b1e884fab8ad48c11aec89a1269793e07d037c0532f1f4402fea487d96a3d7dddd589c320540bc8dbaffae44e121477bac0bafab3f585d3cb2957743ba44c259428499319470b585d9d53db808bd9ff865c5c3fcec3040d71b6d8943d421e037906604904c011bc6043fdc972e59113eb47df3c29e852f7091b2b114b3a716c5b49960787432d4260eed985e41188399f98750e5ed1379a7f2ab55ca155226f2714b531cd2b2e4b84f0bb78df5693ccd930ee1e43fb40e0135895d256190874dd61cbcddf179e23f50a628c86166320e38248fa9ddcd2efd1e86859ed99f24145454971b71927c832ce60864a4502fd4a09082bd662812716c1a8ce4d59f6f089bddd932f920e95f98f9babc18cd29103df757df2c6a011c6ee6a111366a71cc5829a596adf9cd5c827c66c7f3368ec486f57eea56951ec40ce3052d30df103810d03643b50f903c07188da4742425b10ed9a7dc0277d00fd72a4c31eae94320814545946088367a439b4a2537152f22c29428a73b8cdfaf82da8782455ac0413254e8b6aaa2cdc190f0b463652b2e9bb2963432a0c14f0c64370adb961fb458b8712c2740942d150a47624d441c89c04183c6e5108ab00d7b0c4b3921e77245d56df038117b24ad7c95ad4e192c1796a071d33926dc129269b73eff5d22a4c30b3f6ac12758fde679a9a6e5cc09d1bc6b4e6b248b6d967d491d613ba5712b70db9dc372fc58efe929eae655d2585b88c26e88fdc3839883c8e5eff018f1114c66b5d9b7938c435c069a0824965376a9fb4bf45fcc81f212dac63910b91bac62250e6b76691c081b4298f33e8ff9620104264801812a7a393067cd9304ce45d69992d460894a38ebfb61cb73c87dcac024fe4a778655c965658b19e0c80ef20c7a5ec62ee8f81a99ae311e69a48dd66d4ce200270e07de805707346fa72785711f4bc8c9a2554728e1a1ef13993518191d7b6e1858816c4882948b366e24531926461413e62b51b44d58a47a92322527c2c8308ebd40ecb55f2daa61f62ff1cb2f01ea476bfa02207f02167f18e0bc9e4b5b2458d5a1ffef92cf73bb37f3fc4208bf6b3ed76f26e68900ab57a5e13ebf7ebc8102260b5a2572860f48e55aa632a57e4c7977a5c3e92af0ae50574b004971f55eb785c18961e38b39e1c3ba68cbfe926766f148041ef9e32ade61e8ef4cf3a8cbd29f7c8e7535ce7cc8ddff01fedfdd5942226a891332eb24e6612ddf83cef07201ca8b67a6d19d7202dd3a4a22eaca94f87054b14be2cc520c1757d37802f8481cc306bc267db45e4f48b4c5e73d8326b5379e43e698e4aca993cdd9944bc728ca4073651e522ed3d9fcdc56995f6210cfa08ffcafe4cdb9c34b9d4615ad4fee4f9fc5dbd38ed5daead45373587baa7fda318b027ca614910f8c24caa46264338a09ba0667578adeac9ecc387410778365ec02b60a37f41cb8d7c0b33dc5cea47bc8877da1f3d53acc3e1726132c6ff4937e4ab8d6ba20d42874fcf147a479b7735689372ca068f00c73fb0f0b88dbb7850f82a8030b897105eb9577d4196ab7f2d488c64e3c5b1ed04f8d59cae9b61ac82b8e65b75f1b244f213987c46c67db1cc5bbee52f922db3cd7727a4538a8a8058d0de86d40dac2085553e4456edf2a617963668c111cdc0c28c3baf8876e6fb239cb21ffbf70f2ee48aab5ca0d8585a7dfb1d8734e6678b077d9a372261f27b215785e607f1da19c57c69d7b97aada972469f5613bfead82d13eaac174747dd647b95f8905ad3e7f77abc0c03b7cd28ee2100b5983da8339371295eaef2a2ed6df50e2e809479d77e2b6e655f07e90dce6594b399ec32b8bdd2bdada84dae18ba71a3bcaf9974fcdff643fe9dc5cfeb2d36aff18046581ca5866c820488ec0236d58a9b72eb7e808ec2f9a5a67ad338d260e723bd27e45a8f8e7d87f9385a88e62fa6e4f4fe7b2c4b18e4cd8876bb940d385b4d83d6e6409aac86b2c43b9e152c289a41943a8733388d7bbeb3a965f2dc7166fccf979bb85c3be1ee3d8d5451ba97e82606f3cfb3ef5170fada052410e2ec74056ce3b39d0ee4aa894a867c8a71269c50a5f724ddade565c72639820f13e7c1f30fef21f7ed7a1e987452ca24aecd6b5d82e8e0bc5d9a4b7acb9bd9140dc04e0dd3d64fc86333d92fe436131092c25f6a43e3083170610a6e1b118f46e49446f3516dc219a54385045b8014e316be208300658867628244088297229815082eeca9fd481242173bcba945b372f3dd6e7a52d96740eef230a2a857c18cade74c001410d6386d524a3aad2eb12208fdd19aa30ef361d69ab259e4e37007115df9b622589