t_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b23", 0xe) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, &(0x7f00000000c0)={0x4000000, 0xffffffffffffffff, 0x1800}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:01 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:01 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b23", 0xe) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, &(0x7f00000000c0)={0x4000000, 0xffffffffffffffff, 0x1800}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2468.716906][ T26] audit: type=1800 audit(1572564541.257:365): pid=12844 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="memory.events" dev="sda1" ino=16753 res=0 23:29:01 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440), 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:07 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) socket(0x2, 0x2, 0x0) select(0x40, &(0x7f0000000040), &(0x7f00000000c0)={0xffff}, 0x0, 0x0) 23:29:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r2 = accept(0xffffffffffffffff, &(0x7f0000000180)=@ethernet={0x0, @broadcast}, &(0x7f0000000200)=0x80) sendmsg$nl_route_sched(r2, &(0x7f0000000780)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f0000000280)=@newtclass={0x494, 0x28, 0x200, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0xf, 0x4}, {0xc, 0x10}, {0x1fff4, 0xfff3}}, [@tclass_kind_options=@c_multiq={0xc, 0x1, 'multiq\x00'}, @TCA_RATE={0x8, 0x5, {0x3f, 0x7}}, @TCA_RATE={0x8, 0x5, {0x9}}, @tclass_kind_options=@c_multiq={0xc, 0x1, 'multiq\x00'}, @tclass_kind_options=@c_htb={{0x8, 0x1, 'htb\x00'}, {0x420, 0x2, [@TCA_HTB_CTAB={0x404, 0x3, [0x2, 0x1, 0x5, 0x0, 0x6, 0x200, 0x3ca9, 0x9, 0x3f, 0x20, 0x80000000, 0x81, 0x5, 0x987a, 0x7e, 0x4, 0x80000000, 0x3c4a, 0x2, 0x0, 0x5, 0x8001, 0x4, 0x0, 0x2, 0x1, 0x6, 0x81, 0xfff, 0x1, 0x4, 0x3, 0x3ff, 0x4f, 0x5, 0x500000, 0x100, 0x0, 0x6, 0x7fffffff, 0x1, 0xb1, 0x1, 0x9, 0x5, 0x7, 0x8, 0xffffffff, 0x0, 0x2, 0x7, 0x9, 0x4, 0x1, 0x8001, 0x3e, 0x8, 0x0, 0x10001, 0x1, 0x9, 0x81, 0x20, 0x20, 0x3, 0x6, 0x3a8, 0x1, 0x4, 0x4, 0x7, 0x800, 0x4, 0xe9d5b2df, 0x6, 0x7, 0x8, 0x3f, 0x9, 0x6, 0x6, 0x68, 0x3, 0x4, 0x8, 0x4, 0x67, 0x88, 0x8, 0x3f, 0xffff, 0x3, 0x7f, 0x6, 0x1, 0x5, 0x100, 0x400, 0x2, 0x6da4, 0x2, 0x100, 0x40, 0x3, 0x401, 0x5, 0x1, 0x3, 0x3, 0x6, 0x8ced, 0x3, 0x7ff, 0x0, 0x10001, 0x40, 0x5, 0x8000, 0x80000000, 0xffffffff, 0xfe, 0x100000, 0x7554, 0x80, 0x0, 0x7, 0x0, 0xf0, 0x8000, 0x1, 0x5, 0x80000001, 0xced, 0x4, 0x7f, 0x2, 0xe6, 0x2, 0x20, 0xffffffff, 0x2, 0x400, 0x1000, 0x0, 0x2, 0x81, 0x1000, 0x6, 0xfffe00, 0x81, 0x2, 0x0, 0xc7bf, 0xbe1, 0x5, 0x7, 0xce, 0x8000, 0x4, 0x80000001, 0xcb, 0x40, 0x4, 0x6, 0xcc1, 0x2, 0x7, 0xffff8000, 0x1, 0x3ff, 0x4, 0x683d8f83, 0xffffffff, 0x9, 0x3ff, 0x400, 0x1, 0x5, 0x8, 0x8, 0x2, 0x5, 0x101, 0xffff, 0x0, 0x2, 0x469532a0, 0x8, 0x2, 0x0, 0x7, 0x7, 0x7f, 0x5f2ee708, 0x6, 0x73eea96, 0x0, 0x2, 0x4, 0x20, 0x9, 0x1, 0x101, 0x6, 0xfff, 0x20, 0x8, 0x4, 0x1, 0x6, 0xffffff51, 0x6, 0x0, 0x400, 0x2, 0x40, 0x1, 0x80000001, 0x3, 0x401, 0x6fa, 0x558ea4e1, 0xd3d2, 0xf2, 0x6, 0x5, 0x6, 0xbd76, 0x0, 0xce, 0x7, 0x5, 0x9f, 0x2, 0x8, 0x8, 0x200, 0x1ff, 0x6, 0x2, 0x5, 0x6, 0x8, 0x5, 0x101, 0x1f, 0x7, 0x100, 0x97, 0x0, 0x3ff, 0x2, 0x9, 0x24, 0x1, 0x6]}, @TCA_HTB_CEIL64={0xc, 0x7, 0xff}, @TCA_HTB_CEIL64={0xc, 0x7, 0xfffffffffffffffe}]}}, @TCA_RATE={0x8, 0x5, {0xff, 0x2}}, @tclass_kind_options=@c_cbs={0x8, 0x1, 'cbs\x00'}, @tclass_kind_options=@c_taprio={0xc, 0x1, 'taprio\x00'}]}, 0x494}}, 0x10) r3 = socket$tipc(0x1e, 0x0, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r3, 0x10f, 0x86) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'lo\x00\x00\xe7\xff\x03\x00\x00\x00\x00\x06\x00', 0xfd}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc020662a, &(0x7f00000000c0)={0x4000000, r5, 0x1800}) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000000), &(0x7f00000000c0)=0x4) 23:29:07 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:07 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440), 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:07 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) 23:29:07 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440), 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:07 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r2, &(0x7f0000002780), 0x400004d, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r2, 0xc0046686, &(0x7f0000000180)={0x2, 0x1000, "987dd2b63348d8d2588c6d43d75ad33b3b59d6dabd4a7f24cd6e9f77c9d12a23ae2656c98ca1644bd6a1a4ba57ad1e4225782310a13bb7d58e376b6b3c376b6aa006ef962c58d538b5651092ee9b6df46519d88160b3f39747f663193449ad92f44b69bc8a41f683a0d51f7a6ade90bf60003a741fb9676f14cd6662b1310ff538444e5b672e25d49d9e50adf8496d3458570ea2bf3b2651b4be56f4ea88f928e383990e89e0d85de86e73917e45e92a2ba0d17db16eb3229f0fb3cee3fbbb2b2530b4e23d3d3b6539f8e299b5a1cb07230dd17fcfa6dc8947810d2b562b77a2ebe46145453cd9742cb57ba4ed622bd84e90eaae891e980cd097718a6ae767bcd3819af79347c5fd518840e7a5d41d51485572547e8da8bf3cbee8ca14c86edee7639b57a83d35156cc204b9f6dd55dc98c56592acff6196cca5d909318241bc5a3da1685df9b34355e2b389c54586aca06cf5c344143abcc9b0fb714fac176762bdef402b2f48b0933e679a4a5060102a8d07be6267e32e7e8341d58bc52125fb03d4bbbb2eb899765515dde3b78947bb4f4419c8c5134f5d0478cee7d9e9e96af18e9d5d9f0c605a85ec93c030c838d92d485a5ead0dfb1ba3de94bfb3f16697a299d28c04f396edeb00e2089cc697ca5c846b88869be03bf28dbf132b553cf87966f58e62e587278b595c88b066bc17837548e8c1ca8226d8729b246dcc9cee264df9a0161b43d7ef4cd460180be5895d06627985398070c636c173deefc555ca8063f53c4f9ae2fbfcea915680fd9ca1f8895e188e551ac4dc187d92d3abbbf913da6efd56bf018e4aca5b3c372179d5e6b52c7073b7fc96175098a7691f2a7323290c1de6924836f3d2cc22e753c13998ac8aab54151f33b5316b75740f3680569360c7b2bad0223e9983a907479e1f1475f7720347d0e2c052154f222a4daae671729efec9b56e96666955cd4f034372ef5151375356be9f21dd6dc3bd8342e9d39b5531add13a1d487350735266d116b88bf3740763534eb1131791ffdb18b8ec9aae5b387f8ba085088160ae93061b2531b5b39a457e7f43e482d94a3fb191ff29c11fb2f09a6af0e10d97f83cc0a3ff685339bb528bbd2fd01c4430163d4043a0b4eb73785260eb633fe513d32749500ad2c6971cef27531509f96ce2fde63ec6388dbb0b9669c97ba96b213ca6a79df9070a26577219b5b1c3f80ba314cd79fdf26ec43f3d7dbd24b6f9b2749dc7a1b6b4dd23503001089a3b00ceb65c9040e9c0c0c0d724ecab0fc1520cd59c120293c15d7f5fa92c701bc56662843f88716eaab55929846b85979cfbc397436e2b85ac5ac779b0e0e61381bc300cf2839d1f9a01ca91be58e9713e7ded4a8a014c3a7f84af311310a80d94766f553b8cd1e7438dea5c793132699d5f4d4e203281b2adfdb93df859875ff26acb9f22a479c53d150e2032114074acbab277870befad36bc3b55cf2e29a4d2742e9ad5922f045bea26a6536dc6cb96b30f8d9aa9c9ca3b95266506127316b97bdd8c391dd8b2f059ed22754baf047cc511ef5745cfff90bab3937d318d36474559478aa048b3154be215a34679cebca88169a97646ff3672de8a75fff09b147b4f7cf401bdde054fbf1f4d1a925f1b389d70afe6ef587815db85b33c693ee26d0d06e8768100e9815e0daa7487ac52e7df386bf5b5e2e161b2ef40d5042d01bb2636ba6c7b486c3fa3fe6c82ac09fad57d69a59e0d4973b021fd46f0c35ee54db36da01e6113ed3954d16fac945215db148e69b08444eb8a5dcc1dcb47818bc8adf83592a41fb077b227d45fc3dc2d426d0e1112f5cafd916cccbf53efae376a3ef4615ba645dee48e767217a17a1724db00b18e1d2378634d7af40481de5d958f2846874377257414b2058c1bf476670fe4a75e4e8d668a9f6ba2b93031ddc605c280576f901e42aa4efd6d129bce40821aeb8a089cedd09e6ed3d2169612edbebfa9ed16fbebaaeb31eb61623080274e76c5440b8fa49c6bae46a1309c58871a9a57edac27e5332072ee7db813a904a9b3ad8570880b10d8d1275f254aa55d8af305e5f2a850a6a1f06cfef9ba27b32fc3fe5c2330259090d3ff751de70ac98bdafae587cd0a348746eaf2ff85b0f2225080a3b222706c99fefde0c859b878605417da1f2ff945b4e238a263e37d4e5ff0666017517a78f06207ba7245995d4f6091af3190ccc7232b24a9c42d2b25b5c9f6ae9526c98e15a1861a2536f0867a168d827661b062c0c7ac266d1f3eabe4b05ac739f174deb10c0b8deb0d5f4106328820248ca374abd17de22eddec8f3e8dcd7004a54d5998797c2712e50ffcda58ac1b8e63861376f1dc999ead49227a596872b851901110f1435e771bab5db487939df7fce992bfe0faf6a5ac61697672e026ed3de199c69ea37cb4ff58034c3453f63985d3ee257b18a02ee2f226c634694be5291a2f3117ef5d990e35763024c4bb3a287fe4afddee92d43820a7393bc0e93d00e3e5ba3b825430e2f2bef80bc701a49ba4cf7a4372848c1a4097b0cb49ccbc0190ac34f5b73cd0659ea3851a5de2a884901d765ce5b3c36d1a16c7f4fe9ff9a540eec5691be808aa7bdf9256e757c1825f1d5f854d1a6d3a120515e3c711c662eb0e2fdd92f3a8f9e7eba31942ffe7ea682706856bcf6a1850cd5018447eeb211d0f406b256c9066472a84a0e874b5e38adbcf0a911ea1290aeafc8be6c93e06c7d48d6bf55d78fc43d94ac0e0abeaddc6a4c3167d5e53ee83bb425be6e22b5d8789fd619a2b288373672cf7ca4fb60b808ce7c30bb617833fda1d37be5b932655715cf84e2f3640cfb1e670218047d0d406601c78528d193683ecf569cf4bdfc5ea93f67f1f2e2dc03a4291286d1023330457a8b93a67dae79c71a690378aafab7ca0a1a398cf3278cb8ab6b03c740da7329ca1f3b1f6f719ce6683778012cd1420f175d1039bcd36a6f1c1d9866d03d9c834af5c1b6db99c9e2f13f99a7a32eff81b5c65157425b272592cbee640c0a7a0f06780f6d6254747dc0a795a506162588a0d3fdd150375a02de2c8760eb7e9413a6414e99abc8bfcf47b4e7d9a7e719f7c5625b65592af8401890e5d2aee69879b3992637cb6a72889a5871a9c5fbc77b1cfa3696cb33089edca7c0a6eced1325b7b44c8081513b2f4f968cff50365180664eb1e9c267f1a32ca524dbf1a3acc623892eddd80624a0a4ee3dad2d7e1e4f8a37bf06e3977ea0a809360cc357184cb8eec24cc909737ad22b716aaf2bcf9a2fb246e3abfdd33d0c59ccabd5d9dd1f8b942d17bc1583ffff40295668f3cd9498cff8cbf2b6d49f32a3fb1a891b1c4fee008a63cbb7470e1b1aa178650e99303b7038dfd5f7794a9f6149d361e02693c8ee1f230b5bd633ea3f97be8d16ddc95a7a4505b75c8cd6139ec22dee17fd9b570c1034b2f1a3d942b81c21b4ea5aeaa564d1c94169c1d52dcd21000f99cd125ca7192f16798c468c89bd5bf16fc98652e2c3a5c64a14a42cba46f040486c3fd1c9f0d81bc8080a23249672c8cde129d80e8d52e50409752dc6d1db27fdf352397838d47a6117ca61994915387eec73758950be9205aad0bebfacdb8987ba5fa7501cfdff1f4b946f062bebe53bf6fe665b915a73ff7c32e77726d212a7ea4bdaeb23cf17a9afb6b8f212ff013cff9ca46e879124b733fb0217449663a959cf5c2df8ca6f6ae5a3f5cfa8b916e7c44ba7dff36d3fcf6b6010a1ebb3bb955413cbdf26a67e4fbe93a3a2e9e4de29ba30be026b024a980481aefe06e8890030a7d88589a4774442f51d8b9feeff301704f86735dd082d60bfe6eb2eec5f416da5e0771bad630b4cc314c764d43eff2b82e8be0e6b8a4daf1f127afdb9667b6ed00e524035fa4ab7e55bc25f4d0675c10d03cfab411f75dae626ba8581f15cd1976b26a8392b94d3413a15a079c241f5b8c484ed820f72b1206b576bf7fbd0f8a01c9bc12c19049e3529205962c740f2d759edf6e820f7be184c2fbd18d8f861aea2b2dc12abbf2ecbc9646687187438408a9cc4e627195ccc5bedce0492adf32315d34c5fa75957d8d93fb4620481f8d3f71b24ec51ee0b9dbd2bdc6c002f347d2a7a2cbc76a33a3d9b920c9adf8b3f73c612c2d2a4518ccaed704ebfceab3935c4eb1a1727de97f3c1c8547fdc5694d977c1518c6b5be3759908a6290a0b80051572daf1845f3b7bda886383fae881a9162946f194dc55ec246eaac6c45592f460f7e109b75081995eaa297ad04434c94a436807828710cb741de04d54f411181924045e42b34f1dae42dc3a6c5c4786fc3cefe992ed79f10e5b25b0139f54426fedb3f40b8bb93dba28a36d57c5674b82e03187663da8baef6020a9bb3370d4914ac602b03901e13cd2a275e6ba1239bd3005b116a5245c92ab4f9e750bd661b8b3613f474ee3be5594f306838f2178bc7681de65422a0688861b3de9ced1a0341409140bad727a93d917b1a7f71d9ac8cbc4a0bbf2d621b4b2742f42b9c71a6ef9d1da7c440835bcf07f5fecbe47eda45c7c4ece6bd99a1b065eb8193615f107709bb0e7410fd94541c1bd00ce5727d508e00ac0ffcf5c2dc64c1f295efc4d883cdfc541536ff98f1e5378e07e8650f6cc0a3ba1bbd220876582b27b10ec1d4ed3e7ef4bd57c3e57140cdf8d7c09098f4ef10c7ba3733608cd3f2b8bd9f2280e07ea52f4efa08ec8733f54af4f123d006e494e41baaadbb8a7e219e8c69565add3163bd21e12f47d4ead272f8c4084a44c9bd5888b1f38abc254a3c2c8518d5055693145e9e65e62332511d07ac49ae6964560a2086f5f05c18cfed77c3f3e147da2aae2f3774336e1e8d28eec962b8e3b0c3a1bc9b5ceaa50f1f0ba09a5c04d94ee605feabeaf962b399ca37b0a51a723dff8f3d91064137b05120defe16db0e0bc13981634a2d9cf78633a121a1d0c2c5cfd9ef2eebd0511bdd1ec453b81a201c556be0b3d5aee3a511b9a58c2c2504b0f7416ce1e5d79ddce121429a45b3c10e3321a39bfa3e8dbd56f091fea53ee9050533b2f4b15470d3d16eb0d711e7c6a40855ba72f4dce6c512a140d83185145098f2f4acbd4ed6339f3ba42337334e177f09ec3440975e212b25e2d9fefb905daa8b2f2e997125d9c022b30a459a8a89ade98d7a8bd7b77fcc1000a5f4dca404efc1ecfeaf4b997e338a134cd3478aa9a40fc6b461977b93ee4b43ec7b22e560508d89bbe66a3578ba4060fc13776444dbc631dbaf2a15cc6e8badc4352f0535605058437415ad5b9bea879dcc31508632747d7877609167188913f589dd442cf1155b22ccd38e50d62321bb25e211540689b117d72961cd355d909d0044d66a28149942ce21d5269a3d5616321bc22258bc82f03db4de93dbad06c0758a7a85fa19de3d3daba4793eea52f00f1d48a5147943b08805708ca4dd5323556276c7501751af34d040a8b7a89104b1b55310a4ad29f345ae330dc2a6230a33a4f4f1d19bc70e3db6f08949dc33a4adeb3a0f5267e3f2140ab2f2d198e243a3398a9a516720c0da17aaaa378ab02325d55b49333dbcf4eb367e8ec9287b361cd92c1e8dbfb9736fec159c327bb59a465953481d726fb902bb5508eab30568465740229c637724656b505f099a10c69a3b85994abeefbe2a9747ff79a296d14c3695a69052fb7369d37960558f4c06d6d0b86eda214dcf553af11c78c5ed84730892d4f6c2250e017d3880d9d6f7eda2d993bd6f27bf843c30d56ef0d1edfc30a559c2b1954d883275"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'lo\x00\x00\xe7\xff\x03\x00\x00\x00\x00\x06\x00', 0xfd}) 23:29:07 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4", 0x8) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:07 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:13 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:13 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4", 0x8) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind(0xffffffffffffffff, &(0x7f00000000c0)=@caif=@dbg={0x25, 0x9, 0x2}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc020662a, &(0x7f00000000c0)={0x4000000, r3, 0x1800}) connect$pptp(r2, &(0x7f0000000000)={0x18, 0x2, {0x2, @multicast1}}, 0x1e) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'lo\x00\x00\xe7\xff\x03\x00\x00\x00\x00\x06\x00', 0xfd}) 23:29:13 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:13 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:13 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:13 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4", 0x8) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:13 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e", 0xc) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x80, 0x1}, @mss={0x2, 0x2}, @mss={0x2, 0xfffffff8}, @sack_perm, @mss={0x2, 0x1ff}, @window={0x3, 0x9, 0x693d}, @sack_perm], 0x7) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'lo\x00\x00\xe7\xff\x03\x00\x00\x00\x00\x06\x00', 0xfd}) 23:29:14 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e", 0xc) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:14 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e", 0xc) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:14 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00'}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'lo\x00\x00\xe7\xff\x03\x00\x00\x00\x00\x06\x00', 0xfd}) 23:29:22 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:22 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b23", 0xe) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:22 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:22 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:22 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:22 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, &(0x7f00000000c0)={0x4000000, 0xffffffffffffffff, 0x1800}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:22 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b23", 0xe) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:22 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b23", 0xe) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:22 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r0, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 23:29:22 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0b") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:23 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(0xffffffffffffffff, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:23 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r0, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 23:29:30 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:30 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, &(0x7f00000000c0)={0x4000000, 0xffffffffffffffff, 0x1800}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:30 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(0xffffffffffffffff, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:30 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:30 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r0, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 23:29:30 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r0, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 23:29:30 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(0xffffffffffffffff, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:30 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:30 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:31 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, 0x0, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:31 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440), 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:31 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:39 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:39 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440), 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:39 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:39 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r0, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 23:29:39 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r0, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 23:29:39 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4", 0x8) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:39 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:39 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440), 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:39 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4", 0x8) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:39 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4", 0x8) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:39 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4", 0x8) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:39 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e", 0xc) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:45 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:45 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e", 0xc) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:45 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:45 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 23:29:45 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 23:29:45 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, &(0x7f00000000c0)={0x4000000, 0xffffffffffffffff, 0x1800}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:45 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e", 0xc) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:45 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b23", 0xe) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:45 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b23", 0xe) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:45 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b23", 0xe) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:46 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r0, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 23:29:46 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, &(0x7f00000000c0)={0x4000000, 0xffffffffffffffff, 0x1800}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:54 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:54 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:54 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 23:29:54 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 23:29:54 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x0, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, &(0x7f00000000c0)={0x4000000, 0xffffffffffffffff, 0x1800}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:54 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r0, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 23:29:54 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:54 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:54 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:29:54 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 23:29:54 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r0, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000001, 0x0) 23:29:54 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 23:30:00 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080), 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'syz_tun\x00', 0xfd}) 23:30:00 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 23:30:00 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 23:30:00 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:00 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 23:30:00 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:00 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:01 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, &(0x7f00000000c0)={0x4000000, 0xffffffffffffffff, 0x1800}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:01 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 23:30:01 executing program 5: 23:30:01 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 23:30:01 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 23:30:01 executing program 5: 23:30:01 executing program 5: 23:30:01 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) 23:30:06 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:06 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x32, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r0, 0x65, 0x3, 0x0, &(0x7f0000000080)=0xd06bbe8e) 23:30:06 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0x2c) r1 = socket(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x15000000000000, 0x485, 0x6, 0x0) 23:30:06 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 23:30:06 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 23:30:06 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 23:30:06 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket(0x0, 0x5, 0x0) bind$inet6(r4, 0x0, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540), 0x1, 0x41, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:06 executing program 2: vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(0xffffffffffffffff, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) 23:30:07 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket(0x0, 0x5, 0x0) bind$inet6(r4, 0x0, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540), 0x1, 0x41, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r7 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r7, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000000300)={0x0, 0xff}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r8, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:07 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 23:30:07 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket(0x0, 0x5, 0x0) bind$inet6(r4, 0x0, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540), 0x1, 0x41, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:07 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 23:30:16 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r4 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:16 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket(0x0, 0x5, 0x0) bind$inet6(r4, 0x0, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540), 0x1, 0x41, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:16 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket(0x0, 0x5, 0x0) bind$inet6(r4, 0x0, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540), 0x1, 0x41, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:16 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket(0x0, 0x5, 0x0) bind$inet6(r4, 0x0, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540), 0x1, 0x41, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:16 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket(0x0, 0x5, 0x0) bind$inet6(r4, 0x0, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540), 0x1, 0x41, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:16 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 23:30:16 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket(0x0, 0x5, 0x0) bind$inet6(r4, 0x0, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540), 0x1, 0x41, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r7 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r8, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, &(0x7f00000000c0)={0x4000000, 0xffffffffffffffff, 0x1800}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:16 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket(0x0, 0x5, 0x0) bind$inet6(r4, 0x0, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540), 0x1, 0x41, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r7 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r7, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000000300)={0x0, 0xff}, &(0x7f0000000340)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r8, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:16 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket(0x0, 0x5, 0x0) bind$inet6(r4, 0x0, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540), 0x1, 0x41, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r7 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r7, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000000300)={0x0, 0xff}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r6, 0x84, 0x1b, &(0x7f0000000240)={r8, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:16 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket(0x0, 0x5, 0x0) bind$inet6(r4, 0x0, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540), 0x1, 0x41, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r7 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r7, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000000300)={0x0, 0xff}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r6, 0x84, 0x1b, &(0x7f0000000240)={r8, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:16 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) 23:30:17 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket(0x0, 0x5, 0x0) bind$inet6(r4, 0x0, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540), 0x1, 0x41, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r7 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r7, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000000300)={0x0, 0xff}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r6, 0x84, 0x1b, &(0x7f0000000240)={r8, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:24 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r4 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:24 executing program 1 (fault-call:11 fault-nth:0): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:24 executing program 5 (fault-call:10 fault-nth:0): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:24 executing program 0 (fault-call:10 fault-nth:0): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:24 executing program 2 (fault-call:10 fault-nth:0): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:24 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket(0x0, 0x5, 0x0) bind$inet6(r4, 0x0, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540), 0x1, 0x41, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r7 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r7, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000000300)={0x0, 0xff}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r6, 0x84, 0x1b, &(0x7f0000000240)={r8, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2552.133958][T13436] FAULT_INJECTION: forcing a failure. [ 2552.133958][T13436] name failslab, interval 1, probability 0, space 0, times 0 [ 2552.148886][T13437] FAULT_INJECTION: forcing a failure. [ 2552.148886][T13437] name failslab, interval 1, probability 0, space 0, times 0 [ 2552.149619][T13438] FAULT_INJECTION: forcing a failure. [ 2552.149619][T13438] name failslab, interval 1, probability 0, space 0, times 0 [ 2552.163567][T13439] FAULT_INJECTION: forcing a failure. [ 2552.163567][T13439] name failslab, interval 1, probability 0, space 0, times 0 [ 2552.183601][T13438] CPU: 1 PID: 13438 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2552.194930][T13438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2552.204986][T13438] Call Trace: [ 2552.208295][T13438] dump_stack+0x172/0x1f0 [ 2552.212642][T13438] should_fail.cold+0xa/0x15 [ 2552.217243][T13438] ? fault_create_debugfs_attr+0x180/0x180 [ 2552.223064][T13438] ? ___might_sleep+0x163/0x2c0 [ 2552.227918][T13438] __should_failslab+0x121/0x190 [ 2552.232852][T13438] should_failslab+0x9/0x14 [ 2552.237353][T13438] __kmalloc+0x2e0/0x770 [ 2552.241595][T13438] ? __local_bh_enable_ip+0x15a/0x270 [ 2552.246983][T13438] ? lock_sock_nested+0xe2/0x120 [ 2552.251917][T13438] ? __local_bh_enable_ip+0x15a/0x270 [ 2552.257293][T13438] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2552.262573][T13438] ? lock_sock_nested+0x9a/0x120 [ 2552.267503][T13438] ? sock_kmalloc+0xc6/0x120 [ 2552.272087][T13438] sock_kmalloc+0xc6/0x120 [ 2552.276503][T13438] hash_alloc_result.part.0+0x95/0x110 [ 2552.281959][T13438] hash_sendpage+0x7a7/0x9d0 [ 2552.286560][T13438] hash_sendpage_nokey+0x94/0xa0 [ 2552.291505][T13438] kernel_sendpage+0x92/0xf0 [ 2552.296091][T13438] ? hash_check_key.isra.0+0x230/0x230 [ 2552.301554][T13438] sock_sendpage+0x8b/0xc0 [ 2552.305973][T13438] pipe_to_sendpage+0x296/0x360 [ 2552.310831][T13438] ? kernel_sendpage+0xf0/0xf0 [ 2552.315592][T13438] ? direct_splice_actor+0x190/0x190 [ 2552.320873][T13438] ? __put_page+0xa7/0xe0 [ 2552.325198][T13438] ? anon_pipe_buf_release+0x1c6/0x270 [ 2552.330660][T13438] __splice_from_pipe+0x397/0x7d0 [ 2552.335687][T13438] ? direct_splice_actor+0x190/0x190 [ 2552.340978][T13438] ? direct_splice_actor+0x190/0x190 [ 2552.346268][T13438] splice_from_pipe+0x108/0x170 [ 2552.351117][T13438] ? splice_shrink_spd+0xd0/0xd0 [ 2552.357096][T13438] ? apparmor_file_permission+0x25/0x30 [ 2552.362637][T13438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2552.368876][T13438] ? security_file_permission+0x8f/0x380 [ 2552.374508][T13438] generic_splice_sendpage+0x3c/0x50 [ 2552.379788][T13438] ? splice_from_pipe+0x170/0x170 [ 2552.384811][T13438] do_splice+0x708/0x1410 [ 2552.389154][T13438] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2552.394268][T13438] ? __fget_light+0x1a9/0x230 [ 2552.398946][T13438] __x64_sys_splice+0x2c6/0x330 [ 2552.403796][T13438] do_syscall_64+0xfa/0x760 [ 2552.408306][T13438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2552.414189][T13438] RIP: 0033:0x459f49 [ 2552.418081][T13438] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2552.437680][T13438] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2552.446090][T13438] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2552.454145][T13438] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2552.462111][T13438] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2552.470076][T13438] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2552.478042][T13438] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2552.486227][T13439] CPU: 0 PID: 13439 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2552.494124][T13439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2552.504182][T13439] Call Trace: [ 2552.507469][T13439] dump_stack+0x172/0x1f0 [ 2552.511786][T13439] should_fail.cold+0xa/0x15 [ 2552.516369][T13439] ? fault_create_debugfs_attr+0x180/0x180 [ 2552.522168][T13439] ? ___might_sleep+0x163/0x2c0 [ 2552.527081][T13439] __should_failslab+0x121/0x190 [ 2552.532010][T13439] should_failslab+0x9/0x14 [ 2552.536491][T13439] __kmalloc+0x2e0/0x770 [ 2552.540713][T13439] ? __local_bh_enable_ip+0x15a/0x270 [ 2552.546115][T13439] ? lock_sock_nested+0xe2/0x120 [ 2552.551040][T13439] ? __local_bh_enable_ip+0x15a/0x270 [ 2552.556414][T13439] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2552.561703][T13439] ? lock_sock_nested+0x9a/0x120 [ 2552.566626][T13439] ? sock_kmalloc+0xc6/0x120 [ 2552.571323][T13439] sock_kmalloc+0xc6/0x120 [ 2552.575753][T13439] hash_alloc_result.part.0+0x95/0x110 [ 2552.581208][T13439] hash_sendpage+0x7a7/0x9d0 [ 2552.585802][T13439] hash_sendpage_nokey+0x94/0xa0 [ 2552.590734][T13439] kernel_sendpage+0x92/0xf0 [ 2552.595410][T13439] ? hash_check_key.isra.0+0x230/0x230 [ 2552.600868][T13439] sock_sendpage+0x8b/0xc0 [ 2552.606235][T13439] pipe_to_sendpage+0x296/0x360 [ 2552.611072][T13439] ? kernel_sendpage+0xf0/0xf0 [ 2552.615822][T13439] ? direct_splice_actor+0x190/0x190 [ 2552.621094][T13439] ? __put_page+0xa7/0xe0 [ 2552.625405][T13439] ? anon_pipe_buf_release+0x1c6/0x270 [ 2552.630868][T13439] __splice_from_pipe+0x397/0x7d0 [ 2552.635934][T13439] ? direct_splice_actor+0x190/0x190 [ 2552.641249][T13439] ? direct_splice_actor+0x190/0x190 [ 2552.646527][T13439] splice_from_pipe+0x108/0x170 [ 2552.651378][T13439] ? splice_shrink_spd+0xd0/0xd0 [ 2552.656321][T13439] ? apparmor_file_permission+0x25/0x30 [ 2552.661868][T13439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2552.668109][T13439] ? security_file_permission+0x8f/0x380 [ 2552.673743][T13439] generic_splice_sendpage+0x3c/0x50 [ 2552.679122][T13439] ? splice_from_pipe+0x170/0x170 [ 2552.684141][T13439] do_splice+0x708/0x1410 [ 2552.688475][T13439] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2552.693582][T13439] ? __fget_light+0x1a9/0x230 [ 2552.698258][T13439] __x64_sys_splice+0x2c6/0x330 [ 2552.703112][T13439] do_syscall_64+0xfa/0x760 [ 2552.707620][T13439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2552.713512][T13439] RIP: 0033:0x459f49 [ 2552.717401][T13439] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2552.736997][T13439] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2552.745413][T13439] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2552.753385][T13439] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2552.761355][T13439] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2552.769326][T13439] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2552.777293][T13439] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2552.785281][T13436] CPU: 1 PID: 13436 Comm: syz-executor.5 Not tainted 5.4.0-rc3+ #0 [ 2552.793172][T13436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2552.803227][T13436] Call Trace: [ 2552.806524][T13436] dump_stack+0x172/0x1f0 [ 2552.810859][T13436] should_fail.cold+0xa/0x15 [ 2552.815450][T13436] ? fault_create_debugfs_attr+0x180/0x180 [ 2552.821268][T13436] ? ___might_sleep+0x163/0x2c0 [ 2552.826126][T13436] __should_failslab+0x121/0x190 [ 2552.831062][T13436] should_failslab+0x9/0x14 [ 2552.835557][T13436] __kmalloc+0x2e0/0x770 [ 2552.839801][T13436] ? __local_bh_enable_ip+0x15a/0x270 [ 2552.845170][T13436] ? lock_sock_nested+0xe2/0x120 [ 2552.850103][T13436] ? __local_bh_enable_ip+0x15a/0x270 [ 2552.855472][T13436] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2552.860756][T13436] ? lock_sock_nested+0x9a/0x120 [ 2552.865697][T13436] ? sock_kmalloc+0xc6/0x120 [ 2552.870286][T13436] sock_kmalloc+0xc6/0x120 [ 2552.874701][T13436] hash_alloc_result.part.0+0x95/0x110 [ 2552.880167][T13436] hash_sendpage+0x7a7/0x9d0 [ 2552.884763][T13436] hash_sendpage_nokey+0x94/0xa0 [ 2552.889704][T13436] kernel_sendpage+0x92/0xf0 [ 2552.894290][T13436] ? hash_check_key.isra.0+0x230/0x230 [ 2552.899751][T13436] sock_sendpage+0x8b/0xc0 [ 2552.904172][T13436] pipe_to_sendpage+0x296/0x360 [ 2552.909019][T13436] ? kernel_sendpage+0xf0/0xf0 [ 2552.913779][T13436] ? direct_splice_actor+0x190/0x190 [ 2552.919063][T13436] ? __put_page+0xa7/0xe0 [ 2552.923395][T13436] ? anon_pipe_buf_release+0x1c6/0x270 [ 2552.928861][T13436] __splice_from_pipe+0x397/0x7d0 [ 2552.933885][T13436] ? direct_splice_actor+0x190/0x190 [ 2552.939184][T13436] ? direct_splice_actor+0x190/0x190 [ 2552.944471][T13436] splice_from_pipe+0x108/0x170 [ 2552.949327][T13436] ? splice_shrink_spd+0xd0/0xd0 [ 2552.954270][T13436] ? apparmor_file_permission+0x25/0x30 [ 2552.959815][T13436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2552.966051][T13436] ? security_file_permission+0x8f/0x380 [ 2552.971683][T13436] generic_splice_sendpage+0x3c/0x50 [ 2552.976960][T13436] ? splice_from_pipe+0x170/0x170 [ 2552.981976][T13436] do_splice+0x708/0x1410 [ 2552.986314][T13436] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2552.991419][T13436] ? __fget_light+0x1a9/0x230 [ 2552.996090][T13436] __x64_sys_splice+0x2c6/0x330 [ 2553.000942][T13436] do_syscall_64+0xfa/0x760 [ 2553.005446][T13436] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2553.011344][T13436] RIP: 0033:0x459f49 [ 2553.015240][T13436] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2553.034838][T13436] RSP: 002b:00007f1f0c609c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2553.043248][T13436] RAX: ffffffffffffffda RBX: 00007f1f0c609c90 RCX: 0000000000459f49 [ 2553.051214][T13436] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2553.059179][T13436] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2553.067142][T13436] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1f0c60a6d4 [ 2553.075111][T13436] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2553.083101][T13437] CPU: 0 PID: 13437 Comm: syz-executor.0 Not tainted 5.4.0-rc3+ #0 [ 2553.091004][T13437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2553.101058][T13437] Call Trace: [ 2553.104340][T13437] dump_stack+0x172/0x1f0 [ 2553.108703][T13437] should_fail.cold+0xa/0x15 [ 2553.113309][T13437] ? fault_create_debugfs_attr+0x180/0x180 [ 2553.119133][T13437] ? ___might_sleep+0x163/0x2c0 [ 2553.124100][T13437] __should_failslab+0x121/0x190 [ 2553.129044][T13437] should_failslab+0x9/0x14 [ 2553.133550][T13437] __kmalloc+0x2e0/0x770 [ 2553.137801][T13437] ? __local_bh_enable_ip+0x15a/0x270 [ 2553.143187][T13437] ? lock_sock_nested+0xe2/0x120 [ 2553.148125][T13437] ? __local_bh_enable_ip+0x15a/0x270 [ 2553.153493][T13437] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2553.158780][T13437] ? lock_sock_nested+0x9a/0x120 [ 2553.163729][T13437] ? sock_kmalloc+0xc6/0x120 [ 2553.168330][T13437] sock_kmalloc+0xc6/0x120 [ 2553.172760][T13437] hash_alloc_result.part.0+0x95/0x110 [ 2553.178227][T13437] hash_sendpage+0x7a7/0x9d0 [ 2553.182829][T13437] hash_sendpage_nokey+0x94/0xa0 [ 2553.187777][T13437] kernel_sendpage+0x92/0xf0 [ 2553.192370][T13437] ? hash_check_key.isra.0+0x230/0x230 [ 2553.197844][T13437] sock_sendpage+0x8b/0xc0 [ 2553.202262][T13437] pipe_to_sendpage+0x296/0x360 [ 2553.207103][T13437] ? kernel_sendpage+0xf0/0xf0 [ 2553.207121][T13437] ? direct_splice_actor+0x190/0x190 [ 2553.207137][T13437] ? __put_page+0xa7/0xe0 [ 2553.207151][T13437] ? anon_pipe_buf_release+0x1c6/0x270 [ 2553.207172][T13437] __splice_from_pipe+0x397/0x7d0 [ 2553.231973][T13437] ? direct_splice_actor+0x190/0x190 [ 2553.237273][T13437] ? direct_splice_actor+0x190/0x190 [ 2553.242588][T13437] splice_from_pipe+0x108/0x170 [ 2553.247450][T13437] ? splice_shrink_spd+0xd0/0xd0 [ 2553.252397][T13437] ? apparmor_file_permission+0x25/0x30 [ 2553.257953][T13437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2553.264213][T13437] ? security_file_permission+0x8f/0x380 [ 2553.269862][T13437] generic_splice_sendpage+0x3c/0x50 [ 2553.275143][T13437] ? splice_from_pipe+0x170/0x170 [ 2553.275159][T13437] do_splice+0x708/0x1410 [ 2553.275186][T13437] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2553.289611][T13437] ? __fget_light+0x1a9/0x230 [ 2553.289632][T13437] __x64_sys_splice+0x2c6/0x330 [ 2553.289661][T13437] do_syscall_64+0xfa/0x760 [ 2553.289683][T13437] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2553.309552][T13437] RIP: 0033:0x459f49 [ 2553.313455][T13437] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2553.315345][T13448] FAULT_INJECTION: forcing a failure. [ 2553.315345][T13448] name failslab, interval 1, probability 0, space 0, times 0 [ 2553.333055][T13437] RSP: 002b:00007f8f1d6b2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2553.333070][T13437] RAX: ffffffffffffffda RBX: 00007f8f1d6b2c90 RCX: 0000000000459f49 [ 2553.333077][T13437] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2553.333085][T13437] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2553.333094][T13437] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8f1d6b36d4 23:30:25 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:25 executing program 1 (fault-call:11 fault-nth:1): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:25 executing program 2 (fault-call:10 fault-nth:1): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:25 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2553.333102][T13437] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2553.395110][T13448] CPU: 0 PID: 13448 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2553.403014][T13448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2553.413069][T13448] Call Trace: [ 2553.416367][T13448] dump_stack+0x172/0x1f0 [ 2553.420707][T13448] should_fail.cold+0xa/0x15 [ 2553.425306][T13448] ? fault_create_debugfs_attr+0x180/0x180 [ 2553.426799][T13452] FAULT_INJECTION: forcing a failure. [ 2553.426799][T13452] name failslab, interval 1, probability 0, space 0, times 0 [ 2553.431113][T13448] ? ___might_sleep+0x163/0x2c0 [ 2553.448517][T13448] __should_failslab+0x121/0x190 [ 2553.453453][T13448] should_failslab+0x9/0x14 [ 2553.457954][T13448] __kmalloc+0x2e0/0x770 [ 2553.462198][T13448] ? __local_bh_enable_ip+0x15a/0x270 [ 2553.467567][T13448] ? lock_sock_nested+0xe2/0x120 [ 2553.472505][T13448] ? __local_bh_enable_ip+0x15a/0x270 [ 2553.477876][T13448] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2553.483161][T13448] ? lock_sock_nested+0x9a/0x120 [ 2553.488096][T13448] ? sock_kmalloc+0xc6/0x120 [ 2553.492701][T13448] sock_kmalloc+0xc6/0x120 [ 2553.497118][T13448] hash_alloc_result.part.0+0x95/0x110 [ 2553.502577][T13448] hash_sendpage+0x7a7/0x9d0 [ 2553.507177][T13448] hash_sendpage_nokey+0x94/0xa0 [ 2553.512122][T13448] kernel_sendpage+0x92/0xf0 [ 2553.516706][T13448] ? hash_check_key.isra.0+0x230/0x230 [ 2553.522162][T13448] sock_sendpage+0x8b/0xc0 [ 2553.526579][T13448] pipe_to_sendpage+0x296/0x360 [ 2553.531431][T13448] ? kernel_sendpage+0xf0/0xf0 [ 2553.536195][T13448] ? direct_splice_actor+0x190/0x190 [ 2553.541476][T13448] ? __put_page+0xa7/0xe0 [ 2553.545803][T13448] ? anon_pipe_buf_release+0x1c6/0x270 [ 2553.551257][T13448] __splice_from_pipe+0x397/0x7d0 [ 2553.556280][T13448] ? direct_splice_actor+0x190/0x190 [ 2553.561573][T13448] ? direct_splice_actor+0x190/0x190 [ 2553.566866][T13448] splice_from_pipe+0x108/0x170 [ 2553.571720][T13448] ? splice_shrink_spd+0xd0/0xd0 [ 2553.576667][T13448] ? apparmor_file_permission+0x25/0x30 [ 2553.582213][T13448] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2553.588458][T13448] ? security_file_permission+0x8f/0x380 [ 2553.594094][T13448] generic_splice_sendpage+0x3c/0x50 [ 2553.599380][T13448] ? splice_from_pipe+0x170/0x170 [ 2553.604409][T13448] do_splice+0x708/0x1410 [ 2553.608752][T13448] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2553.613864][T13448] ? __fget_light+0x1a9/0x230 [ 2553.618550][T13448] __x64_sys_splice+0x2c6/0x330 [ 2553.623409][T13448] do_syscall_64+0xfa/0x760 [ 2553.627926][T13448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2553.633811][T13448] RIP: 0033:0x459f49 [ 2553.637710][T13448] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2553.657401][T13448] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2553.665809][T13448] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2553.673780][T13448] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2553.681752][T13448] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2553.689723][T13448] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2553.697819][T13448] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2553.706788][T13452] CPU: 1 PID: 13452 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2553.714693][T13452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2553.724746][T13452] Call Trace: [ 2553.728048][T13452] dump_stack+0x172/0x1f0 [ 2553.732394][T13452] should_fail.cold+0xa/0x15 [ 2553.736997][T13452] ? fault_create_debugfs_attr+0x180/0x180 [ 2553.742810][T13452] ? ___might_sleep+0x163/0x2c0 [ 2553.747677][T13452] __should_failslab+0x121/0x190 [ 2553.752635][T13452] should_failslab+0x9/0x14 [ 2553.757169][T13452] __kmalloc+0x2e0/0x770 [ 2553.761415][T13452] ? __local_bh_enable_ip+0x15a/0x270 [ 2553.766799][T13452] ? lock_sock_nested+0xe2/0x120 [ 2553.771739][T13452] ? __local_bh_enable_ip+0x15a/0x270 [ 2553.777120][T13452] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2553.782411][T13452] ? lock_sock_nested+0x9a/0x120 [ 2553.787359][T13452] ? sock_kmalloc+0xc6/0x120 [ 2553.791955][T13452] sock_kmalloc+0xc6/0x120 [ 2553.796385][T13452] hash_alloc_result.part.0+0x95/0x110 [ 2553.801853][T13452] hash_sendpage+0x7a7/0x9d0 [ 2553.806455][T13452] hash_sendpage_nokey+0x94/0xa0 [ 2553.811404][T13452] kernel_sendpage+0x92/0xf0 [ 2553.815998][T13452] ? hash_check_key.isra.0+0x230/0x230 [ 2553.816018][T13452] sock_sendpage+0x8b/0xc0 [ 2553.816038][T13452] pipe_to_sendpage+0x296/0x360 [ 2553.816053][T13452] ? kernel_sendpage+0xf0/0xf0 [ 2553.816070][T13452] ? direct_splice_actor+0x190/0x190 [ 2553.816090][T13452] ? __put_page+0xa7/0xe0 [ 2553.825931][T13452] ? anon_pipe_buf_release+0x1c6/0x270 [ 2553.825953][T13452] __splice_from_pipe+0x397/0x7d0 [ 2553.825971][T13452] ? direct_splice_actor+0x190/0x190 [ 2553.825994][T13452] ? direct_splice_actor+0x190/0x190 [ 2553.826008][T13452] splice_from_pipe+0x108/0x170 [ 2553.826027][T13452] ? splice_shrink_spd+0xd0/0xd0 [ 2553.826048][T13452] ? apparmor_file_permission+0x25/0x30 [ 2553.826065][T13452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2553.826085][T13452] ? security_file_permission+0x8f/0x380 [ 2553.893358][T13452] generic_splice_sendpage+0x3c/0x50 [ 2553.898654][T13452] ? splice_from_pipe+0x170/0x170 [ 2553.903675][T13452] do_splice+0x708/0x1410 [ 2553.908017][T13452] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2553.913149][T13452] ? __fget_light+0x1a9/0x230 [ 2553.917836][T13452] __x64_sys_splice+0x2c6/0x330 [ 2553.922699][T13452] do_syscall_64+0xfa/0x760 [ 2553.927215][T13452] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2553.933106][T13452] RIP: 0033:0x459f49 23:30:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="5500000018007f5ff7fd01b2a4a200000a", 0x11}], 0x1}, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x4ffe2, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000080)={r5, 0x220}, &(0x7f0000000180)=0x8) [ 2553.936991][T13452] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2553.956593][T13452] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2553.965010][T13452] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2553.972984][T13452] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2553.980956][T13452] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 23:30:26 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc020662a, &(0x7f00000000c0)={0x4000000, r5, 0x1800}) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r4, 0x800442d4, &(0x7f0000000100)=0xdd) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpuset.effective_cpus\x00', 0x0, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r6, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2553.988935][T13452] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2553.996905][T13452] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2554.065136][T13462] netlink: 57 bytes leftover after parsing attributes in process `syz-executor.3'. 23:30:33 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) r4 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:33 executing program 1 (fault-call:11 fault-nth:2): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:33 executing program 2 (fault-call:10 fault-nth:2): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:33 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x8000000f, 0x0) 23:30:33 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r3, &(0x7f0000002780), 0x400004d, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r5 = getgid() setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={r4, 0xee00, r5}, 0xc) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r6 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r6, 0x0, 0x80000001, 0x0) 23:30:33 executing program 3: pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) socket$packet(0x11, 0x2, 0x300) bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000000)) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 2560.642851][T13492] FAULT_INJECTION: forcing a failure. [ 2560.642851][T13492] name failslab, interval 1, probability 0, space 0, times 0 [ 2560.656923][T13494] FAULT_INJECTION: forcing a failure. [ 2560.656923][T13494] name failslab, interval 1, probability 0, space 0, times 0 [ 2560.685177][T13492] CPU: 1 PID: 13492 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2560.693109][T13492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2560.703172][T13492] Call Trace: [ 2560.706478][T13492] dump_stack+0x172/0x1f0 [ 2560.710832][T13492] should_fail.cold+0xa/0x15 [ 2560.715436][T13492] ? fault_create_debugfs_attr+0x180/0x180 [ 2560.721254][T13492] ? ___might_sleep+0x163/0x2c0 [ 2560.726117][T13492] __should_failslab+0x121/0x190 [ 2560.731060][T13492] should_failslab+0x9/0x14 [ 2560.735571][T13492] __kmalloc+0x2e0/0x770 [ 2560.739817][T13492] ? __local_bh_enable_ip+0x15a/0x270 [ 2560.745184][T13492] ? lock_sock_nested+0xe2/0x120 [ 2560.750131][T13492] ? __local_bh_enable_ip+0x15a/0x270 [ 2560.755517][T13492] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2560.760805][T13492] ? lock_sock_nested+0x9a/0x120 [ 2560.765749][T13492] ? sock_kmalloc+0xc6/0x120 [ 2560.770375][T13492] sock_kmalloc+0xc6/0x120 [ 2560.774818][T13492] hash_alloc_result.part.0+0x95/0x110 [ 2560.780296][T13492] hash_sendpage+0x7a7/0x9d0 [ 2560.784904][T13492] hash_sendpage_nokey+0x94/0xa0 [ 2560.789860][T13492] kernel_sendpage+0x92/0xf0 [ 2560.794479][T13492] ? hash_check_key.isra.0+0x230/0x230 [ 2560.799945][T13492] sock_sendpage+0x8b/0xc0 [ 2560.804373][T13492] pipe_to_sendpage+0x296/0x360 [ 2560.809229][T13492] ? kernel_sendpage+0xf0/0xf0 [ 2560.814001][T13492] ? direct_splice_actor+0x190/0x190 [ 2560.819290][T13492] ? __put_page+0xa7/0xe0 [ 2560.823631][T13492] ? anon_pipe_buf_release+0x1c6/0x270 [ 2560.829202][T13492] __splice_from_pipe+0x397/0x7d0 [ 2560.834232][T13492] ? direct_splice_actor+0x190/0x190 [ 2560.839528][T13492] ? direct_splice_actor+0x190/0x190 [ 2560.844812][T13492] splice_from_pipe+0x108/0x170 [ 2560.849684][T13492] ? splice_shrink_spd+0xd0/0xd0 [ 2560.854632][T13492] ? apparmor_file_permission+0x25/0x30 [ 2560.860210][T13492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2560.866462][T13492] ? security_file_permission+0x8f/0x380 [ 2560.872102][T13492] generic_splice_sendpage+0x3c/0x50 [ 2560.877396][T13492] ? splice_from_pipe+0x170/0x170 [ 2560.882428][T13492] do_splice+0x708/0x1410 [ 2560.886778][T13492] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2560.891893][T13492] ? __fget_light+0x1a9/0x230 [ 2560.896589][T13492] __x64_sys_splice+0x2c6/0x330 [ 2560.901455][T13492] do_syscall_64+0xfa/0x760 [ 2560.905980][T13492] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2560.911873][T13492] RIP: 0033:0x459f49 [ 2560.915774][T13492] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2560.935381][T13492] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2560.943882][T13492] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2560.951852][T13492] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2560.959824][T13492] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2560.967791][T13492] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2560.975760][T13492] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2560.983763][T13494] CPU: 0 PID: 13494 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2560.984043][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2560.991655][T13494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2560.991661][T13494] Call Trace: [ 2560.991681][T13494] dump_stack+0x172/0x1f0 [ 2560.991708][T13494] should_fail.cold+0xa/0x15 [ 2560.997474][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2561.007456][T13494] ? fault_create_debugfs_attr+0x180/0x180 [ 2561.007476][T13494] ? ___might_sleep+0x163/0x2c0 [ 2561.007497][T13494] __should_failslab+0x121/0x190 [ 2561.040886][T13494] should_failslab+0x9/0x14 [ 2561.045394][T13494] __kmalloc+0x2e0/0x770 [ 2561.049642][T13494] ? __local_bh_enable_ip+0x15a/0x270 [ 2561.055019][T13494] ? lock_sock_nested+0xe2/0x120 [ 2561.059957][T13494] ? __local_bh_enable_ip+0x15a/0x270 [ 2561.065334][T13494] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2561.070626][T13494] ? lock_sock_nested+0x9a/0x120 [ 2561.075563][T13494] ? sock_kmalloc+0xc6/0x120 [ 2561.080164][T13494] sock_kmalloc+0xc6/0x120 [ 2561.084581][T13494] hash_alloc_result.part.0+0x95/0x110 [ 2561.090042][T13494] hash_sendpage+0x7a7/0x9d0 [ 2561.094901][T13494] hash_sendpage_nokey+0x94/0xa0 [ 2561.099845][T13494] kernel_sendpage+0x92/0xf0 [ 2561.104441][T13494] ? hash_check_key.isra.0+0x230/0x230 [ 2561.109906][T13494] sock_sendpage+0x8b/0xc0 [ 2561.114328][T13494] pipe_to_sendpage+0x296/0x360 [ 2561.119171][T13494] ? kernel_sendpage+0xf0/0xf0 [ 2561.123917][T13494] ? direct_splice_actor+0x190/0x190 [ 2561.129193][T13494] ? __put_page+0xa7/0xe0 [ 2561.133515][T13494] ? anon_pipe_buf_release+0x1c6/0x270 [ 2561.138960][T13494] __splice_from_pipe+0x397/0x7d0 [ 2561.144123][T13494] ? direct_splice_actor+0x190/0x190 [ 2561.149393][T13494] ? direct_splice_actor+0x190/0x190 [ 2561.154660][T13494] splice_from_pipe+0x108/0x170 [ 2561.159491][T13494] ? splice_shrink_spd+0xd0/0xd0 [ 2561.164413][T13494] ? apparmor_file_permission+0x25/0x30 [ 2561.169950][T13494] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2561.176213][T13494] ? security_file_permission+0x8f/0x380 [ 2561.181831][T13494] generic_splice_sendpage+0x3c/0x50 [ 2561.187095][T13494] ? splice_from_pipe+0x170/0x170 [ 2561.192100][T13494] do_splice+0x708/0x1410 [ 2561.196435][T13494] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2561.201529][T13494] ? __fget_light+0x1a9/0x230 [ 2561.206240][T13494] __x64_sys_splice+0x2c6/0x330 [ 2561.211087][T13494] do_syscall_64+0xfa/0x760 [ 2561.215578][T13494] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2561.221449][T13494] RIP: 0033:0x459f49 [ 