b3f1dcd8a178477bfe388b8b5c6ff81297d8069b0f0fa5fa2c37dcfab5458133b4e62f97e344c6f21c6eb06f197a556a7fa71b3a92384d8fc819a470cdbebb8e0c4bcb4ee2f964bb1b6c9d937ea072f28b5b09750e15fc83838e6301bcbf2d3aaf244d589c951a0b9eadff26e95f0ac0fb75d2bbe758666f8d1cae5363c6f40b9a3389939d3e1a286fca0cfe039f4e30534431e807a084c80811bb0499440ab7e0fbf0aa83cd00d8ca09e7a8a5ef53b7787960f1b4e8f09298729b6144432eb4da58b5d3e5b5fda749713bb00cf377de53f8cfe234f83666e9193f48306b80b0cfab20850dfa54b353f81ac15dc949de84453dbc7a932862c8f979db16b76e5b7a13484486a97830c2a78c51aa95f97456b3551bc27dd5462dd2a38aa460d479ddf03fcebb589d661e999086b1e4fd693ca015c9f14bf1fa7f427d23aaebf99a13778ef3ba25bdf61d2a1413c01ca56d52bed9172669641dfceef2516cbc0fd6fc352374a251cfddd64617081aff67a06d37fc0943d72b7a3965c46ef2e2d9c646bf34f09ebf2dac8b379b30b3d203f0498f4a99403e915c369e914d55d2db8800418fda7daf074c701b7b800ff9b65791be514d1de66521ca088506d8a4e173364f1a4a79fa1492dd8548503973d1397ab4fd6c7f9e728ee826751c8d4a587465873561e07759686f163f36ec6e9b04c8d6bcc766bf1249219c3d89f673a66a79d97e8e023394769433dc820c1c10f5d2a23889ccb01ca1b1132a7a1b4a697b98782612d656d90c766aa88a30d1f74887cd1349f941d5b630fc0e5088f2f160f012c5b973c436031b0f1f96cedbdb30b87d23b391085dbd673309af75e5a6595f2f977b906ee46255877a4ec064cfa6af02d03384484cfb14b340cd4e9c321c869dcee04d0ac947e8ead5dde9484c596e61fac629ec4ff6c630a768ee6f61103b15dd2d92a4f9acc8d33210edc7c467e309b69df079338bdbd31c37403c33667cde17ede237f204cfc92f6e66e364dde9080b02a2e06aa2af8bd8ac172e7e6c6d03479aab9ac7e258f42479bcdc7aabb996703d01644062792a1bd97af7257cffb8803f946798dd520944e378492b1fe3d9cb3376f2c52de92f9520c63ad1eb4d87751d3ec9576513edc4366d9328bd74675a5a0a0dbcc226b6b3d8f5b182c6f4a85221444ef428ae4bbd6b1ad1d176a62ece404d9c26fefd95ea364e3c36554400c1aa5d0a381f65f385b4456f59fd0cb44a59f966b51235f8111eaf94deac97eed18c8c22af6a95a439f2b14b066fbd9c66c02b3f04488a660e80c9e2e360d1fc55b4ebe6e26d20da43688494ddb4cf142c0496f7c2f59aba259eccfc9ec09c077e59efbf5609d1f2dc3636a8dca19d79e85ac40db22b699338215140aaaa9c1df9a9c2d08cf5da4abc8b7e1a1ec8fbb89c88d93cf6fe80ea41794b97647bec4871eded08b0b17df4ab2bd2314eb73a51059d25fa8862e5d80f1d875abc626efe23442d8a85a3b2327fce9498744b9f4bf4f5bbb0583f8b88095280c5078d44aac93ad263752cd865eca04790b54a9cb070b8e1579716c5ecd4b4dfc13c4a5025bcd173e1", 0x1000}], 0x1, &(0x7f0000006000)=[{0x88, 0x29, 0x4, "898d5a79abea338f6ea0feaeeaf27532c620afd2732b7ddd8342efa6dd6679ab38cacd61d8df67a3f5c2e4a3acf7828256d98462432058aafcdc5ba4139bddf4b0e7bc48a44aa02a8ab84d2bee3ce36690bd737b59187c1409e5029ba34ec26d3b02a13bbb6bbc12c02ad369c4633e6c5935648e559a163e7122699e"}, {0xd4, 0x0, 0x4, "522682b2abfbe02b5addd9e52f2dd2e8bfd2b3fa2e4110fe4885a3e6616620948c85992bec670697cb96513fe8d517fe572c14477601eb38a66a7a00c625972d342f8ade96fd1204e14fe7e69f908392b034b002c52efb71c124b4e7cb9e13c5ef57f43f67976d0db5031def04207934ea1f0acf4dfd0be020241b5832c3390ffce9c8fadd3124497f906d99c857b1dfbfd7f8c6dc34266c5e5acf8dd12e6c9599e130b678f3726cd10ecccd7d18c28a872b250f1094b61a532550c3a375ab6140b542e04a19"}], 0x15c}, 0x3}, {{0x0, 0x0, &(0x7f0000007340)=[{&(0x7f0000006180)="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", 0x1000}, {&(0x7f0000007180)="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", 0xfd}, {&(0x7f0000007280)="414d953c267adc4bf2c6ed5c27e9b3181351fab9e7f9169f81ca4ccfaee4b00a1d8df90ba31f608ac4e40390d0744f376dad5c0dad51fb57a74587571917e0273cbd6ae6d61114885a4a3bdcc74a66d30014afa1255e92f231a78410d02a81450d6e005a98fb0ebe12e1189be269beeffc", 0x71}, {&(0x7f0000007300)="d1c7fc573e292d13149818df8a135a7f0e2491240d522d3f", 0x18}], 0x4, &(0x7f0000007380)=[{0x28, 0x100, 0x5, "f2ec95ec04eaa6501205418ce6738f3cbd10cc8c3247fd0a920477"}, {0x4c, 0x10e, 0x7ff, "d9eb7609ec983f02319b6eef917fa1f83224322703087cf64eedc21639256c23eaff857908c25ceeddefc12e93da469d9ddecb86d0d85366bca94b91868ecc"}], 0x74}, 0x8}], 0x6, 0x20008004) wait4(r4, &(0x7f0000000040), 0xa, &(0x7f0000000080)) r6 = accept4(r3, 0x0, 0x0, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000180)) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0x0) splice(r0, 0x0, r6, 0x0, 0x80000001, 0x0) [ 803.191924][T28972] FAULT_INJECTION: forcing a failure. [ 803.191924][T28972] name failslab, interval 1, probability 0, space 0, times 0 [ 803.228493][T28972] CPU: 1 PID: 28972 Comm: syz-executor.0 Not tainted 5.1.0-rc1 #28 [ 803.236444][T28972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 803.246519][T28972] Call Trace: [ 803.249833][T28972] dump_stack+0x172/0x1f0 [ 803.254273][T28972] should_fail.cold+0xa/0x15 [ 803.258887][T28972] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 803.264798][T28972] ? ___might_sleep+0x163/0x280 [ 803.269667][T28972] __should_failslab+0x121/0x190 [ 803.274620][T28972] should_failslab+0x9/0x14 [ 803.279149][T28972] kmem_cache_alloc+0x2b2/0x6f0 [ 803.284113][T28972] ? rcu_read_lock_sched_held+0x110/0x130 [ 803.289856][T28972] ? kmem_cache_alloc+0x32e/0x6f0 [ 803.294897][T28972] security_file_alloc+0x39/0x170 [ 803.299938][T28972] __alloc_file+0xac/0x300 [ 803.304370][T28972] alloc_empty_file+0x72/0x170 [ 803.309152][T28972] alloc_file+0x5e/0x4d0 [ 803.313408][T28972] alloc_file_pseudo+0x189/0x280 [ 803.318369][T28972] ? alloc_file+0x4d0/0x4d0 [ 803.322886][T28972] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 803.329162][T28972] __shmem_file_setup.part.0+0x108/0x2b0 [ 803.334820][T28972] shmem_file_setup+0x66/0x90 [ 803.339543][T28972] drm_gem_object_init+0x3b/0xb0 [ 803.344501][T28972] vkms_gem_create.part.0+0x8d/0x170 [ 803.349809][T28972] vkms_dumb_create+0x11e/0x240 [ 803.354680][T28972] drm_mode_create_dumb+0x288/0x310 [ 803.359901][T28972] drm_mode_create_dumb_ioctl+0x26/0x30 [ 803.365481][T28972] drm_ioctl_kernel+0x23e/0x2e0 [ 803.370345][T28972] ? drm_mode_create_dumb+0x310/0x310 [ 803.375748][T28972] ? drm_setversion+0x8c0/0x8c0 [ 803.380621][T28972] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 803.386886][T28972] ? _copy_from_user+0xdd/0x150 [ 803.391756][T28972] drm_ioctl+0x545/0xa50 [ 803.396017][T28972] ? drm_mode_create_dumb+0x310/0x310 [ 803.401411][T28972] ? drm_version+0x3d0/0x3d0 [ 803.406019][T28972] ? __fget+0x381/0x550 [ 803.410196][T28972] ? ksys_dup3+0x3e0/0x3e0 [ 803.414623][T28972] ? fput_many+0x12c/0x1a0 [ 803.419084][T28972] drm_compat_ioctl+0x241/0x310 [ 803.423967][T28972] ? security_file_ioctl+0x93/0xc0 [ 803.429112][T28972] ? compat_drm_setunique+0x10/0x10 [ 803.434323][T28972] __ia32_compat_sys_ioctl+0x197/0x620 [ 803.439806][T28972] do_fast_syscall_32+0x281/0xc98 [ 803.444847][T28972] entry_SYSENTER_compat+0x70/0x7f [ 803.449973][T28972] RIP: 0023:0xf7f59869 [ 803.454051][T28972] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 