2561.225322][T13494] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2561.244908][T13494] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2561.253312][T13494] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2561.261266][T13494] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2561.269218][T13494] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2561.277168][T13494] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2561.285119][T13494] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:30:33 executing program 2 (fault-call:10 fault-nth:3): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:33 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) accept4(0xffffffffffffffff, &(0x7f0000000700)=@alg, &(0x7f0000000680)=0x80, 0x81000) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f00000003c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r4, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="38000000240007050000a4a43820000000000080caf01ce9", @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000090001006866736300000000fbff020000000000"], 0x38}}, 0x0) sendmsg$inet(r0, &(0x7f0000000600)={&(0x7f00000000c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000240)="66781e3a43fbeb53b10384d95a8b5f72952ac1bdf2df2892dba2a3ccfadd8f9c28aa2257d35196a53ac41b1372b65a01e2ee91e04965e2a65a44b129f7e63dc75d03f38a9f4ffe7ff402d97309061cc805ffd68d040ae492fca7d18e6dfb45c6a89ab7aff4acbb55ad1c24f08553dd033e821ab2471ab448c66d3923da008fdc137dafaa13ca4bbd4752b26e954f081e18ee315e3e514e1f1aece3c5fa56d526f4c31dfbd7ec29370057d82aed46541a8ce7b5537665872bc77f61e8d5dde0d90af772e65b4a7c4e61d1108b65119ed40999e52c24", 0xd5}, {&(0x7f0000000340)="fdf8ab40aa19815ef4105ec2633c213814cb7db96e2d28201f06d0c3faad824597d6a926ea4a8dcc039b9dd4e90da1189aa04736bc27beea980ca8fff5c1ce52a58c29c3c1434736a5f822bc10c46085c5b39d2eba3a34ded5df686aad65af9c070811d4fa9a2f5a71db9ce9306ac5d77499a3b599c3640060be886c61ff2fcdf4698348a23c411419fa4beccc2992074b60cbd0d25ecfff44c53f29d3bcff287bf257cdfe231fd671b1d2eca358955ed4dc61ea323d5bab85c965b802e60e63a0a5da21baf26c6c19ee4d320be056f8c9b3e32e73f2f52c265970", 0xdb}, {&(0x7f0000000480)="8fe70d66914e16d884ab6f025c6245ce1b02bca0901a847c46ebe97eb0351987c0144c40fa784ac47212a94551016c92ee21b81b2569004d2b8d51854a1b0f773bf64d35ae60e97e5ee64d1df4e0bdc176dda37e3a9269a47e598db6cef1dd9923e02d925c7d38f1e3051027cce71be2d97208b48ea1a5cf24f8e7e4fa0cbbc535a206c2cf70074eed534360158945a774b415eb6c8ad39344dec5d85b213301904ea8e49aa379ad98cb787ff9cb684c52e0d07943ded401afd73edbb83ecbf4bc6eaaee2cc5ad62faf7aa671d137a6a6139ec9605ca83592401c403", 0xdc}], 0x3, &(0x7f0000000580)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x60}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @broadcast, @empty}}}], 0x80}, 0x800) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:34 executing program 1 (fault-call:11 fault-nth:3): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:34 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r0, &(0x7f0000002780), 0x400004d, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'\x00', 0x1000}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000080)=0xc) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") socket(0x0, 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) 23:30:34 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000300, 0x0) [ 2561.544459][T13511] FAULT_INJECTION: forcing a failure. [ 2561.544459][T13511] name failslab, interval 1, probability 0, space 0, times 0 [ 2561.594060][T13511] CPU: 1 PID: 13511 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2561.601986][T13511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2561.612048][T13511] Call Trace: [ 2561.615353][T13511] dump_stack+0x172/0x1f0 [ 2561.618044][T13518] FAULT_INJECTION: forcing a failure. [ 2561.618044][T13518] name failslab, interval 1, probability 0, space 0, times 0 [ 2561.619694][T13511] should_fail.cold+0xa/0x15 [ 2561.619715][T13511] ? fault_create_debugfs_attr+0x180/0x180 [ 2561.619739][T13511] ? ___might_sleep+0x163/0x2c0 [ 2561.647532][T13511] __should_failslab+0x121/0x190 [ 2561.652479][T13511] should_failslab+0x9/0x14 [ 2561.656987][T13511] __kmalloc+0x2e0/0x770 [ 2561.661233][T13511] ? __local_bh_enable_ip+0x15a/0x270 [ 2561.666610][T13511] ? lock_sock_nested+0xe2/0x120 [ 2561.671544][T13511] ? __local_bh_enable_ip+0x15a/0x270 [ 2561.676916][T13511] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2561.682200][T13511] ? lock_sock_nested+0x9a/0x120 [ 2561.687150][T13511] ? sock_kmalloc+0xc6/0x120 [ 2561.691754][T13511] sock_kmalloc+0xc6/0x120 [ 2561.696180][T13511] hash_alloc_result.part.0+0x95/0x110 [ 2561.701649][T13511] hash_sendpage+0x7a7/0x9d0 [ 2561.706250][T13511] hash_sendpage_nokey+0x94/0xa0 [ 2561.711200][T13511] kernel_sendpage+0x92/0xf0 [ 2561.715796][T13511] ? hash_check_key.isra.0+0x230/0x230 [ 2561.721257][T13511] sock_sendpage+0x8b/0xc0 [ 2561.725681][T13511] pipe_to_sendpage+0x296/0x360 [ 2561.730534][T13511] ? kernel_sendpage+0xf0/0xf0 [ 2561.735313][T13511] ? direct_splice_actor+0x190/0x190 [ 2561.740603][T13511] ? __put_page+0xa7/0xe0 [ 2561.744939][T13511] ? anon_pipe_buf_release+0x1c6/0x270 [ 2561.751023][T13511] __splice_from_pipe+0x397/0x7d0 [ 2561.756054][T13511] ? direct_splice_actor+0x190/0x190 [ 2561.761356][T13511] ? direct_splice_actor+0x190/0x190 [ 2561.766641][T13511] splice_from_pipe+0x108/0x170 [ 2561.771496][T13511] ? splice_shrink_spd+0xd0/0xd0 [ 2561.776447][T13511] ? apparmor_file_permission+0x25/0x30 [ 2561.782001][T13511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2561.788251][T13511] ? security_file_permission+0x8f/0x380 [ 2561.793891][T13511] generic_splice_sendpage+0x3c/0x50 [ 2561.799181][T13511] ? splice_from_pipe+0x170/0x170 [ 2561.804215][T13511] do_splice+0x708/0x1410 [ 2561.808575][T13511] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2561.813692][T13511] ? __fget_light+0x1a9/0x230 [ 2561.818376][T13511] __x64_sys_splice+0x2c6/0x330 [ 2561.823242][T13511] do_syscall_64+0xfa/0x760 [ 2561.827761][T13511] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2561.833654][T13511] RIP: 0033:0x459f49 [ 2561.837561][T13511] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2561.857285][T13511] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2561.865701][T13511] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2561.873680][T13511] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2561.881656][T13511] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2561.889627][T13511] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2561.897607][T13511] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2561.921103][T13518] CPU: 0 PID: 13518 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2561.929025][T13518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2561.939081][T13518] Call Trace: [ 2561.942380][T13518] dump_stack+0x172/0x1f0 [ 2561.946710][T13518] should_fail.cold+0xa/0x15 [ 2561.951299][T13518] ? fault_create_debugfs_attr+0x180/0x180 [ 2561.957115][T13518] ? ___might_sleep+0x163/0x2c0 [ 2561.961975][T13518] __should_failslab+0x121/0x190 [ 2561.966918][T13518] should_failslab+0x9/0x14 [ 2561.971425][T13518] __kmalloc+0x2e0/0x770 [ 2561.975671][T13518] ? __local_bh_enable_ip+0x15a/0x270 [ 2561.981044][T13518] ? lock_sock_nested+0xe2/0x120 [ 2561.985984][T13518] ? __local_bh_enable_ip+0x15a/0x270 [ 2561.991362][T13518] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2561.996649][T13518] ? lock_sock_nested+0x9a/0x120 [ 2562.001591][T13518] ? sock_kmalloc+0xc6/0x120 [ 2562.006184][T13518] sock_kmalloc+0xc6/0x120 [ 2562.010608][T13518] hash_alloc_result.part.0+0x95/0x110 [ 2562.016068][T13518] hash_sendpage+0x7a7/0x9d0 [ 2562.020667][T13518] hash_sendpage_nokey+0x94/0xa0 [ 2562.025609][T13518] kernel_sendpage+0x92/0xf0 [ 2562.030206][T13518] ? hash_check_key.isra.0+0x230/0x230 [ 2562.035672][T13518] sock_sendpage+0x8b/0xc0 [ 2562.040098][T13518] pipe_to_sendpage+0x296/0x360 [ 2562.044954][T13518] ? kernel_sendpage+0xf0/0xf0 [ 2562.049724][T13518] ? direct_splice_actor+0x190/0x190 [ 2562.055017][T13518] ? __put_page+0xa7/0xe0 [ 2562.059348][T13518] ? anon_pipe_buf_release+0x1c6/0x270 [ 2562.064816][T13518] __splice_from_pipe+0x397/0x7d0 [ 2562.070045][T13518] ? direct_splice_actor+0x190/0x190 [ 2562.075339][T13518] ? direct_splice_actor+0x190/0x190 [ 2562.080624][T13518] splice_from_pipe+0x108/0x170 [ 2562.085484][T13518] ? splice_shrink_spd+0xd0/0xd0 [ 2562.090443][T13518] ? apparmor_file_permission+0x25/0x30 [ 2562.095993][T13518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2562.102238][T13518] ? security_file_permission+0x8f/0x380 [ 2562.107883][T13518] generic_splice_sendpage+0x3c/0x50 [ 2562.113172][T13518] ? splice_from_pipe+0x170/0x170 [ 2562.118202][T13518] do_splice+0x708/0x1410 [ 2562.122546][T13518] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2562.127667][T13518] ? __fget_light+0x1a9/0x230 [ 2562.132346][T13518] __x64_sys_splice+0x2c6/0x330 [ 2562.137207][T13518] do_syscall_64+0xfa/0x760 [ 2562.141718][T13518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2562.147605][T13518] RIP: 0033:0x459f49 [ 2562.151502][T13518] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2562.171106][T13518] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2562.179522][T13518] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2562.187500][T13518] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2562.195469][T13518] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2562.203432][T13518] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2562.211471][T13518] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:30:34 executing program 2 (fault-call:10 fault-nth:4): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2562.434722][T13531] FAULT_INJECTION: forcing a failure. [ 2562.434722][T13531] name failslab, interval 1, probability 0, space 0, times 0 [ 2562.462981][T13531] CPU: 1 PID: 13531 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2562.470914][T13531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2562.480967][T13531] Call Trace: [ 2562.484245][T13531] dump_stack+0x172/0x1f0 [ 2562.488564][T13531] should_fail.cold+0xa/0x15 [ 2562.493204][T13531] ? fault_create_debugfs_attr+0x180/0x180 [ 2562.499059][T13531] ? ___might_sleep+0x163/0x2c0 [ 2562.503896][T13531] __should_failslab+0x121/0x190 [ 2562.508815][T13531] should_failslab+0x9/0x14 [ 2562.513295][T13531] __kmalloc+0x2e0/0x770 [ 2562.517553][T13531] ? __local_bh_enable_ip+0x15a/0x270 [ 2562.522970][T13531] ? lock_sock_nested+0xe2/0x120 [ 2562.527927][T13531] ? __local_bh_enable_ip+0x15a/0x270 [ 2562.533279][T13531] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2562.538542][T13531] ? lock_sock_nested+0x9a/0x120 [ 2562.543458][T13531] ? sock_kmalloc+0xc6/0x120 [ 2562.548037][T13531] sock_kmalloc+0xc6/0x120 [ 2562.552449][T13531] hash_alloc_result.part.0+0x95/0x110 [ 2562.557947][T13531] hash_sendpage+0x7a7/0x9d0 [ 2562.562604][T13531] hash_sendpage_nokey+0x94/0xa0 [ 2562.567526][T13531] kernel_sendpage+0x92/0xf0 [ 2562.572094][T13531] ? hash_check_key.isra.0+0x230/0x230 [ 2562.577640][T13531] sock_sendpage+0x8b/0xc0 [ 2562.582055][T13531] pipe_to_sendpage+0x296/0x360 [ 2562.586888][T13531] ? kernel_sendpage+0xf0/0xf0 [ 2562.591637][T13531] ? direct_splice_actor+0x190/0x190 [ 2562.596956][T13531] ? __put_page+0xa7/0xe0 [ 2562.601284][T13531] ? anon_pipe_buf_release+0x1c6/0x270 [ 2562.606749][T13531] __splice_from_pipe+0x397/0x7d0 [ 2562.611765][T13531] ? direct_splice_actor+0x190/0x190 [ 2562.617042][T13531] ? direct_splice_actor+0x190/0x190 [ 2562.622320][T13531] splice_from_pipe+0x108/0x170 [ 2562.627164][T13531] ? splice_shrink_spd+0xd0/0xd0 [ 2562.632109][T13531] ? apparmor_file_permission+0x25/0x30 [ 2562.637636][T13531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2562.643860][T13531] ? security_file_permission+0x8f/0x380 [ 2562.649475][T13531] generic_splice_sendpage+0x3c/0x50 [ 2562.654740][T13531] ? splice_from_pipe+0x170/0x170 [ 2562.659743][T13531] do_splice+0x708/0x1410 [ 2562.664058][T13531] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2562.669148][T13531] ? __fget_light+0x1a9/0x230 [ 2562.673815][T13531] __x64_sys_splice+0x2c6/0x330 [ 2562.678659][T13531] do_syscall_64+0xfa/0x760 [ 2562.683148][T13531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2562.689019][T13531] RIP: 0033:0x459f49 [ 2562.692905][T13531] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2562.712503][T13531] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2562.720895][T13531] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2562.728850][T13531] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2562.736798][T13531] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2562.744753][T13531] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2562.752708][T13531] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:30:43 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:43 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x4) connect(r0, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) r1 = socket$inet(0x2, 0x2000000000003, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0x32, &(0x7f0000000000), 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r3, &(0x7f0000002780), 0x400004d, 0x0) r4 = accept4(r3, &(0x7f00000008c0)=@can, &(0x7f0000000940)=0x80, 0x800) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01004000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000980)={r6, 0x7}, 0x8) ioctl(r2, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r7 = socket$inet(0x2, 0x3, 0x2) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r7, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x480}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r9, 0x84, 0x7b, &(0x7f00000001c0)={r10, 0x3}, &(0x7f0000000200)=0x8) bind$netlink(r8, &(0x7f00000000c0)={0x4400000010, 0x0, 0x0, 0x522}, 0xc) setsockopt$inet_int(r7, 0x1f00000000000000, 0xd3, &(0x7f0000000000), 0x3c) 23:30:43 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000600, 0x0) 23:30:43 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000780)=[{&(0x7f0000000100)="c8da68d13e4f9081a9528ff65dea", 0xe}, {&(0x7f0000000240)="0fc352bb7768655abd6fb08517f397f887b31b503079bf78cc725d3182f00ab5f81d5793fb7f8d8c840f0efd930d3a09b7adedb58ff4037de428a63c0c809a116fb2df0fa34d2271afab6da9022bfa63307ae54f723aaa", 0x57}, {&(0x7f00000002c0)="5f939707b2e65bd44d2b5d7aa8b9463903f464576ca80698d1195bc5b62ed5ce047a544ab17daa196ef2b75b5255025fe88226b8167556083ff5513260a076e4db4cb83a80c64437524739", 0x4b}, {&(0x7f0000000340)="674f8b8f1a485e8319c5dfdd866fa584d9cf333b1924e80190d986caff3798ad81fb7ce5a1b094128ad0be24b09f326f", 0x30}, {&(0x7f0000000380)="a3235d22c5153ca5c67c55e2935c7daca89c04c2380ebf7749db7a14bd5ccbc2628c91cbd91112f05f6c58d479cb46af202bb952ce2b36f4a9ca7b73f22184c0d2a83e8c87fe284fa8bd0a9e7fc308197c68cf3472ebde2e31124e11ec9683b1cea9b2221e0ff1009389a2e2a9e8616c5bd87876d51060690318ded465c6a514bcddad77414b6de525ff62d8", 0x8c}, {&(0x7f0000000480)="37e9e4ebd25588285e50a28c42a3a65a9d12e4f040b53274e31aba982b0d3026c57524294ff6e96d509ee708509ca675461b1b2474ca0fa01ce6f5389f123ff9d56a66dfcb9f170ccecfac73a872ad5e31211494826242a22f066a9bb6ae334781963227d14af102cba15fcebc26e693c8cd1827b4e6b750bfa4b0bc5ef0da35663b3cae16933a062f95d05f2d1b", 0x8e}, {&(0x7f0000000540)="96cd068fe66507bc6f778508d41b7f83c5363e35701132bd3ea930ec9f6ae7308c286b42b7c054e801413d1fc5dadc3931617f9a2d0c31afbeb57810bc73e70f832c9ec42d410510ef679cdba54c1a8531b5b87afd87e0304f230b4b3539debf576f81d08598631be06c7d3891d5772b2cb074a5fef567be169ebfdaa5f400bfbadaeea1ca73dfbc5ad02f19c7b2b45730201efaf8632029720fbd151036d662d1f6bf3bbea9c97cf4ec0a7a0047131f48471587", 0xb4}, {&(0x7f0000000600)="f08e219fb5d25e9e8c6d7218c6277365372c49552defacb0539679813d88fb14bc8bcc20c98c7d38c2d6e0e3a57c635ff483fcb224be85cf15ef862e9d0aeff64510d6105cd5d4b6821e75bc745aca8d4e683f5990946bc0efcfde2c89a9ab45e543de1c09e2a34fba9cea1e3fc54998fcbc7642de6e9be6cdd13cbd7ecd877f7998a173addf91667f5c8e8345af6ab2f72b13970c6d39208fab87efd7d2edb84feb6a7b5a38700e7d11c380918c0f773f9ca8f884177ce9feea10c250fcbc8d0ce65cdf7059169549d36a3dfca32644107b213c3e9dad0d7d27890f608ca9a110cea8e11baf4a648301e3423d09e963b3b314f2", 0xf4}, {&(0x7f0000000700)="a3323a4a6c954b1e12cc95d2c06f40a65cd0fcf5be57d3122b19f0f0fa21586195887159446e4e50d2b6d9b98cf8d34949c33786b9376ffdde2f7623f82ef9b242ade7ff2fd98ee9b4fedc8c4d4ecb33ccea3014faf9acab0bdd3b4976239cceaa20e8fe415b8c67995cfbdce8cb3df39ce2", 0x72}], 0x9, 0x2) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:43 executing program 1 (fault-call:11 fault-nth:4): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:43 executing program 2 (fault-call:10 fault-nth:5): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2571.282002][T13552] FAULT_INJECTION: forcing a failure. [ 2571.282002][T13552] name failslab, interval 1, probability 0, space 0, times 0 [ 2571.302710][T13552] CPU: 1 PID: 13552 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2571.304041][T13553] FAULT_INJECTION: forcing a failure. [ 2571.304041][T13553] name failslab, interval 1, probability 0, space 0, times 0 [ 2571.310636][T13552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2571.310643][T13552] Call Trace: [ 2571.310666][T13552] dump_stack+0x172/0x1f0 [ 2571.310688][T13552] should_fail.cold+0xa/0x15 [ 2571.310705][T13552] ? fault_create_debugfs_attr+0x180/0x180 [ 2571.310724][T13552] ? ___might_sleep+0x163/0x2c0 [ 2571.310742][T13552] __should_failslab+0x121/0x190 [ 2571.310759][T13552] should_failslab+0x9/0x14 [ 2571.310776][T13552] __kmalloc+0x2e0/0x770 [ 2571.369862][T13552] ? __local_bh_enable_ip+0x15a/0x270 [ 2571.375238][T13552] ? lock_sock_nested+0xe2/0x120 [ 2571.380177][T13552] ? __local_bh_enable_ip+0x15a/0x270 [ 2571.385556][T13552] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2571.390851][T13552] ? lock_sock_nested+0x9a/0x120 [ 2571.395788][T13552] ? sock_kmalloc+0xc6/0x120 [ 2571.400384][T13552] sock_kmalloc+0xc6/0x120 [ 2571.404810][T13552] hash_alloc_result.part.0+0x95/0x110 [ 2571.410267][T13552] hash_sendpage+0x7a7/0x9d0 [ 2571.414863][T13552] hash_sendpage_nokey+0x94/0xa0 [ 2571.419810][T13552] kernel_sendpage+0x92/0xf0 [ 2571.424399][T13552] ? hash_check_key.isra.0+0x230/0x230 [ 2571.429861][T13552] sock_sendpage+0x8b/0xc0 [ 2571.434284][T13552] pipe_to_sendpage+0x296/0x360 [ 2571.439136][T13552] ? kernel_sendpage+0xf0/0xf0 [ 2571.443905][T13552] ? direct_splice_actor+0x190/0x190 [ 2571.449194][T13552] ? __put_page+0xa7/0xe0 [ 2571.453524][T13552] ? anon_pipe_buf_release+0x1c6/0x270 [ 2571.458991][T13552] __splice_from_pipe+0x397/0x7d0 [ 2571.464019][T13552] ? direct_splice_actor+0x190/0x190 [ 2571.469311][T13552] ? direct_splice_actor+0x190/0x190 [ 2571.474596][T13552] splice_from_pipe+0x108/0x170 [ 2571.479448][T13552] ? splice_shrink_spd+0xd0/0xd0 [ 2571.484390][T13552] ? apparmor_file_permission+0x25/0x30 [ 2571.489936][T13552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2571.496182][T13552] ? security_file_permission+0x8f/0x380 [ 2571.501824][T13552] generic_splice_sendpage+0x3c/0x50 [ 2571.507112][T13552] ? splice_from_pipe+0x170/0x170 [ 2571.512141][T13552] do_splice+0x708/0x1410 [ 2571.516482][T13552] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2571.521591][T13552] ? __fget_light+0x1a9/0x230 [ 2571.526272][T13552] __x64_sys_splice+0x2c6/0x330 [ 2571.531131][T13552] do_syscall_64+0xfa/0x760 [ 2571.535648][T13552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2571.541537][T13552] RIP: 0033:0x459f49 [ 2571.545435][T13552] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2571.565039][T13552] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2571.573622][T13552] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2571.581695][T13552] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2571.589666][T13552] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2571.597636][T13552] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2571.605604][T13552] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2571.613594][T13553] CPU: 0 PID: 13553 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2571.621527][T13553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2571.631707][T13553] Call Trace: [ 2571.634997][T13553] dump_stack+0x172/0x1f0 [ 2571.639324][T13553] should_fail.cold+0xa/0x15 [ 2571.643900][T13553] ? fault_create_debugfs_attr+0x180/0x180 [ 2571.649839][T13553] ? ___might_sleep+0x163/0x2c0 [ 2571.654709][T13553] __should_failslab+0x121/0x190 [ 2571.659661][T13553] should_failslab+0x9/0x14 [ 2571.664170][T13553] __kmalloc+0x2e0/0x770 [ 2571.668418][T13553] ? __local_bh_enable_ip+0x15a/0x270 [ 2571.673796][T13553] ? lock_sock_nested+0xe2/0x120 [ 2571.678738][T13553] ? __local_bh_enable_ip+0x15a/0x270 [ 2571.684114][T13553] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2571.689404][T13553] ? lock_sock_nested+0x9a/0x120 [ 2571.694344][T13553] ? sock_kmalloc+0xc6/0x120 [ 2571.698947][T13553] sock_kmalloc+0xc6/0x120 [ 2571.703374][T13553] hash_alloc_result.part.0+0x95/0x110 [ 2571.708844][T13553] hash_sendpage+0x7a7/0x9d0 [ 2571.713445][T13553] hash_sendpage_nokey+0x94/0xa0 [ 2571.718392][T13553] kernel_sendpage+0x92/0xf0 [ 2571.722972][T13553] ? hash_check_key.isra.0+0x230/0x230 [ 2571.728433][T13553] sock_sendpage+0x8b/0xc0 [ 2571.732930][T13553] pipe_to_sendpage+0x296/0x360 [ 2571.737782][T13553] ? kernel_sendpage+0xf0/0xf0 [ 2571.742538][T13553] ? direct_splice_actor+0x190/0x190 [ 2571.747821][T13553] ? __put_page+0xa7/0xe0 [ 2571.752137][T13553] ? anon_pipe_buf_release+0x1c6/0x270 [ 2571.757579][T13553] __splice_from_pipe+0x397/0x7d0 [ 2571.762584][T13553] ? direct_splice_actor+0x190/0x190 [ 2571.767855][T13553] ? direct_splice_actor+0x190/0x190 [ 2571.773121][T13553] splice_from_pipe+0x108/0x170 [ 2571.777990][T13553] ? splice_shrink_spd+0xd0/0xd0 [ 2571.782915][T13553] ? apparmor_file_permission+0x25/0x30 [ 2571.788443][T13553] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2571.794666][T13553] ? security_file_permission+0x8f/0x380 [ 2571.800289][T13553] generic_splice_sendpage+0x3c/0x50 [ 2571.805553][T13553] ? splice_from_pipe+0x170/0x170 [ 2571.810568][T13553] do_splice+0x708/0x1410 [ 2571.814910][T13553] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2571.820010][T13553] ? __fget_light+0x1a9/0x230 [ 2571.824663][T13553] __x64_sys_splice+0x2c6/0x330 [ 2571.829499][T13553] do_syscall_64+0xfa/0x760 [ 2571.834024][T13553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2571.839901][T13553] RIP: 0033:0x459f49 [ 2571.843785][T13553] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2571.863366][T13553] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2571.871754][T13553] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 23:30:44 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xf) [ 2571.879718][T13553] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2571.887679][T13553] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2571.895645][T13553] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2571.903607][T13553] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:30:44 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x2) 23:30:44 executing program 1 (fault-call:11 fault-nth:5): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:44 executing program 2 (fault-call:10 fault-nth:6): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2f0000001d0081fd6d0000338f00000002dd0700060000001f5f03c9080001003898efab", 0x24}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="240000001a0007041dfffd946f610500020000001f0000000000080008001b", 0x1f}], 0x1}, 0x0) r2 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0xd2efff7f00000000, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) r3 = socket$bt_hidp(0x1f, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendfile(r3, r4, &(0x7f00000001c0), 0x100000000) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000006ffc), 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2572.171623][T13573] netlink: 'syz-executor.3': attribute type 27 has an invalid length. [ 2572.191117][T13574] FAULT_INJECTION: forcing a failure. [ 2572.191117][T13574] name failslab, interval 1, probability 0, space 0, times 0 [ 2572.199646][T13576] FAULT_INJECTION: forcing a failure. [ 2572.199646][T13576] name failslab, interval 1, probability 0, space 0, times 0 [ 2572.226562][T13574] CPU: 0 PID: 13574 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2572.234475][T13574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2572.244538][T13574] Call Trace: [ 2572.247835][T13574] dump_stack+0x172/0x1f0 [ 2572.252173][T13574] should_fail.cold+0xa/0x15 [ 2572.256770][T13574] ? fault_create_debugfs_attr+0x180/0x180 [ 2572.262576][T13574] ? ___might_sleep+0x163/0x2c0 [ 2572.267436][T13574] __should_failslab+0x121/0x190 [ 2572.272388][T13574] should_failslab+0x9/0x14 [ 2572.276892][T13574] __kmalloc+0x2e0/0x770 [ 2572.281140][T13574] ? __local_bh_enable_ip+0x15a/0x270 [ 2572.286508][T13574] ? lock_sock_nested+0xe2/0x120 [ 2572.291436][T13574] ? __local_bh_enable_ip+0x15a/0x270 [ 2572.296801][T13574] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2572.302079][T13574] ? lock_sock_nested+0x9a/0x120 [ 2572.307006][T13574] ? sock_kmalloc+0xc6/0x120 [ 2572.311617][T13574] sock_kmalloc+0xc6/0x120 [ 2572.316034][T13574] hash_alloc_result.part.0+0x95/0x110 [ 2572.321489][T13574] hash_sendpage+0x7a7/0x9d0 [ 2572.326084][T13574] hash_sendpage_nokey+0x94/0xa0 [ 2572.331016][T13574] kernel_sendpage+0x92/0xf0 [ 2572.335603][T13574] ? hash_check_key.isra.0+0x230/0x230 [ 2572.341060][T13574] sock_sendpage+0x8b/0xc0 [ 2572.345476][T13574] pipe_to_sendpage+0x296/0x360 [ 2572.350325][T13574] ? kernel_sendpage+0xf0/0xf0 [ 2572.355083][T13574] ? direct_splice_actor+0x190/0x190 [ 2572.360361][T13574] ? __put_page+0xa7/0xe0 [ 2572.364689][T13574] ? anon_pipe_buf_release+0x1c6/0x270 [ 2572.370151][T13574] __splice_from_pipe+0x397/0x7d0 [ 2572.375171][T13574] ? direct_splice_actor+0x190/0x190 [ 2572.380456][T13574] ? direct_splice_actor+0x190/0x190 [ 2572.385734][T13574] splice_from_pipe+0x108/0x170 [ 2572.390589][T13574] ? splice_shrink_spd+0xd0/0xd0 [ 2572.395529][T13574] ? apparmor_file_permission+0x25/0x30 [ 2572.401069][T13574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2572.407324][T13574] ? security_file_permission+0x8f/0x380 [ 2572.412952][T13574] generic_splice_sendpage+0x3c/0x50 [ 2572.418228][T13574] ? splice_from_pipe+0x170/0x170 [ 2572.423252][T13574] do_splice+0x708/0x1410 [ 2572.427608][T13574] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2572.432718][T13574] ? __fget_light+0x1a9/0x230 [ 2572.437391][T13574] __x64_sys_splice+0x2c6/0x330 [ 2572.442241][T13574] do_syscall_64+0xfa/0x760 [ 2572.446749][T13574] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2572.452655][T13574] RIP: 0033:0x459f49 [ 2572.456541][T13574] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2572.476140][T13574] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2572.484546][T13574] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2572.492516][T13574] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2572.500482][T13574] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2572.508480][T13574] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2572.516469][T13574] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2572.524462][T13576] CPU: 1 PID: 13576 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2572.532363][T13576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2572.542397][T13576] Call Trace: [ 2572.545686][T13576] dump_stack+0x172/0x1f0 [ 2572.550029][T13576] should_fail.cold+0xa/0x15 [ 2572.554627][T13576] ? fault_create_debugfs_attr+0x180/0x180 [ 2572.560447][T13576] ? ___might_sleep+0x163/0x2c0 [ 2572.565307][T13576] __should_failslab+0x121/0x190 [ 2572.570246][T13576] should_failslab+0x9/0x14 [ 2572.574746][T13576] __kmalloc+0x2e0/0x770 [ 2572.578987][T13576] ? __local_bh_enable_ip+0x15a/0x270 [ 2572.584341][T13576] ? lock_sock_nested+0xe2/0x120 [ 2572.589261][T13576] ? __local_bh_enable_ip+0x15a/0x270 [ 2572.594617][T13576] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2572.599888][T13576] ? lock_sock_nested+0x9a/0x120 [ 2572.604806][T13576] ? sock_kmalloc+0xc6/0x120 [ 2572.609377][T13576] sock_kmalloc+0xc6/0x120 [ 2572.613778][T13576] hash_alloc_result.part.0+0x95/0x110 [ 2572.619237][T13576] hash_sendpage+0x7a7/0x9d0 [ 2572.623815][T13576] hash_sendpage_nokey+0x94/0xa0 [ 2572.628736][T13576] kernel_sendpage+0x92/0xf0 [ 2572.633305][T13576] ? hash_check_key.isra.0+0x230/0x230 [ 2572.638751][T13576] sock_sendpage+0x8b/0xc0 [ 2572.643167][T13576] pipe_to_sendpage+0x296/0x360 [ 2572.647998][T13576] ? kernel_sendpage+0xf0/0xf0 [ 2572.652744][T13576] ? direct_splice_actor+0x190/0x190 [ 2572.663652][T13576] ? __put_page+0xa7/0xe0 [ 2572.667964][T13576] ? anon_pipe_buf_release+0x1c6/0x270 [ 2572.673409][T13576] __splice_from_pipe+0x397/0x7d0 [ 2572.678412][T13576] ? direct_splice_actor+0x190/0x190 [ 2572.683708][T13576] ? direct_splice_actor+0x190/0x190 [ 2572.689001][T13576] splice_from_pipe+0x108/0x170 [ 2572.693842][T13576] ? splice_shrink_spd+0xd0/0xd0 [ 2572.698775][T13576] ? apparmor_file_permission+0x25/0x30 [ 2572.704310][T13576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2572.710568][T13576] ? security_file_permission+0x8f/0x380 [ 2572.716216][T13576] generic_splice_sendpage+0x3c/0x50 [ 2572.721516][T13576] ? splice_from_pipe+0x170/0x170 [ 2572.726540][T13576] do_splice+0x708/0x1410 [ 2572.730880][T13576] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2572.736057][T13576] ? __fget_light+0x1a9/0x230 [ 2572.740726][T13576] __x64_sys_splice+0x2c6/0x330 [ 2572.745578][T13576] do_syscall_64+0xfa/0x760 [ 2572.750097][T13576] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2572.755988][T13576] RIP: 0033:0x459f49 23:30:45 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xf00) [ 2572.759887][T13576] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2572.779492][T13576] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2572.779506][T13576] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2572.779514][T13576] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2572.779521][T13576] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2572.779529][T13576] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2572.779536][T13576] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:30:50 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:50 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x16c, 0x4) r1 = socket(0x400000000010, 0x3, 0x0) sendmsg$NET_DM_CMD_STOP(r1, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0xb3a9691a5639896b) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) syz_extract_tcp_res(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r2 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_tcp_buf(r2, 0x6, 0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1}, 0x100) syz_init_net_socket$llc(0x1a, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0xffffff6a) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000380), 0x10076) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000001300)={0x2880008}) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$SIOCAX25OPTRT(0xffffffffffffffff, 0x89e7, 0x0) bind$llc(0xffffffffffffffff, 0x0, 0x299) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 23:30:50 executing program 2 (fault-call:10 fault-nth:7): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:50 executing program 1 (fault-call:11 fault-nth:6): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:50 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000000c0)={0x6, 0x1093993a, 0x4, 0xb61a, 0x4}, 0x14) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(0xffffffffffffffff, &(0x7f0000000440)="b9c40900000000ff00006a2310", 0xd) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:50 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x3f00) 23:30:50 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc020662a, &(0x7f00000000c0)={0x4000000, r6, 0x1800}) r7 = accept$nfc_llcp(r6, &(0x7f00000000c0), &(0x7f0000000240)=0x60) write$binfmt_script(r7, &(0x7f0000000280)={'#! ', './file0', [{}]}, 0xc) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) r8 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r8, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r8, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x18}}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xc}}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x29}}, 0x110, 0x0, 0x0, 0x0, 0xf6, &(0x7f00000002c0)='caif0\x00', 0x1f, 0x20, 0x7}) [ 2578.430391][T13603] FAULT_INJECTION: forcing a failure. [ 2578.430391][T13603] name failslab, interval 1, probability 0, space 0, times 0 [ 2578.448589][T13603] CPU: 1 PID: 13603 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2578.456511][T13603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2578.466569][T13603] Call Trace: [ 2578.469871][T13603] dump_stack+0x172/0x1f0 [ 2578.474215][T13603] should_fail.cold+0xa/0x15 [ 2578.478816][T13603] ? fault_create_debugfs_attr+0x180/0x180 [ 2578.481450][T13608] FAULT_INJECTION: forcing a failure. [ 2578.481450][T13608] name failslab, interval 1, probability 0, space 0, times 0 [ 2578.484626][T13603] ? ___might_sleep+0x163/0x2c0 [ 2578.484647][T13603] __should_failslab+0x121/0x190 [ 2578.484668][T13603] should_failslab+0x9/0x14 [ 2578.511459][T13603] __kmalloc+0x2e0/0x770 [ 2578.515699][T13603] ? __local_bh_enable_ip+0x15a/0x270 [ 2578.521063][T13603] ? lock_sock_nested+0xe2/0x120 [ 2578.526008][T13603] ? __local_bh_enable_ip+0x15a/0x270 [ 2578.531375][T13603] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2578.536666][T13603] ? lock_sock_nested+0x9a/0x120 [ 2578.541610][T13603] ? sock_kmalloc+0xc6/0x120 [ 2578.546203][T13603] sock_kmalloc+0xc6/0x120 [ 2578.550623][T13603] hash_alloc_result.part.0+0x95/0x110 [ 2578.556087][T13603] hash_sendpage+0x7a7/0x9d0 [ 2578.560683][T13603] hash_sendpage_nokey+0x94/0xa0 [ 2578.565627][T13603] kernel_sendpage+0x92/0xf0 [ 2578.570235][T13603] ? hash_check_key.isra.0+0x230/0x230 [ 2578.575691][T13603] sock_sendpage+0x8b/0xc0 [ 2578.580130][T13603] pipe_to_sendpage+0x296/0x360 [ 2578.585008][T13603] ? kernel_sendpage+0xf0/0xf0 [ 2578.589782][T13603] ? direct_splice_actor+0x190/0x190 [ 2578.595068][T13603] ? __put_page+0xa7/0xe0 [ 2578.599405][T13603] ? anon_pipe_buf_release+0x1c6/0x270 [ 2578.604886][T13603] __splice_from_pipe+0x397/0x7d0 [ 2578.609909][T13603] ? direct_splice_actor+0x190/0x190 [ 2578.615204][T13603] ? direct_splice_actor+0x190/0x190 [ 2578.620497][T13603] splice_from_pipe+0x108/0x170 [ 2578.625353][T13603] ? splice_shrink_spd+0xd0/0xd0 [ 2578.630295][T13603] ? apparmor_file_permission+0x25/0x30 [ 2578.635836][T13603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2578.642075][T13603] ? security_file_permission+0x8f/0x380 [ 2578.647706][T13603] generic_splice_sendpage+0x3c/0x50 [ 2578.652992][T13603] ? splice_from_pipe+0x170/0x170 [ 2578.658010][T13603] do_splice+0x708/0x1410 [ 2578.662345][T13603] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2578.667455][T13603] ? __fget_light+0x1a9/0x230 [ 2578.672134][T13603] __x64_sys_splice+0x2c6/0x330 [ 2578.676989][T13603] do_syscall_64+0xfa/0x760 [ 2578.681511][T13603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2578.687400][T13603] RIP: 0033:0x459f49 [ 2578.691299][T13603] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2578.710910][T13603] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2578.719322][T13603] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2578.727293][T13603] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2578.735258][T13603] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2578.743226][T13603] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2578.751204][T13603] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2578.759195][T13608] CPU: 0 PID: 13608 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2578.767090][T13608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2578.777163][T13608] Call Trace: [ 2578.780472][T13608] dump_stack+0x172/0x1f0 [ 2578.784846][T13608] should_fail.cold+0xa/0x15 [ 2578.789446][T13608] ? fault_create_debugfs_attr+0x180/0x180 [ 2578.795261][T13608] ? ___might_sleep+0x163/0x2c0 [ 2578.800124][T13608] __should_failslab+0x121/0x190 [ 2578.805071][T13608] should_failslab+0x9/0x14 [ 2578.809575][T13608] __kmalloc+0x2e0/0x770 [ 2578.813818][T13608] ? __local_bh_enable_ip+0x15a/0x270 [ 2578.819196][T13608] ? lock_sock_nested+0xe2/0x120 [ 2578.824134][T13608] ? __local_bh_enable_ip+0x15a/0x270 [ 2578.829507][T13608] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2578.834798][T13608] ? lock_sock_nested+0x9a/0x120 [ 2578.839738][T13608] ? sock_kmalloc+0xc6/0x120 [ 2578.844337][T13608] sock_kmalloc+0xc6/0x120 [ 2578.848781][T13608] hash_alloc_result.part.0+0x95/0x110 [ 2578.854246][T13608] hash_sendpage+0x7a7/0x9d0 [ 2578.858845][T13608] hash_sendpage_nokey+0x94/0xa0 [ 2578.863798][T13608] kernel_sendpage+0x92/0xf0 [ 2578.868388][T13608] ? hash_check_key.isra.0+0x230/0x230 [ 2578.873854][T13608] sock_sendpage+0x8b/0xc0 [ 2578.878283][T13608] pipe_to_sendpage+0x296/0x360 [ 2578.883137][T13608] ? kernel_sendpage+0xf0/0xf0 [ 2578.887906][T13608] ? direct_splice_actor+0x190/0x190 [ 2578.893194][T13608] ? __put_page+0xa7/0xe0 [ 2578.897529][T13608] ? anon_pipe_buf_release+0x1c6/0x270 [ 2578.902995][T13608] __splice_from_pipe+0x397/0x7d0 [ 2578.908029][T13608] ? direct_splice_actor+0x190/0x190 [ 2578.916454][T13608] ? direct_splice_actor+0x190/0x190 [ 2578.921741][T13608] splice_from_pipe+0x108/0x170 [ 2578.926601][T13608] ? splice_shrink_spd+0xd0/0xd0 [ 2578.931552][T13608] ? apparmor_file_permission+0x25/0x30 [ 2578.937106][T13608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2578.943348][T13608] ? security_file_permission+0x8f/0x380 [ 2578.948985][T13608] generic_splice_sendpage+0x3c/0x50 [ 2578.954272][T13608] ? splice_from_pipe+0x170/0x170 [ 2578.959299][T13608] do_splice+0x708/0x1410 [ 2578.963648][T13608] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2578.968762][T13608] ? __fget_light+0x1a9/0x230 [ 2578.973433][T13608] __x64_sys_splice+0x2c6/0x330 [ 2578.978290][T13608] do_syscall_64+0xfa/0x760 [ 2578.982802][T13608] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2578.988685][T13608] RIP: 0033:0x459f49 [ 2578.992560][T13608] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2579.012139][T13608] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2579.020528][T13608] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2579.028648][T13608] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2579.036651][T13608] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2579.044606][T13608] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2579.052578][T13608] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:30:51 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:51 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x4000) 23:30:51 executing program 2 (fault-call:10 fault-nth:8): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:51 executing program 1 (fault-call:11 fault-nth:7): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:51 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r2, 0x0, 0x100000000000a, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) pipe(&(0x7f00000002c0)) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000600)={@in6={{0xa, 0x4e24, 0x4, @rand_addr="6672b070d0bd69ab618c6ebaf6c1a184", 0x8000000008001}}, 0x0, 0x1, 0x0, "0d77bded71253389e47145b71f2226c0b6950feba57b7d52d9e6eb58099b602e4849230196dafe09c25ed1d5e1e83b31ea4dceb9c93607a40f8dd4958a31b684282e4f742500c7a3eff599c03d518d10"}, 0x2d8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7, 0x1, 0x0, 0x2, 0x80, 0x845}, &(0x7f0000000040)=0x20) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000004c0)={0x0, 0x8}, 0x8) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, &(0x7f0000000100)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000080)={@in={{0x2, 0x0, @local}}, 0x0, 0x6, 0x0, "95bf6c49c43ac830daea8382e2a52cd038b82ce6eff5d84cde7afc1fa5b191d001c5a33ef1ff783def9e21ead571577b4247b5f55940ec527e36b67b939eb2a97e0eb9c3c87fa09a1054c35c37ecb223"}, 0xd8) setsockopt$inet_int(r4, 0x0, 0x0, 0x0, 0x0) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r6, 0x0, 0x100000000000a, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000440), &(0x7f0000000480)=0xc) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0xde) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) syz_emit_ethernet(0xb0aaf56786b8c234, 0x0, 0x0) ioctl$sock_netrom_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000003c0)={0x0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xf}}, {0x2, 0x4e23, @broadcast}, {0x2, 0x4e20, @multicast1}, 0x20, 0x0, 0x0, 0x0, 0x7ff, &(0x7f0000000300)='hsr0\x00', 0x5, 0x1ff, 0x1000}) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x5) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r7, 0x11, 0x1, &(0x7f0000000340)=""/40, &(0x7f0000000380)=0x28) sendto$inet(r4, 0x0, 0x0, 0x400200007fe, &(0x7f0000000180)={0x2, 0x10084e23, @local}, 0x10) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(nhpoly1305-sse2,xchacha20-simd)\x00\x00\xff\xff\xff\xff\xa0\x00\x80\x00'}, 0x58) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(nhpoly1305-sse2,xchacha20-simd)\x00\x00\xff\xff\xff\xff\xa0\x00\x80\x00'}, 0x58) close(r9) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'authencesn(nhpoly1305-sse2,xchacha20-simd)\x00\x00\xff\xff\xff\xff\xa0\x00\x80\x00'}, 0x58) write$binfmt_elf64(r4, &(0x7f00000016c0)=ANY=[@ANYRES64, @ANYRESDEC=r10, @ANYRES16], 0x1e) [ 2579.377040][T13633] FAULT_INJECTION: forcing a failure. [ 2579.377040][T13633] name failslab, interval 1, probability 0, space 0, times 0 [ 2579.393984][T13634] FAULT_INJECTION: forcing a failure. [ 2579.393984][T13634] name failslab, interval 1, probability 0, space 0, times 0 [ 2579.422955][T13633] CPU: 1 PID: 13633 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2579.430881][T13633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2579.440939][T13633] Call Trace: [ 2579.444233][T13633] dump_stack+0x172/0x1f0 [ 2579.448567][T13633] should_fail.cold+0xa/0x15 [ 2579.453162][T13633] ? fault_create_debugfs_attr+0x180/0x180 [ 2579.458965][T13633] ? ___might_sleep+0x163/0x2c0 [ 2579.463814][T13633] __should_failslab+0x121/0x190 [ 2579.468748][T13633] should_failslab+0x9/0x14 [ 2579.473259][T13633] __kmalloc+0x2e0/0x770 [ 2579.477518][T13633] ? __local_bh_enable_ip+0x15a/0x270 [ 2579.482895][T13633] ? lock_sock_nested+0xe2/0x120 [ 2579.487836][T13633] ? __local_bh_enable_ip+0x15a/0x270 [ 2579.493222][T13633] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2579.498524][T13633] ? lock_sock_nested+0x9a/0x120 [ 2579.503475][T13633] ? sock_kmalloc+0xc6/0x120 [ 2579.508088][T13633] sock_kmalloc+0xc6/0x120 [ 2579.512512][T13633] hash_alloc_result.part.0+0x95/0x110 [ 2579.517971][T13633] hash_sendpage+0x7a7/0x9d0 [ 2579.522561][T13633] hash_sendpage_nokey+0x94/0xa0 [ 2579.527528][T13633] kernel_sendpage+0x92/0xf0 [ 2579.532119][T13633] ? hash_check_key.isra.0+0x230/0x230 [ 2579.537582][T13633] sock_sendpage+0x8b/0xc0 [ 2579.542000][T13633] pipe_to_sendpage+0x296/0x360 [ 2579.546850][T13633] ? kernel_sendpage+0xf0/0xf0 [ 2579.551611][T13633] ? direct_splice_actor+0x190/0x190 [ 2579.556893][T13633] ? __put_page+0xa7/0xe0 [ 2579.561221][T13633] ? anon_pipe_buf_release+0x1c6/0x270 [ 2579.566696][T13633] __splice_from_pipe+0x397/0x7d0 [ 2579.571727][T13633] ? direct_splice_actor+0x190/0x190 [ 2579.577032][T13633] ? direct_splice_actor+0x190/0x190 [ 2579.582326][T13633] splice_from_pipe+0x108/0x170 [ 2579.587179][T13633] ? splice_shrink_spd+0xd0/0xd0 [ 2579.593252][T13633] ? apparmor_file_permission+0x25/0x30 [ 2579.598803][T13633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2579.605043][T13633] ? security_file_permission+0x8f/0x380 [ 2579.610674][T13633] generic_splice_sendpage+0x3c/0x50 [ 2579.615962][T13633] ? splice_from_pipe+0x170/0x170 [ 2579.620988][T13633] do_splice+0x708/0x1410 [ 2579.625337][T13633] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2579.630455][T13633] ? __fget_light+0x1a9/0x230 [ 2579.635132][T13633] __x64_sys_splice+0x2c6/0x330 [ 2579.639986][T13633] do_syscall_64+0xfa/0x760 [ 2579.644496][T13633] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2579.650379][T13633] RIP: 0033:0x459f49 [ 2579.654291][T13633] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2579.673883][T13633] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2579.682286][T13633] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2579.690251][T13633] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2579.698216][T13633] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2579.706181][T13633] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2579.714156][T13633] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2579.722164][T13634] CPU: 0 PID: 13634 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2579.730058][T13634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2579.740115][T13634] Call Trace: [ 2579.743516][T13634] dump_stack+0x172/0x1f0 [ 2579.747862][T13634] should_fail.cold+0xa/0x15 [ 2579.752588][T13634] ? fault_create_debugfs_attr+0x180/0x180 [ 2579.758421][T13634] ? ___might_sleep+0x163/0x2c0 [ 2579.763289][T13634] __should_failslab+0x121/0x190 [ 2579.768242][T13634] should_failslab+0x9/0x14 [ 2579.772749][T13634] __kmalloc+0x2e0/0x770 [ 2579.776997][T13634] ? __local_bh_enable_ip+0x15a/0x270 [ 2579.782369][T13634] ? lock_sock_nested+0xe2/0x120 [ 2579.787306][T13634] ? __local_bh_enable_ip+0x15a/0x270 [ 2579.792683][T13634] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2579.797972][T13634] ? lock_sock_nested+0x9a/0x120 [ 2579.802908][T13634] ? sock_kmalloc+0xc6/0x120 [ 2579.807502][T13634] sock_kmalloc+0xc6/0x120 [ 2579.811928][T13634] hash_alloc_result.part.0+0x95/0x110 [ 2579.817395][T13634] hash_sendpage+0x7a7/0x9d0 [ 2579.821999][T13634] hash_sendpage_nokey+0x94/0xa0 [ 2579.826950][T13634] kernel_sendpage+0x92/0xf0 [ 2579.831550][T13634] ? hash_check_key.isra.0+0x230/0x230 [ 2579.837017][T13634] sock_sendpage+0x8b/0xc0 [ 2579.841443][T13634] pipe_to_sendpage+0x296/0x360 [ 2579.846299][T13634] ? kernel_sendpage+0xf0/0xf0 [ 2579.851080][T13634] ? direct_splice_actor+0x190/0x190 [ 2579.856375][T13634] ? __put_page+0xa7/0xe0 [ 2579.860722][T13634] ? anon_pipe_buf_release+0x1c6/0x270 [ 2579.866191][T13634] __splice_from_pipe+0x397/0x7d0 [ 2579.871223][T13634] ? direct_splice_actor+0x190/0x190 [ 2579.876517][T13634] ? direct_splice_actor+0x190/0x190 [ 2579.881809][T13634] splice_from_pipe+0x108/0x170 [ 2579.886660][T13634] ? splice_shrink_spd+0xd0/0xd0 [ 2579.891615][T13634] ? apparmor_file_permission+0x25/0x30 [ 2579.897174][T13634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2579.903417][T13634] ? security_file_permission+0x8f/0x380 [ 2579.909064][T13634] generic_splice_sendpage+0x3c/0x50 [ 2579.914357][T13634] ? splice_from_pipe+0x170/0x170 [ 2579.919393][T13634] do_splice+0x708/0x1410 [ 2579.923740][T13634] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2579.928860][T13634] ? __fget_light+0x1a9/0x230 [ 2579.933533][T13634] __x64_sys_splice+0x2c6/0x330 [ 2579.938391][T13634] do_syscall_64+0xfa/0x760 [ 2579.942912][T13634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2579.948809][T13634] RIP: 0033:0x459f49 [ 2579.952715][T13634] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2579.972311][T13634] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2579.980700][T13634] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2579.988649][T13634] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2579.996631][T13634] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2580.004584][T13634] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2580.012538][T13634] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:30:57 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:57 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x7f00) 23:30:57 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000480)="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", 0x1bf}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000640)={'filter\x00', 0x7, 0x4, 0x4a8, 0x160, 0x0, 0x0, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x160}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x704c, 0x32, 0x4, 0x1, 0x0, "2d1a1f2bdedcafd1303eef7b16d3d3c6e83245eaed4a267216135625798e064abd58f2133d0fedf11808c23e784e010999ff0f6585fb9cc850d4bdbbc409d21d"}}}, {{@arp={@loopback, @dev={0xac, 0x14, 0x14, 0x15}, 0x0, 0xff, @empty, {[0x0, 0xff, 0xff, 0xff, 0x181]}, @empty, {[0x0, 0x0, 0x1fe, 0x101, 0xff]}, 0x3, 0x5, 0x7, 0xa3b6, 0x9, 0xfff, 'team0\x00', 'gre0\x00', {0xff}, {0xff}, 0x0, 0x1}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback, @broadcast, 0x1}}}, {{@uncond, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x5, 0x200, 0x600000}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f8) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:57 executing program 1 (fault-call:11 fault-nth:8): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:57 executing program 2 (fault-call:10 fault-nth:9): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) recvfrom$inet6(r0, &(0x7f0000000080)=""/181, 0xb5, 0x40, &(0x7f0000000000)={0xa, 0x4e22, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r2 = socket(0x1, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x8924, &(0x7f0000000040)={'bond0\x00\x00\x00\x00\x06\x00\x00\x01\x00', @ifru_settings={0x1, 0x8, @fr_pvc=0x0}}) 23:30:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0xffffffffffffffe1, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000002300470800000000100000000100aceac20d0000000000008683c229f5d5d9ff4559cfd7c5d4f9f2a05ac843fb1a9b3a6685c4b44017a681e8efbb01d8bfb77b731e8b82ce5d623847992a0f4d81a01a99224f82d24887d5b0063802779a5f0069336edc42c99c8fc0b4e6a88bda19fdb00354ac5718189a98704932e5763dcc7de3"], 0x14}}, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) ioctl$sock_netdev_private(r1, 0x8921, &(0x7f0000000000)) close(r1) r3 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r3, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r3, 0x541b, &(0x7f0000000040)) [ 2584.894578][T13678] FAULT_INJECTION: forcing a failure. [ 2584.894578][T13678] name failslab, interval 1, probability 0, space 0, times 0 [ 2584.894753][T13677] FAULT_INJECTION: forcing a failure. [ 2584.894753][T13677] name failslab, interval 1, probability 0, space 0, times 0 [ 2584.907974][T13678] CPU: 1 PID: 13678 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2584.927867][T13678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2584.937915][T13678] Call Trace: [ 2584.941203][T13678] dump_stack+0x172/0x1f0 [ 2584.945536][T13678] should_fail.cold+0xa/0x15 [ 2584.950131][T13678] ? fault_create_debugfs_attr+0x180/0x180 [ 2584.955943][T13678] ? ___might_sleep+0x163/0x2c0 [ 2584.960796][T13678] __should_failslab+0x121/0x190 [ 2584.965734][T13678] should_failslab+0x9/0x14 [ 2584.970239][T13678] __kmalloc+0x2e0/0x770 [ 2584.974475][T13678] ? __local_bh_enable_ip+0x15a/0x270 [ 2584.979845][T13678] ? lock_sock_nested+0xe2/0x120 [ 2584.984775][T13678] ? __local_bh_enable_ip+0x15a/0x270 [ 2584.990144][T13678] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2584.995436][T13678] ? lock_sock_nested+0x9a/0x120 [ 2585.000367][T13678] ? sock_kmalloc+0xc6/0x120 [ 2585.004953][T13678] sock_kmalloc+0xc6/0x120 [ 2585.009380][T13678] hash_alloc_result.part.0+0x95/0x110 [ 2585.014839][T13678] hash_sendpage+0x7a7/0x9d0 [ 2585.019432][T13678] hash_sendpage_nokey+0x94/0xa0 [ 2585.024370][T13678] kernel_sendpage+0x92/0xf0 [ 2585.028957][T13678] ? hash_check_key.isra.0+0x230/0x230 [ 2585.034419][T13678] sock_sendpage+0x8b/0xc0 [ 2585.038840][T13678] pipe_to_sendpage+0x296/0x360 [ 2585.043687][T13678] ? kernel_sendpage+0xf0/0xf0 [ 2585.048452][T13678] ? direct_splice_actor+0x190/0x190 [ 2585.053736][T13678] ? __put_page+0xa7/0xe0 [ 2585.058062][T13678] ? anon_pipe_buf_release+0x1c6/0x270 [ 2585.063523][T13678] __splice_from_pipe+0x397/0x7d0 [ 2585.068551][T13678] ? direct_splice_actor+0x190/0x190 [ 2585.073840][T13678] ? direct_splice_actor+0x190/0x190 [ 2585.079126][T13678] splice_from_pipe+0x108/0x170 [ 2585.083988][T13678] ? splice_shrink_spd+0xd0/0xd0 [ 2585.088937][T13678] ? apparmor_file_permission+0x25/0x30 [ 2585.094483][T13678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2585.100728][T13678] ? security_file_permission+0x8f/0x380 [ 2585.106362][T13678] generic_splice_sendpage+0x3c/0x50 [ 2585.111647][T13678] ? splice_from_pipe+0x170/0x170 [ 2585.116670][T13678] do_splice+0x708/0x1410 [ 2585.121008][T13678] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2585.126122][T13678] ? __fget_light+0x1a9/0x230 [ 2585.130799][T13678] __x64_sys_splice+0x2c6/0x330 [ 2585.135657][T13678] do_syscall_64+0xfa/0x760 [ 2585.140166][T13678] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2585.146053][T13678] RIP: 0033:0x459f49 [ 2585.149949][T13678] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2585.169768][T13678] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2585.178187][T13678] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2585.186162][T13678] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2585.194134][T13678] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2585.202101][T13678] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2585.210068][T13678] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2585.220090][T13677] CPU: 0 PID: 13677 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2585.228003][T13677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2585.238072][T13677] Call Trace: [ 2585.241347][T13677] dump_stack+0x172/0x1f0 [ 2585.245660][T13677] should_fail.cold+0xa/0x15 [ 2585.250246][T13677] ? fault_create_debugfs_attr+0x180/0x180 [ 2585.256035][T13677] ? ___might_sleep+0x163/0x2c0 [ 2585.260869][T13677] __should_failslab+0x121/0x190 [ 2585.265786][T13677] should_failslab+0x9/0x14 [ 2585.270268][T13677] __kmalloc+0x2e0/0x770 [ 2585.274489][T13677] ? __local_bh_enable_ip+0x15a/0x270 [ 2585.279842][T13677] ? lock_sock_nested+0xe2/0x120 [ 2585.284766][T13677] ? __local_bh_enable_ip+0x15a/0x270 [ 2585.290126][T13677] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2585.295402][T13677] ? lock_sock_nested+0x9a/0x120 [ 2585.300316][T13677] ? sock_kmalloc+0xc6/0x120 [ 2585.304907][T13677] sock_kmalloc+0xc6/0x120 [ 2585.309319][T13677] hash_alloc_result.part.0+0x95/0x110 [ 2585.314755][T13677] hash_sendpage+0x7a7/0x9d0 [ 2585.319330][T13677] hash_sendpage_nokey+0x94/0xa0 [ 2585.324257][T13677] kernel_sendpage+0x92/0xf0 [ 2585.328834][T13677] ? hash_check_key.isra.0+0x230/0x230 [ 2585.334272][T13677] sock_sendpage+0x8b/0xc0 [ 2585.338669][T13677] pipe_to_sendpage+0x296/0x360 [ 2585.343500][T13677] ? kernel_sendpage+0xf0/0xf0 [ 