803.473681][T28972] RSP: 002b:00000000f5d550cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 803.482125][T28972] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000ffffffb2 05:08:39 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000940)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}, 0x1c) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xffffff2e) ioctl$RTC_IRQP_SET(r0, 0x4004700c, 0x1) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 803.490124][T28972] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 803.498140][T28972] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 803.506143][T28972] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 803.514139][T28972] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:08:39 executing program 1: socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[j\x01\x00', @ifru_flags=0x1}) 05:08:39 executing program 0 (fault-call:2 fault-nth:6): r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) [ 803.727259][T28986] FAULT_INJECTION: forcing a failure. [ 803.727259][T28986] name failslab, interval 1, probability 0, space 0, times 0 [ 803.740497][T28986] CPU: 0 PID: 28986 Comm: syz-executor.0 Not tainted 5.1.0-rc1 #28 [ 803.748402][T28986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 803.758475][T28986] Call Trace: [ 803.761783][T28986] dump_stack+0x172/0x1f0 [ 803.766134][T28986] should_fail.cold+0xa/0x15 [ 803.770744][T28986] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 803.776560][T28986] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 803.782214][T28986] ? find_held_lock+0x35/0x130 [ 803.786992][T28986] __should_failslab+0x121/0x190 [ 803.791950][T28986] should_failslab+0x9/0x14 [ 803.796471][T28986] kmem_cache_alloc+0x47/0x6f0 [ 803.801254][T28986] ? refcount_inc_not_zero_checked+0x144/0x200 [ 803.807418][T28986] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 803.813257][T28986] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 803.819604][T28986] idr_get_free+0x425/0x8d0 [ 803.824139][T28986] idr_alloc_u32+0x19e/0x330 [ 803.828746][T28986] ? __fprop_inc_percpu_max+0x230/0x230 [ 803.834303][T28986] ? drm_gem_handle_create+0x47/0x70 [ 803.839601][T28986] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 803.845849][T28986] ? alloc_file_pseudo+0x1a9/0x280 [ 803.850999][T28986] idr_alloc+0xe5/0x150 [ 803.855172][T28986] ? idr_alloc_u32+0x330/0x330 [ 803.859958][T28986] drm_gem_handle_create_tail+0x12a/0x3b0 [ 803.865690][T28986] drm_gem_handle_create+0x55/0x70 [ 803.870812][T28986] vkms_gem_create.part.0+0xf4/0x170 [ 803.876121][T28986] vkms_dumb_create+0x11e/0x240 [ 803.880990][T28986] drm_mode_create_dumb+0x288/0x310 [ 803.886204][T28986] drm_mode_create_dumb_ioctl+0x26/0x30 [ 803.891764][T28986] drm_ioctl_kernel+0x23e/0x2e0 [ 803.896627][T28986] ? drm_mode_create_dumb+0x310/0x310 [ 803.902054][T28986] ? drm_setversion+0x8c0/0x8c0 [ 803.906916][T28986] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 803.913170][T28986] ? _copy_from_user+0xdd/0x150 [ 803.918032][T28986] drm_ioctl+0x545/0xa50 [ 803.922284][T28986] ? drm_mode_create_dumb+0x310/0x310 [ 803.927676][T28986] ? drm_version+0x3d0/0x3d0 [ 803.932282][T28986] ? __fget+0x381/0x550 [ 803.936457][T28986] ? ksys_dup3+0x3e0/0x3e0 [ 803.940879][T28986] ? fput_many+0x12c/0x1a0 [ 803.945313][T28986] drm_compat_ioctl+0x241/0x310 [ 803.950174][T28986] ? security_file_ioctl+0x93/0xc0 [ 803.955295][T28986] ? compat_drm_setunique+0x10/0x10 [ 803.960507][T28986] __ia32_compat_sys_ioctl+0x197/0x620 [ 803.965985][T28986] do_fast_syscall_32+0x281/0xc98 [ 803.971029][T28986] entry_SYSENTER_compat+0x70/0x7f [ 803.976142][T28986] RIP: 0023:0xf7f59869 [ 803.980214][T28986] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 803.999827][T28986] RSP: 002b:00000000f5d550cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 804.008254][T28986] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000ffffffb2 [ 804.016230][T28986] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 804.024205][T28986] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 804.032179][T28986] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 804.040154][T28986] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 05:08:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-avx\x00'}, 0x58) write$binfmt_aout(r0, &(0x7f0000000180)={{0x108, 0x70000, 0x200, 0x389, 0x19a, 0x0, 0x337, 0x6}, "a46f5dbb89ed64a364bb8678d543b6a9f2c791a0b999ac02f2c9de0d53cabfc9e05d87a235845fe099da029a2deec61edbc960616f0e57a010691539ed28e8b28441cff1a7c31532e1ed7462fea0af231ffeea42f13f3bb888291969f85141337131535cc82f99c5450e901ba94f7632640290cef10a276fa89c1cb16145", [[], [], [], [], [], [], [], [], []]}, 0x99e) r1 = accept4(r0, 0x0, 0x0, 0x0) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xffffff2e) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 05:08:40 executing program 0 (fault-call:2 fault-nth:7): r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{0x0, 0x401}, {}, 0x8, 0x1}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) [ 804.230858][T28998] FAULT_INJECTION: forcing a failure. [ 804.230858][T28998] name failslab, interval 1, probability 0, space 0, times 0 [ 804.274401][T28998] CPU: 0 PID: 28998 Comm: syz-executor.0 Not tainted 5.1.0-rc1 #28 [ 804.282345][T28998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 804.292412][T28998] Call Trace: [ 804.295726][T28998] dump_stack+0x172/0x1f0 [ 804.300078][T28998] should_fail.cold+0xa/0x15 [ 804.304721][T28998] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 804.310541][T28998] ? ___might_sleep+0x163/0x280 [ 804.315404][T28998] __should_failslab+0x121/0x190 [ 804.320353][T28998] should_failslab+0x9/0x14 [ 804.324860][T28998] kmem_cache_alloc_trace+0x2d1/0x760 [ 804.330337][T28998] ? wait_for_completion+0x440/0x440 [ 804.330357][T28998] drm_vma_node_allow+0x52/0x2f0 [ 804.330376][T28998] drm_gem_handle_create_tail+0x194/0x3b0 [ 804.330394][T28998] drm_gem_handle_create+0x55/0x70 [ 804.330411][T28998] vkms_gem_create.part.0+0xf4/0x170 [ 804.330430][T28998] vkms_dumb_create+0x11e/0x240 [ 804.330457][T28998] drm_mode_create_dumb+0x288/0x310 [ 804.330479][T28998] drm_mode_create_dumb_ioctl+0x26/0x30 [ 804.372392][T28998] drm_ioctl_kernel+0x23e/0x2e0 [ 804.377252][T28998] ? drm_mode_create_dumb+0x310/0x310 [ 804.382627][T28998] ? drm_setversion+0x8c0/0x8c0 [ 804.382645][T28998] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 804.382660][T28998] ? _copy_from_user+0xdd/0x150 [ 804.382674][T28998] drm_ioctl+0x545/0xa50 [ 804.382687][T28998] ? drm_mode_create_dumb+0x310/0x310 [ 804.382705][T28998] ? drm_version+0x3d0/0x3d0 [ 