2585.348242][T13677] ? direct_splice_actor+0x190/0x190 [ 2585.353505][T13677] ? __put_page+0xa7/0xe0 [ 2585.357814][T13677] ? anon_pipe_buf_release+0x1c6/0x270 [ 2585.363253][T13677] __splice_from_pipe+0x397/0x7d0 [ 2585.368269][T13677] ? direct_splice_actor+0x190/0x190 [ 2585.373539][T13677] ? direct_splice_actor+0x190/0x190 [ 2585.378799][T13677] splice_from_pipe+0x108/0x170 [ 2585.383633][T13677] ? splice_shrink_spd+0xd0/0xd0 [ 2585.388552][T13677] ? apparmor_file_permission+0x25/0x30 [ 2585.394078][T13677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2585.400298][T13677] ? security_file_permission+0x8f/0x380 [ 2585.405920][T13677] generic_splice_sendpage+0x3c/0x50 [ 2585.411186][T13677] ? splice_from_pipe+0x170/0x170 [ 2585.416189][T13677] do_splice+0x708/0x1410 [ 2585.420532][T13677] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2585.425644][T13677] ? __fget_light+0x1a9/0x230 [ 2585.430304][T13677] __x64_sys_splice+0x2c6/0x330 [ 2585.435140][T13677] do_syscall_64+0xfa/0x760 [ 2585.439635][T13677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2585.445506][T13677] RIP: 0033:0x459f49 [ 2585.449385][T13677] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2585.469080][T13677] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2585.477497][T13677] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2585.485459][T13677] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2585.493413][T13677] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2585.501368][T13677] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2585.509333][T13677] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:30:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x8, 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xa8, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='//z0\xff', 0x1c0) socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x15000000000000, 0x31, 0x0, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) socket(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x15000000000000, 0x31, 0x0, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc020662a, &(0x7f00000000c0)={0x4000000, r2, 0x1800}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc020662a, &(0x7f00000000c0)={0x4000000, r4, 0x1800}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc020662a, &(0x7f00000000c0)={0x4000000, r6, 0x1800}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r7, &(0x7f0000000000), 0xfffffea6) openat$cgroup_ro(r7, 0x0, 0xb00000000065808, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r8 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_int(r8, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4, 0x80000000, @empty, 0xc}, 0x0) socket$pppoe(0x18, 0x1, 0x0) epoll_create(0x0) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x15000000000000, 0x31, 0x0, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x15000000000000, 0x31, 0x0, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x2ab) socket(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x15000000000000, 0x31, 0x0, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x15000000000000, 0x31, 0x0, 0x0) bind$x25(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) accept4$ax25(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x15000000000000, 0x31, 0x0, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffecb) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x15000000000000, 0x31, 0x0, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) epoll_create(0x0) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x15000000000000, 0x31, 0x0, 0x0) bind$x25(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) socket(0x0, 0x0, 0x0) bind$x25(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x2a6) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) getuid() getgid() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x15000000000000, 0x31, 0x0, 0x0) bind$x25(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getgid() ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getuid() syz_init_net_socket$ax25(0x3, 0x0, 0x0) getpid() getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$rxrpc(0x21, 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x15000000000000, 0x31, 0x0, 0x0) bind$x25(0xffffffffffffffff, 0x0, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r9, 0x0) setsockopt$inet6_int(r9, 0x29, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x15000000000000, 0x31, 0x0, 0x0) bind$x25(0xffffffffffffffff, 0x0, 0x0) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x15000000000000, 0x31, 0x0, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x15000000000000, 0x31, 0x0, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) socket(0x0, 0x0, 0x0) bind$x25(0xffffffffffffffff, 0x0, 0x0) 23:30:58 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x1000000) 23:30:58 executing program 1 (fault-call:11 fault-nth:9): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:58 executing program 2 (fault-call:10 fault-nth:10): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:30:58 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) accept(r0, &(0x7f0000000340)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, &(0x7f00000003c0)=0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0xfffffea6) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000480)="e9ce7140e45ceb09c5aa6460f33662d99e08793be56cf58227d17f4efd942fa0fca8f4f2c9ec1eb948acfe6569f0ee07124141fbbd75a2124bb91fbe929a3d0899e0b980fcbb761401189c37bfc8e8e6023b6afc42deaa20b292df2ad5d8564eaa54bc96a7f9a5da4de4592a22e537aca07efd113b6a944231c795d1fc31ac971b27445ab55549dd33b8b11c62dab32aa4277fcf48974efc7a7e7ce1067f6d6fa38ae199beff16e8e3491a273f53e61e3d1868a55c64ece4990f28d3fe34aa919e18ae69289ab3ca0a15d536d04942aefd844881cd0835faa978a7d242dc6d9e551ae2d9ced87e96899c55d1af36ad902cfb1e241996a15eed1236e1126f", 0xffffffffffffff16) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) r6 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$inet6_opts(r6, 0x29, 0x3b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000400130000000000010005020000000000000000000009000000000000040100efff"], 0x28) sendmmsg(r6, &(0x7f00000092c0), 0x400000000000064, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) getsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) splice(r7, 0x0, r8, 0x0, 0x100000000ffe0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r8, 0x0, 0x14, &(0x7f0000000080)=':cpuset#+vboxnet0^,\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b38e47bf070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000001940)={0x0, 0x0, 0x0}, 0x0) sendmmsg$unix(r12, &(0x7f0000002140)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x8000}, {&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001680), 0x0, &(0x7f00000019c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r14}}}], 0x40, 0x4040}, {&(0x7f0000001a00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001c80)=[{&(0x7f0000001a80)="74b2333c0879e92e6a9f6fce1e1457d06e2f6b2715fd3d8085c97571bb8664ad1ec668fdb56e3229725116380fbbcfafe5897bc66f76edb46fbc1b66bb267b50cf06e72443681eb8e3281c6b21e5a00f7e7f4e4ee4839fdb30d462d16b19d571d38448cbd65e333c1f5b4b6c555fc6", 0x6f}, {&(0x7f0000001c00)="6060bd2c333b69e29e012cde11fc8b1d528c98e25e09a377b5e73ba936ce0187bcf14aa920037a65d0da3a002eb684ba6986bc965ff551993259186700e88405e12e9ad28336bfc147aecab28eedd7e198576c81", 0x54}], 0x2, &(0x7f0000002080)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000bd000000000000000110000002010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r11, @ANYRES32=r13, @ANYRES32=r13, @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB="2c000000000000000100000001000040", @ANYRES32=r11, @ANYRES32=r13, @ANYRES32=r13, @ANYRES32=r11, @ANYRES32, @ANYRES32=r11, @ANYRES32=r13, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x20000000}], 0x3, 0x40000) setsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000280)={r9, r10, r14}, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x802084}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)={0x16c, 0xb, 0xa, 0x200, 0x70bd29, 0x25dfdbfc, {0xa, 0x0, 0x1}, [@generic="b8513529ede0d63a93143e3b715152f271ef8e3be88fc97b66f85c7119a62278e87c1d6697ee5f9c55710477d70eb6a43feb3a264418841c2f970100436ac71183f718c375a2aed26345d775a0a494ebc3b42a9041e03f4ce8d67446f944f64663e9c8c321404331f1836dc5d8", @generic="463f39a52c7cb6fddf611e5e84079f2f1e57d96edd3bbea99f97063533fc5fba07341c8dd4063a5bd3f465a1fba740b11bb771b1a3c103cffdf8e355c1badccd2e19c72bffe6c2aba5d6dd3cc669c4cf77ce4184dcd9bd5a5f0fb369c222518fa0846ed342e0451d9a8719033a632afc796ef44b106107bc7b1f05577862dfb32aab5080d5d5b72d6228e288ef97f9d972956fbd5e6cf8d8b6c1f9bf9633ec03caa45bfbd35240ca71f5eddc44eb8d375f6672b50d68ddc60f9598581a0d99ec", @typed={0x8, 0x21, @ipv4=@multicast2}, @generic="097419e2fe86df64d616b76c9f9ae1fceac4cdfa0c1adc12da", @typed={0x8, 0x30, @uid=r10}]}, 0x16c}, 0x1, 0x0, 0x0, 0x4040850}, 0x2008450) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2585.843795][T13706] FAULT_INJECTION: forcing a failure. [ 2585.843795][T13706] name failslab, interval 1, probability 0, space 0, times 0 [ 2585.850128][T13707] FAULT_INJECTION: forcing a failure. [ 2585.850128][T13707] name failslab, interval 1, probability 0, space 0, times 0 [ 2585.862354][T13706] CPU: 0 PID: 13706 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2585.877207][T13706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2585.887263][T13706] Call Trace: [ 2585.890553][T13706] dump_stack+0x172/0x1f0 [ 2585.894887][T13706] should_fail.cold+0xa/0x15 [ 2585.899478][T13706] ? fault_create_debugfs_attr+0x180/0x180 [ 2585.905285][T13706] ? ___might_sleep+0x163/0x2c0 [ 2585.910136][T13706] __should_failslab+0x121/0x190 [ 2585.915076][T13706] should_failslab+0x9/0x14 [ 2585.919584][T13706] __kmalloc+0x2e0/0x770 [ 2585.923823][T13706] ? __local_bh_enable_ip+0x15a/0x270 [ 2585.929205][T13706] ? lock_sock_nested+0xe2/0x120 [ 2585.934141][T13706] ? __local_bh_enable_ip+0x15a/0x270 [ 2585.939508][T13706] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2585.944782][T13706] ? lock_sock_nested+0x9a/0x120 [ 2585.949709][T13706] ? sock_kmalloc+0xc6/0x120 [ 2585.954295][T13706] sock_kmalloc+0xc6/0x120 [ 2585.958711][T13706] hash_alloc_result.part.0+0x95/0x110 [ 2585.964173][T13706] hash_sendpage+0x7a7/0x9d0 [ 2585.968764][T13706] hash_sendpage_nokey+0x94/0xa0 [ 2585.973700][T13706] kernel_sendpage+0x92/0xf0 [ 2585.978281][T13706] ? hash_check_key.isra.0+0x230/0x230 [ 2585.983731][T13706] sock_sendpage+0x8b/0xc0 [ 2585.988148][T13706] pipe_to_sendpage+0x296/0x360 [ 2585.992990][T13706] ? kernel_sendpage+0xf0/0xf0 [ 2585.997750][T13706] ? direct_splice_actor+0x190/0x190 [ 2586.003030][T13706] ? __put_page+0xa7/0xe0 [ 2586.007351][T13706] ? anon_pipe_buf_release+0x1c6/0x270 [ 2586.012815][T13706] __splice_from_pipe+0x397/0x7d0 [ 2586.017840][T13706] ? direct_splice_actor+0x190/0x190 [ 2586.023128][T13706] ? direct_splice_actor+0x190/0x190 [ 2586.028405][T13706] splice_from_pipe+0x108/0x170 [ 2586.033252][T13706] ? splice_shrink_spd+0xd0/0xd0 [ 2586.038188][T13706] ? apparmor_file_permission+0x25/0x30 [ 2586.043730][T13706] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2586.049966][T13706] ? security_file_permission+0x8f/0x380 [ 2586.055597][T13706] generic_splice_sendpage+0x3c/0x50 [ 2586.060879][T13706] ? splice_from_pipe+0x170/0x170 [ 2586.065901][T13706] do_splice+0x708/0x1410 [ 2586.070235][T13706] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2586.075342][T13706] ? __fget_light+0x1a9/0x230 [ 2586.080021][T13706] __x64_sys_splice+0x2c6/0x330 [ 2586.084874][T13706] do_syscall_64+0xfa/0x760 [ 2586.089380][T13706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2586.095262][T13706] RIP: 0033:0x459f49 [ 2586.099152][T13706] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2586.118762][T13706] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2586.127168][T13706] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2586.135131][T13706] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2586.143100][T13706] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2586.151066][T13706] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2586.159036][T13706] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2586.167029][T13707] CPU: 1 PID: 13707 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2586.174927][T13707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2586.184981][T13707] Call Trace: [ 2586.188285][T13707] dump_stack+0x172/0x1f0 [ 2586.192748][T13707] should_fail.cold+0xa/0x15 [ 2586.197353][T13707] ? fault_create_debugfs_attr+0x180/0x180 [ 2586.203173][T13707] ? ___might_sleep+0x163/0x2c0 [ 2586.208036][T13707] __should_failslab+0x121/0x190 [ 2586.212982][T13707] should_failslab+0x9/0x14 [ 2586.217492][T13707] __kmalloc+0x2e0/0x770 [ 2586.221740][T13707] ? __local_bh_enable_ip+0x15a/0x270 [ 2586.227114][T13707] ? lock_sock_nested+0xe2/0x120 [ 2586.232054][T13707] ? __local_bh_enable_ip+0x15a/0x270 [ 2586.237435][T13707] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2586.242724][T13707] ? lock_sock_nested+0x9a/0x120 [ 2586.247671][T13707] ? sock_kmalloc+0xc6/0x120 [ 2586.252261][T13707] sock_kmalloc+0xc6/0x120 [ 2586.256674][T13707] hash_alloc_result.part.0+0x95/0x110 [ 2586.262169][T13707] hash_sendpage+0x7a7/0x9d0 [ 2586.266752][T13707] hash_sendpage_nokey+0x94/0xa0 [ 2586.271691][T13707] kernel_sendpage+0x92/0xf0 [ 2586.276285][T13707] ? hash_check_key.isra.0+0x230/0x230 [ 2586.281741][T13707] sock_sendpage+0x8b/0xc0 [ 2586.286144][T13707] pipe_to_sendpage+0x296/0x360 [ 2586.290974][T13707] ? kernel_sendpage+0xf0/0xf0 [ 2586.295735][T13707] ? direct_splice_actor+0x190/0x190 [ 2586.301030][T13707] ? __put_page+0xa7/0xe0 [ 2586.305365][T13707] ? anon_pipe_buf_release+0x1c6/0x270 [ 2586.310808][T13707] __splice_from_pipe+0x397/0x7d0 [ 2586.315827][T13707] ? direct_splice_actor+0x190/0x190 [ 2586.321122][T13707] ? direct_splice_actor+0x190/0x190 [ 2586.326404][T13707] splice_from_pipe+0x108/0x170 [ 2586.331249][T13707] ? splice_shrink_spd+0xd0/0xd0 [ 2586.336187][T13707] ? apparmor_file_permission+0x25/0x30 [ 2586.341730][T13707] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2586.347949][T13707] ? security_file_permission+0x8f/0x380 [ 2586.353562][T13707] generic_splice_sendpage+0x3c/0x50 [ 2586.358840][T13707] ? splice_from_pipe+0x170/0x170 [ 2586.363861][T13707] do_splice+0x708/0x1410 [ 2586.368189][T13707] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2586.373283][T13707] ? __fget_light+0x1a9/0x230 [ 2586.377962][T13707] __x64_sys_splice+0x2c6/0x330 [ 2586.382811][T13707] do_syscall_64+0xfa/0x760 [ 2586.387303][T13707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2586.393173][T13707] RIP: 0033:0x459f49 [ 2586.397059][T13707] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2586.416666][T13707] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2586.425082][T13707] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2586.433046][T13707] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2586.441010][T13707] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2586.448974][T13707] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2586.456943][T13707] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:31:05 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bdfe47bf070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000000)=0x2000000051, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r2, &(0x7f00000003c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r2, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000705000000000000008000000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff00000000090001006866736300000000fbff020000000000"], 0x38}}, 0x0) sendmmsg(r1, &(0x7f0000002880)=[{{&(0x7f0000000040)=@tipc=@nameseq={0x1e, 0x1, 0x1, {0x0, 0x1}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="bb7bd7a9f509c7e5086cba3d27aca6820c3e548eb773a8725772c5ffb982bfb29f767ab45368436c8628b4", 0x2b}, {&(0x7f00000001c0)="464f432861e9a0174517364882f2f7adb610629e7b2730edff17872dfef96220d912e0f0a9640ebea22f474eb8f2aaa5b579b491f9467719ae24263d1df00271e3aebe7ca102e4cfc2cfab4069dd48bae6abdbb7a2ec4e1722ef3f841842510b586b55f59ebdd53f3c5f15d3208b2aa2e0e7856db005b57fd1a86e1b8edeed91c9d365488fa5b4b9e75fe9782b893ad427cc949721cf62138f299419048429f6a681375a83107cae1bb4ebd611d7da98987133f85f012d4e96c6b3da59", 0xbd}, {&(0x7f0000000280)="a8edad65a0b6c8be4efdd16a6dc26d91fb8f20dcafa55a6633e0c76ce1a0b7265d4658b9a40e46898d5a679f22022cb1a80472454d5ec458cb95d560041d2476675c91f35261e46bb08dca843b182bc4604fdc4ae55287f7bf04825f90b91f70cefd38df25f005aa71d67c069a6065a3ef82b565f77e6808a6357facf71327b1ff09fe6566937a5c97fe956e37df07c1a087320a63f6cf144ee9410ab5a892960bbccc21e821269137aa8ffb86a8735f20d2e130e9", 0xb5}], 0x3, &(0x7f0000000340)=[{0xe8, 0x18c, 0xda39, "0de63d4f449e3b7332652972888e9096baae5aeeaed5f86e9360f6bf086b05a1345839e005b529424edd3be2cbd6590c2e9098c3979bbe78439f2653761013404b5dace653fcb655c76253e995c31fb4379acc9bf9bfb4f135bb7fb67d2dad7220665b175e578ca6814065e65f913961e2537757713d769dc48db613fb016f981714e66a3cd17420d04dff17c91df903413fcf0b0b61e39bf86ccfdc3e970638f10694d1b89c897910891af9cd8f7a423643c10d0c25fcc009f3aff2117afea745abb095e6649f7f791ab9fbbec81e2749774f9d4d11e4"}, {0x110, 0x118, 0xfffffff7, "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"}], 0x1f8}}, {{&(0x7f0000000540)=@caif=@rfm={0x25, 0xff, "cd19aee5c27e1d1c2447de4d80384ec3"}, 0x80, &(0x7f00000007c0)=[{&(0x7f00000005c0)="ee5b8cb8cf2766ba0afd00b4b57ec4e0bdd41209760e63165c4433a32c966d34d405aa4fba24671b0a045e471d994585a82a8d219226d29833a641458c87a61062ea09660b523a0830e9814bba1ca7e291705284c34fa48c1ac8327fe3f58c150c7a8fdceb9a93630edf9f9b608a66473ab0", 0x72}, {&(0x7f0000000640)="34e7ac09c525fe4b48f61fb1859507e622ddc4647388ea5a21aba00b7ec5abae5bb40e24183116bd0200a89e571998c880463c1470ab81857a26ff3c9fa620bb8cb87bc9544463bd917fd976a81c12bca5768383042f35c089d96ddc90e1b02cae5ccfc57bb3082d3f687393cc0cf87163c6e0d0f1c842a64fd4e1326dad76e138e69b65c2b993d452a0eb5750d6b8adc0efd79b311c53fa3e5a0734fc67b1b490305a69fc0e7ab25dc3709153bb76a8f5887dd05802fcc153e0e484", 