804.382724][T28998] ? __fget+0x381/0x550 [ 804.382745][T28998] ? ksys_dup3+0x3e0/0x3e0 [ 804.382757][T28998] ? fput_many+0x12c/0x1a0 [ 804.382781][T28998] drm_compat_ioctl+0x241/0x310 [ 804.382804][T28998] ? security_file_ioctl+0x93/0xc0 [ 804.412885][T28998] ? compat_drm_setunique+0x10/0x10 [ 804.412910][T28998] __ia32_compat_sys_ioctl+0x197/0x620 [ 804.430722][T28998] do_fast_syscall_32+0x281/0xc98 [ 804.430753][T28998] entry_SYSENTER_compat+0x70/0x7f [ 804.446486][T28998] RIP: 0023:0xf7f59869 [ 804.446503][T28998] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 804.446518][T28998] RSP: 002b:00000000f5d550cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 804.480465][T28998] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000ffffffb2 [ 804.480475][T28998] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 804.480482][T28998] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 804.480490][T28998] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 804.480497][T28998] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 804.488359][T28998] ================================================================== [ 804.537250][T28998] BUG: KASAN: use-after-free in drm_gem_object_release+0xf1/0x110 [ 804.545034][T28998] Read of size 8 at addr ffff888089d4b890 by task syz-executor.0/28998 [ 804.553248][T28998] [ 804.555565][T28998] CPU: 0 PID: 28998 Comm: syz-executor.0 Not tainted 5.1.0-rc1 #28 [ 804.563430][T28998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 804.573485][T28998] Call Trace: [ 804.576763][T28998] dump_stack+0x172/0x1f0 [ 804.581107][T28998] ? drm_gem_object_release+0xf1/0x110 [ 804.586558][T28998] print_address_description.cold+0x7c/0x20d [ 804.592520][T28998] ? drm_gem_object_release+0xf1/0x110 [ 804.597966][T28998] ? drm_gem_object_release+0xf1/0x110 [ 804.603410][T28998] kasan_report.cold+0x1b/0x40 [ 804.608182][T28998] ? vkms_gem_create.part.0+0x170/0x170 [ 804.613715][T28998] ? drm_gem_object_release+0xf1/0x110 [ 804.619205][T28998] __asan_report_load8_noabort+0x14/0x20 [ 804.624844][T28998] drm_gem_object_release+0xf1/0x110 [ 804.630134][T28998] vkms_gem_create.part.0+0x147/0x170 [ 804.635519][T28998] vkms_dumb_create+0x11e/0x240 [ 804.640361][T28998] drm_mode_create_dumb+0x288/0x310 [ 804.645574][T28998] drm_mode_create_dumb_ioctl+0x26/0x30 [ 804.651110][T28998] drm_ioctl_kernel+0x23e/0x2e0 [ 804.655962][T28998] ? drm_mode_create_dumb+0x310/0x310 [ 804.661318][T28998] ? drm_setversion+0x8c0/0x8c0 [ 804.666164][T28998] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 804.672407][T28998] ? _copy_from_user+0xdd/0x150 [ 804.678212][T28998] drm_ioctl+0x545/0xa50 [ 804.682457][T28998] ? drm_mode_create_dumb+0x310/0x310 [ 804.687815][T28998] ? drm_version+0x3d0/0x3d0 [ 804.692389][T28998] ? __fget+0x381/0x550 [ 804.696527][T28998] ? ksys_dup3+0x3e0/0x3e0 [ 804.700929][T28998] ? fput_many+0x12c/0x1a0 [ 804.705332][T28998] drm_compat_ioctl+0x241/0x310 [ 804.710183][T28998] ? security_file_ioctl+0x93/0xc0 [ 804.715298][T28998] ? compat_drm_setunique+0x10/0x10 [ 804.720480][T28998] __ia32_compat_sys_ioctl+0x197/0x620 [ 804.725930][T28998] do_fast_syscall_32+0x281/0xc98 [ 804.730942][T28998] entry_SYSENTER_compat+0x70/0x7f [ 804.736038][T28998] RIP: 0023:0xf7f59869 [ 804.740101][T28998] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 804.759692][T28998] RSP: 002b:00000000f5d550cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 804.768088][T28998] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000ffffffb2 [ 804.776051][T28998] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 804.784029][T28998] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 804.792008][T28998] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 804.799961][T28998] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 804.807928][T28998] [ 804.810237][T28998] Allocated by task 28998: [ 804.814640][T28998] save_stack+0x45/0xd0 [ 804.818781][T28998] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 804.824398][T28998] kasan_kmalloc+0x9/0x10 [ 804.828716][T28998] kmem_cache_alloc_trace+0x151/0x760 [ 804.834093][T28998] vkms_gem_create.part.0+0x5f/0x170 [ 804.839488][T28998] vkms_dumb_create+0x11e/0x240 [ 804.844345][T28998] drm_mode_create_dumb+0x288/0x310 [ 804.849539][T28998] drm_mode_create_dumb_ioctl+0x26/0x30 [ 804.855079][T28998] drm_ioctl_kernel+0x23e/0x2e0 [ 804.859919][T28998] drm_ioctl+0x545/0xa50 [ 804.864177][T28998] drm_compat_ioctl+0x241/0x310 [ 804.869020][T28998] __ia32_compat_sys_ioctl+0x197/0x620 [ 804.874482][T28998] do_fast_syscall_32+0x281/0xc98 [ 804.879496][T28998] entry_SYSENTER_compat+0x70/0x7f [ 804.884599][T28998] [ 804.886912][T28998] Freed by task 28998: [ 804.890978][T28998] save_stack+0x45/0xd0 [ 804.895113][T28998] __kasan_slab_free+0x102/0x150 [ 804.900035][T28998] kasan_slab_free+0xe/0x10 [ 804.904543][T28998] kfree+0xcf/0x230 [ 804.908342][T28998] vkms_gem_free_object+0x89/0xb0 [ 804.913345][T28998] drm_gem_object_free+0x108/0x260 [ 804.918463][T28998] drm_gem_object_put_unlocked+0x129/0x170 [ 804.924250][T28998] vkms_gem_create.part.0+0x101/0x170 [ 804.929609][T28998] vkms_dumb_create+0x11e/0x240 [ 804.934455][T28998] drm_mode_create_dumb+0x288/0x310 [ 804.939632][T28998] drm_mode_create_dumb_ioctl+0x26/0x30 [ 804.945156][T28998] drm_ioctl_kernel+0x23e/0x2e0 [ 804.949986][T28998] drm_ioctl+0x545/0xa50 [ 804.954259][T28998] drm_compat_ioctl+0x241/0x310 [ 804.959103][T28998] __ia32_compat_sys_ioctl+0x197/0x620 [ 804.964573][T28998] do_fast_syscall_32+0x281/0xc98 [ 804.969621][T28998] entry_SYSENTER_compat+0x70/0x7f [ 804.974736][T28998] [ 804.977067][T28998] The buggy address belongs to the object at ffff888089d4b780 [ 804.977067][T28998] which belongs to the cache kmalloc-512 of size 512 [ 804.991106][T28998] The buggy address is located 272 bytes inside of [ 804.991106][T28998] 512-byte region [ffff888089d4b780, ffff888089d4b980) [ 805.004354][T28998] The buggy address belongs to the page: [ 805.009985][T28998] page:ffffea00022752c0 count:1 mapcount:0 mapping:ffff88812c3f0940 index:0xffff888089d4b000 [ 805.020138][T28998] flags: 0x1fffc0000000200(slab) [ 805.025060][T28998] raw: 01fffc0000000200 ffffea0002913b88 ffffea00022e3f48 ffff88812c3f0940 [ 805.033622][T28998] raw: ffff888089d4b000 ffff888089d4b000 0000000100000005 0000000000000000 [ 805.042267][T28998] page dumped because: kasan: bad access detected [ 805.048670][T28998] [ 805.050988][T28998] Memory state around the buggy address: [ 805.056612][T28998] ffff888089d4b780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 805.064689][T28998] ffff888089d4b800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 805.072733][T28998] >ffff888089d4b880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 805.080791][T28998] ^ [ 805.085361][T28998] ffff888089d4b900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 805.093417][T28998] ffff888089d4b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 805.101475][T28998] ================================================================== [ 805.109521][T28998] Disabling lock debugging due to kernel taint [ 805.123817][T28998] Kernel panic - not syncing: panic_on_warn set ... [ 805.130455][T28998] CPU: 0 PID: 28998 Comm: syz-executor.0 Tainted: G B 5.1.0-rc1 #28 [ 805.139733][T28998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 805.149782][T28998] Call Trace: [ 805.153081][T28998] dump_stack+0x172/0x1f0 [ 805.157417][T28998] panic+0x2cb/0x65c [ 805.161323][T28998] ? __warn_printk+0xf3/0xf3 [ 805.166015][T28998] ? drm_gem_object_release+0xf1/0x110 [ 805.171481][T28998] ? preempt_schedule+0x4b/0x60 [ 805.176341][T28998] ? ___preempt_schedule+0x16/0x18 [ 805.181461][T28998] ? trace_hardirqs_on+0x5e/0x230 [ 805.186495][T28998] ? drm_gem_object_release+0xf1/0x110 [ 805.191955][T28998] end_report+0x47/0x4f [ 805.196116][T28998] ? drm_gem_object_release+0xf1/0x110 [ 805.201577][T28998] kasan_report.cold+0xe/0x40 [ 805.206258][T28998] ? vkms_gem_create.part.0+0x170/0x170 [ 805.211808][T28998] ? drm_gem_object_release+0xf1/0x110 [ 805.217270][T28998] __asan_report_load8_noabort+0x14/0x20 [ 805.222907][T28998] drm_gem_object_release+0xf1/0x110 [ 805.228240][T28998] vkms_gem_create.part.0+0x147/0x170 [ 805.233619][T28998] vkms_dumb_create+0x11e/0x240 [ 805.238479][T28998] drm_mode_create_dumb+0x288/0x310 [ 805.243685][T28998] drm_mode_create_dumb_ioctl+0x26/0x30 [ 805.249232][T28998] drm_ioctl_kernel+0x23e/0x2e0 [ 805.254088][T28998] ? drm_mode_create_dumb+0x310/0x310 [ 805.259472][T28998] ? drm_setversion+0x8c0/0x8c0 [ 805.264329][T28998] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 805.270574][T28998] ? _copy_from_user+0xdd/0x150 [ 805.275430][T28998] drm_ioctl+0x545/0xa50 [ 805.279682][T28998] ? drm_mode_create_dumb+0x310/0x310 [ 805.285054][T28998] ? drm_version+0x3d0/0x3d0 [ 805.289672][T28998] ? __fget+0x381/0x550 [ 805.293836][T28998] ? ksys_dup3+0x3e0/0x3e0 [ 805.298252][T28998] ? fput_many+0x12c/0x1a0 [ 805.302674][T28998] drm_compat_ioctl+0x241/0x310 [ 805.307532][T28998] ? security_file_ioctl+0x93/0xc0 [ 805.312642][T28998] ? compat_drm_setunique+0x10/0x10 [ 805.317821][T28998] __ia32_compat_sys_ioctl+0x197/0x620 [ 805.323264][T28998] do_fast_syscall_32+0x281/0xc98 [ 805.328270][T28998] entry_SYSENTER_compat+0x70/0x7f [ 805.333361][T28998] RIP: 0023:0xf7f59869 [ 805.337408][T28998] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 805.356995][T28998] RSP: 002b:00000000f5d550cc EFLAGS: 00000296 ORIG_RAX: 0000000000000036 [ 805.365387][T28998] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000ffffffb2 [ 805.373336][T28998] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000000000000 [ 805.381286][T28998] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 805.389241][T28998] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 805.397198][T28998] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 805.405903][T28998] Kernel Offset: disabled [ 805.410222][T28998] Rebooting in 86400 seconds..