0xbc}, {&(0x7f0000000700)="336bb85b1f18198acd4f5e4232fe73338fed6e1bb143cce90365149cf92b367b67cdddcf013e698063a4c754439ade628173186e6326f6337ee0ea89febbad8239a3afc8ad0714f6d5318afe3e5085de276c46675c18a71da9d5026dc9f7be06120604e976df92b3d6864e645c462243cbda84fd63cb3d4f95ecd12af3dc0741fac665b3522140a02d1d5ae7d4de636c74079fbe995c9aeb2484092469c865fca1a3ce0741970544b2d0fc949bec80c4219bac228bca2475bd7831d9", 0xbc}], 0x3, &(0x7f0000000800)=[{0x20, 0x100, 0x0, "bfd88e937449f9a28384"}], 0x20}}, {{&(0x7f0000000840)=@generic={0x0, "7fd4adf1de0da63eb8434a14a39377a7b2784af69e981271bab5cb110a263fb851ff6c3ac7637df6054e8f64b64287996ff0a962019ed71ae53239b212dc604e22ba12dd6ea76a74c3c70ec8d703f885e306a2ce88e7cc01f21fff2885852955a45471e58a75b297ca23caeb15be8fa90b67a7a1beb9cc0b4f32901ab732"}, 0x80, &(0x7f0000000900)=[{&(0x7f00000008c0)="fa057a0e9d", 0x5}], 0x1}}, {{&(0x7f0000000940)=@can={0x1d, r4}, 0x80, &(0x7f0000000c00)=[{&(0x7f00000009c0)="bb72e5ee6602e5ecd6da12dc8c37a0df00108a78a18717946e90dcc2ea75304796d1f71f7827557de73525c61889868ad7e423425018f302fb557e4687f3b555710730841c197085d987816c132f1503d18b440f542573a7090da4f6981ee770", 0x60}, {&(0x7f0000000a40)="d8c2944ed02d219cb821fd9fd96ffeafccfd80e1c5b8a78691b08f83fa9c13b919d09fd9c1e899c140394b2facf1f77e945fb033f8cf60d21cdce26a8001cd8240f06c332aff5afb6a3ead9fef505e", 0x4f}, {&(0x7f0000000ac0)="867079fddce01b84326ba45ffbd8ab334cb5f9f9dea55ea12bdc64877f517cc8de88f475e6b31eb07117fe6c162341faf47310ae3ad247a2485444e190c03af9f09299293da1c2e57534f0c4f08f183775dde5559044acf51eb56e436d35f777d10dffe1ac12bedcf5ff6c1ba1916e37e2e279215626470efae2ca5edd34ea411abd463d907646cbfd2390c5d765a6f604dd9803c815ee875efeade83f109b5dac0eb3e5c6b697dc4bf7fb4a73b9af6417030b26177d1cc9eef7d25026a824097cefd3d269529390f05acd150283b45598661dcad26a77c7764131c0e642b32d4b9efd279111f82c8dd208bce0e0f751fcb5fa4ea1b681bb", 0xf8}, {&(0x7f0000000bc0)="239b7008147961d34298366445d091e14fac2eb7ea2fdf927e8341d3925e08b32c9844c9348d", 0x26}], 0x4, &(0x7f0000000c40)=[{0x1010, 0x114, 0x0, "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"}, {0x90, 0x108, 0xd53, "637b4cb50369784210ff94de87fd1fe47828bca9cc65c33e39a4890abe2c5fecab291f232d1badbd3d8050d489ecbb5b3c022d006b12c7589d3396ba071733d6012466b39a5caa4e67ecf067ee5ceacfd561ba689b6a710b3b7edb4d2a98068f5bd18fb6b3906d61ae4ee4878c558599f575655ac045b91f4035429ea9278296"}, {0xe0, 0xb67c3976accffba6, 0x57, "aaf9801fe96c38354c73c0d72a337373362be8ecaf180380e1654688ce373a11a53cc56392700cbf6aace85a33dc591e1613a136c95c5245c96a4d750f520a56ac4db46041fad45cec0c288876b3baaa482642269f624454ecb56d0d8b5a60a50c89a76b50366234253598fe16e1a297259d6912cedbf88b7465d46ec38d83427e9c796ef61d119584f24368893baa14a4b567ab42fc448c2fd33d4503c39f25425c029fdd44008bc210b6342f07d43be5de7993674ab96775887b5461c5cdbd52a744b5716eea47f8"}, {0x98, 0x113, 0x0, "79a65132a77e56429cb20b732fffbe50a7cadeb434cbce2234bc8222065c8c4056ba78d37d9eb6da432b9f7487e72e9a507a6d20b6061b736eeb5394a1514b0d8885107ef0657afe0ec2f089fe273ac639d2607b2c70b1110ec0cafcc015a6612f6243e2dd53396ff0fa528c4ba3063969a412ff91007802da65197badee5f8a5cf1d95f"}], 0x1218}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e80)="d5be6e8cd9e3bab2fb63eaa26239", 0xe}, {&(0x7f0000001ec0)="4f0c7ecaa819f0ac15b1992601f4f91853ce32d9185cdca7f51880f9e49773f45a03895c17fef3e3d8bc9328b9d68d8e5bc826cfbf9b7e2bddb24f05e96d699033adbc8ae02f55821170a1ed2778da9a104f2f6fc46f273ef5b1ed3e8b124b8f31df3db522906a75d7638908948dc5c96a388cbb1e402373b6f5e5b8fbcca77138d21baae870caf7f962f1094e7309456fde61998e6d56258a9bd63cea70fe32b6a85ee953000415caca056e0764d5dab07f7026acc7f0207bf0fca0f9da5bed89908e830c55ef85f0e88d", 0xcb}], 0x2, &(0x7f0000002000)=[{0x20, 0xfc, 0x7ff, "e1ee5739e91b0daed6bd71634da0"}, {0x88, 0xf, 0x7, "c693d2b57b444fe9eb074616ddf548432e3a8afd6b805e818134d0523669e1d410e1b82fedbf82cd6ff4ea7e4a07503ebc59f9c840c4c8bbb030894739a3ef68f65efdc380ca67bd1374c7c935403664f63166b7b637a639ec3e5a7d3236ec9982924b20c96a16c1ad4fa0cfd1af7cb72319ad7b"}], 0xa8}}, {{&(0x7f00000020c0)=@l2={0x1f, 0x2, {0x3, 0x3, 0x2, 0x2, 0x44, 0x81}, 0x8, 0x7}, 0x80, &(0x7f0000002740)=[{&(0x7f0000002140)="ff2352904b36cbef084fa29ec56fef5cc25ffd5449d1ef81f476f4a0531822c8f9463e3dace5cf1c894edf2bd634a4b9bcb6b053bc78b8537d0e9961d63f5da12752d6d79a51032a603d7c3fd2a709d113c9492b5db6e1423370b4f60485471a74276e5685470381712f60ae98f34ee2ebf560f7abd242d6f39ca972917d6ddabfb9ce727b875c9dd9701b3db5", 0x8d}, {&(0x7f0000002200)="ed3784a8d50e652b3866db9bae3358c5c6b0f501bf0547b6c57dd322a95961ad232ca0ccef4017d6b30bde7ee7dd7b69505da72de556ae4b641004f55f3a41384a63fa592143fad25b0c94b617fc86379e840fa2fead233904dead90e68d1a1a4eebb290678ec2f353050f4da047c73b24aa992118188c2db1c4804b5334aec17a3eaf64dcda67ab2dbe7233083a4652e5caf48a1a133c270eb09435c4c6cf18adb2420ae41d1da138333650f6ce2e06abc505235d02e896b5169c07b7fbc9f878", 0xc1}, {&(0x7f0000002300)="d5cd08ac8949917d44e771d4d682d1ae01376761b35a1d7ce725003716152048b172d0930ff43bb69e1ee3376f0af5568df8f2c530feb871fcb4060ad6522980011e006b7fc8", 0x46}, {&(0x7f0000002380)="d0006597aaa9e7f575f08ad2a7e54f64d74205350e734b7a414e3c503a4366f55ed5a5fd0c17a8", 0x27}, {&(0x7f00000023c0)="0d1ef7391909e449fbc8d1dedcfe378c182d3821e6ad8f2700ba17d3ef43", 0x1e}, {&(0x7f0000002400)='#', 0x1}, {&(0x7f0000002440)="afdf3d4bff5a353f2c46e6c7296cd50b8da90de4820cfe275731c4032ab7fb41b358fefee15e96d77c954ac3194a47139673fd18d73cecfe04abac1727e4e18be08345a2a8b23b12538af14b150217f6722bc6b6e1d0af409a2bb498d1567efc05c151ea785403839f3b833d53904392c0c889c91ccaf4887ca0bd10fc2be756ec33433333d4d71a7ff0b95bd7a8fb719509edfa7e5553cc2e818f59e2ef2012ea43d79fee205eb2cf464c70d3c95f8eb05a552e5dad29c4d2044961a9fb089afb30a2142fe1d6079ed7b824fb879de9d4acf1b72ca464f9937dc2bf6bb0e9dc5a4441c09b5e04c37a55dc11a9", 0xed}, {&(0x7f0000002540)="9777be08b596435a635bd566884876d6d9655015383fc0a8fda8cbc668fe34762008a403fcf45bf44574fcac44fc8f7e65ef56301023d8ed676e07770e0936e21e2fc24e5c898c7b2e2ae1afd41d3fa64dd7ab477cd2950d42ff7e0723bc9af98866bbe327b8553ac076c4f62ac392fd838c4615a1946117cf5d1e079de0a31e43ccfd769512751c9c2b683401d3db97c66e890308cc2ed063e44beace6f5ef091338629fe285ff12dbc17c70b6cddbf3864229bacc06038ea4b22c78d193f16e018498365f344bbb4b8", 0xca}, {&(0x7f0000002640)="70d1178a7a53cd929af3ff92dab1d2aa3a784c816c047996008fd73e06396c7f1903840fd5e408cc4ced166c6411d2b4a76687fa3d7bb0cb91b591bb6d1a0c0f6138667f9e81955bdf17457863c7552f509c9da7dacbe7c0e226b61eee339e6d4e4e994e630dd9127040d53694b04ce6886385dc3a94543d27cbebf3867c256f47223fc6682a", 0x86}, {&(0x7f0000002700)="658ab3ba420ee7f503ed3675d8665f50c1d9add001a2a1eca949d8c5b2bb3e5cf88180a63ded63ffcf20a69170c821a0bbb848936049bf98215776", 0x3b}], 0xa, &(0x7f0000002800)=[{0x10, 0x29, 0x1}, {0x20, 0x108, 0x3ff, "fb73ceb0fa3f74d6d62fdb3a3bb27c"}, {0x30, 0x114, 0x0, "036b5c01fa639ee3f31d0c1544d73203c2d76877e3f737f53093"}], 0x60}}], 0x6, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r6, &(0x7f00000003c0)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) r8 = socket(0x8, 0x3, 0x7f) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000004ec0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r8, &(0x7f0000004f80)={&(0x7f0000004e80)={0x10, 0x0, 0x0, 0x402102}, 0xc, &(0x7f0000004f40)={&(0x7f0000004f00)={0x24, r9, 0x1893cc681da6083f, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x9}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x80000}, 0x10020000) getsockname$packet(r6, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000705000000000000008000000000", @ANYRES32=r10, @ANYBLOB="00000000ffffffff00000000090001006866736300000000fbff020000000000"], 0x38}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000002a00)={@mcast2, @loopback, @loopback, 0x7, 0x7fff, 0x6, 0x400, 0x8, 0x9803a0, r10}) 23:31:05 executing program 2 (fault-call:10 fault-nth:11): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:05 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xf000000) 23:31:05 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000280)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x20) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000380), &(0x7f00000003c0)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040), &(0x7f0000000140)=0x8) setsockopt$ax25_SO_BINDTODEVICE(r1, 0x101, 0x19, &(0x7f0000000340)=@netrom={'nr', 0x0}, 0x10) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f00000002c0)={{0x0, @multicast1, 0x4e22, 0x1, 'lblc\x00', 0x41, 0x67a3e2e5, 0x48}, {@empty, 0x4e24, 0x1, 0xe800, 0x4, 0x9}}, 0x44) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000100)=[@sack_perm, @timestamp, @mss={0x2, 0x49}], 0x3) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000000c0)={0x0, 0xe000}, 0x8) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x5356fb79cad868ac, 0x0) 23:31:05 executing program 1 (fault-call:11 fault-nth:10): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2593.423410][T13744] FAULT_INJECTION: forcing a failure. [ 2593.423410][T13744] name failslab, interval 1, probability 0, space 0, times 0 [ 2593.436198][T13744] CPU: 0 PID: 13744 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2593.444101][T13744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2593.449727][T13746] FAULT_INJECTION: forcing a failure. [ 2593.449727][T13746] name failslab, interval 1, probability 0, space 0, times 0 [ 2593.454151][T13744] Call Trace: [ 2593.454174][T13744] dump_stack+0x172/0x1f0 [ 2593.454197][T13744] should_fail.cold+0xa/0x15 [ 2593.454217][T13744] ? fault_create_debugfs_attr+0x180/0x180 [ 2593.454241][T13744] ? ___might_sleep+0x163/0x2c0 [ 2593.489631][T13744] __should_failslab+0x121/0x190 [ 2593.494570][T13744] should_failslab+0x9/0x14 [ 2593.499070][T13744] __kmalloc+0x2e0/0x770 [ 2593.503320][T13744] ? __local_bh_enable_ip+0x15a/0x270 [ 2593.508717][T13744] ? lock_sock_nested+0xe2/0x120 [ 2593.513654][T13744] ? __local_bh_enable_ip+0x15a/0x270 [ 2593.519154][T13744] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2593.524438][T13744] ? lock_sock_nested+0x9a/0x120 [ 2593.529371][T13744] ? sock_kmalloc+0xc6/0x120 [ 2593.533960][T13744] sock_kmalloc+0xc6/0x120 [ 2593.538380][T13744] hash_alloc_result.part.0+0x95/0x110 [ 2593.543839][T13744] hash_sendpage+0x7a7/0x9d0 [ 2593.548431][T13744] hash_sendpage_nokey+0x94/0xa0 [ 2593.553367][T13744] kernel_sendpage+0x92/0xf0 [ 2593.557963][T13744] ? hash_check_key.isra.0+0x230/0x230 [ 2593.563433][T13744] sock_sendpage+0x8b/0xc0 [ 2593.567877][T13744] pipe_to_sendpage+0x296/0x360 [ 2593.572734][T13744] ? kernel_sendpage+0xf0/0xf0 [ 2593.577504][T13744] ? direct_splice_actor+0x190/0x190 [ 2593.582800][T13744] ? __put_page+0xa7/0xe0 [ 2593.587127][T13744] ? anon_pipe_buf_release+0x1c6/0x270 [ 2593.592586][T13744] __splice_from_pipe+0x397/0x7d0 [ 2593.597616][T13744] ? direct_splice_actor+0x190/0x190 [ 2593.602902][T13744] ? direct_splice_actor+0x190/0x190 [ 2593.608193][T13744] splice_from_pipe+0x108/0x170 [ 2593.613056][T13744] ? splice_shrink_spd+0xd0/0xd0 [ 2593.617999][T13744] ? apparmor_file_permission+0x25/0x30 [ 2593.623632][T13744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2593.629875][T13744] ? security_file_permission+0x8f/0x380 [ 2593.635596][T13744] generic_splice_sendpage+0x3c/0x50 [ 2593.640878][T13744] ? splice_from_pipe+0x170/0x170 [ 2593.645903][T13744] do_splice+0x708/0x1410 [ 2593.650246][T13744] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2593.655357][T13744] ? __fget_light+0x1a9/0x230 [ 2593.660043][T13744] __x64_sys_splice+0x2c6/0x330 [ 2593.664895][T13744] do_syscall_64+0xfa/0x760 [ 2593.669521][T13744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2593.675411][T13744] RIP: 0033:0x459f49 [ 2593.679301][T13744] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2593.698914][T13744] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2593.707322][T13744] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2593.715287][T13744] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2593.723389][T13744] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2593.731370][T13744] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2593.739426][T13744] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2593.747424][T13746] CPU: 1 PID: 13746 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2593.755318][T13746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2593.765379][T13746] Call Trace: [ 2593.768680][T13746] dump_stack+0x172/0x1f0 [ 2593.773021][T13746] should_fail.cold+0xa/0x15 [ 2593.777619][T13746] ? fault_create_debugfs_attr+0x180/0x180 [ 2593.783432][T13746] ? ___might_sleep+0x163/0x2c0 [ 2593.788299][T13746] __should_failslab+0x121/0x190 [ 2593.793248][T13746] should_failslab+0x9/0x14 [ 2593.797747][T13746] __kmalloc+0x2e0/0x770 [ 2593.801995][T13746] ? __local_bh_enable_ip+0x15a/0x270 [ 2593.807369][T13746] ? lock_sock_nested+0xe2/0x120 [ 2593.812317][T13746] ? __local_bh_enable_ip+0x15a/0x270 [ 2593.817701][T13746] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2593.822991][T13746] ? lock_sock_nested+0x9a/0x120 [ 2593.827930][T13746] ? sock_kmalloc+0xc6/0x120 [ 2593.832526][T13746] sock_kmalloc+0xc6/0x120 [ 2593.836950][T13746] hash_alloc_result.part.0+0x95/0x110 [ 2593.842413][T13746] hash_sendpage+0x7a7/0x9d0 [ 2593.847023][T13746] hash_sendpage_nokey+0x94/0xa0 [ 2593.851966][T13746] kernel_sendpage+0x92/0xf0 [ 2593.856559][T13746] ? hash_check_key.isra.0+0x230/0x230 [ 2593.862022][T13746] sock_sendpage+0x8b/0xc0 [ 2593.866452][T13746] pipe_to_sendpage+0x296/0x360 [ 2593.871304][T13746] ? kernel_sendpage+0xf0/0xf0 [ 2593.876074][T13746] ? direct_splice_actor+0x190/0x190 [ 2593.881374][T13746] ? __put_page+0xa7/0xe0 [ 2593.885707][T13746] ? anon_pipe_buf_release+0x1c6/0x270 [ 2593.891188][T13746] __splice_from_pipe+0x397/0x7d0 [ 2593.896226][T13746] ? direct_splice_actor+0x190/0x190 [ 2593.901527][T13746] ? direct_splice_actor+0x190/0x190 [ 2593.906819][T13746] splice_from_pipe+0x108/0x170 [ 2593.911677][T13746] ? splice_shrink_spd+0xd0/0xd0 [ 2593.916626][T13746] ? apparmor_file_permission+0x25/0x30 [ 2593.922180][T13746] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2593.928424][T13746] ? security_file_permission+0x8f/0x380 [ 2593.934069][T13746] generic_splice_sendpage+0x3c/0x50 [ 2593.939351][T13746] ? splice_from_pipe+0x170/0x170 [ 2593.944359][T13746] do_splice+0x708/0x1410 [ 2593.948675][T13746] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2593.953767][T13746] ? __fget_light+0x1a9/0x230 [ 2593.958425][T13746] __x64_sys_splice+0x2c6/0x330 [ 2593.963261][T13746] do_syscall_64+0xfa/0x760 [ 2593.967747][T13746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2593.973618][T13746] RIP: 0033:0x459f49 [ 2593.977489][T13746] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2593.997078][T13746] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2594.005500][T13746] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2594.013476][T13746] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2594.021431][T13746] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2594.029392][T13746] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2594.037342][T13746] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:31:06 executing program 2 (fault-call:10 fault-nth:12): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:06 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x3f000000) 23:31:06 executing program 0: getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1b, &(0x7f00000000c0), &(0x7f0000000100)=0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc020662a, &(0x7f00000000c0)={0x4000000, r6, 0x1800}) getpeername$unix(r5, &(0x7f0000000240)=@abs, &(0x7f00000002c0)=0x6e) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:06 executing program 1 (fault-call:11 fault-nth:11): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:06 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0802b8205e0bd9e8670071") r2 = socket(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x15000000000000, 0x485, 0x6, 0x0) [ 2594.346488][T13765] FAULT_INJECTION: forcing a failure. [ 2594.346488][T13765] name failslab, interval 1, probability 0, space 0, times 0 [ 2594.372874][T13768] FAULT_INJECTION: forcing a failure. [ 2594.372874][T13768] name failslab, interval 1, probability 0, space 0, times 0 [ 2594.384976][T13765] CPU: 1 PID: 13765 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2594.393370][T13765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2594.403431][T13765] Call Trace: [ 2594.406721][T13765] dump_stack+0x172/0x1f0 [ 2594.411062][T13765] should_fail.cold+0xa/0x15 [ 2594.415667][T13765] ? fault_create_debugfs_attr+0x180/0x180 [ 2594.421485][T13765] ? ___might_sleep+0x163/0x2c0 [ 2594.426345][T13765] __should_failslab+0x121/0x190 [ 2594.431286][T13765] should_failslab+0x9/0x14 [ 2594.435792][T13765] __kmalloc+0x2e0/0x770 [ 2594.440034][T13765] ? __local_bh_enable_ip+0x15a/0x270 [ 2594.445418][T13765] ? lock_sock_nested+0xe2/0x120 [ 2594.450356][T13765] ? __local_bh_enable_ip+0x15a/0x270 [ 2594.455728][T13765] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2594.461014][T13765] ? lock_sock_nested+0x9a/0x120 [ 2594.465948][T13765] ? sock_kmalloc+0xc6/0x120 [ 2594.470549][T13765] sock_kmalloc+0xc6/0x120 [ 2594.474971][T13765] hash_alloc_result.part.0+0x95/0x110 [ 2594.480429][T13765] hash_sendpage+0x7a7/0x9d0 [ 2594.485025][T13765] hash_sendpage_nokey+0x94/0xa0 [ 2594.489966][T13765] kernel_sendpage+0x92/0xf0 [ 2594.494552][T13765] ? hash_check_key.isra.0+0x230/0x230 [ 2594.500017][T13765] sock_sendpage+0x8b/0xc0 [ 2594.504448][T13765] pipe_to_sendpage+0x296/0x360 [ 2594.509301][T13765] ? kernel_sendpage+0xf0/0xf0 [ 2594.514065][T13765] ? direct_splice_actor+0x190/0x190 [ 2594.519369][T13765] ? __put_page+0xa7/0xe0 [ 2594.523701][T13765] ? anon_pipe_buf_release+0x1c6/0x270 [ 2594.529166][T13765] __splice_from_pipe+0x397/0x7d0 [ 2594.534189][T13765] ? direct_splice_actor+0x190/0x190 [ 2594.539487][T13765] ? direct_splice_actor+0x190/0x190 [ 2594.544887][T13765] splice_from_pipe+0x108/0x170 [ 2594.549755][T13765] ? splice_shrink_spd+0xd0/0xd0 [ 2594.554708][T13765] ? apparmor_file_permission+0x25/0x30 [ 2594.560259][T13765] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2594.566502][T13765] ? security_file_permission+0x8f/0x380 [ 2594.572144][T13765] generic_splice_sendpage+0x3c/0x50 [ 2594.577435][T13765] ? splice_from_pipe+0x170/0x170 [ 2594.582464][T13765] do_splice+0x708/0x1410 [ 2594.586806][T13765] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2594.591919][T13765] ? __fget_light+0x1a9/0x230 [ 2594.596602][T13765] __x64_sys_splice+0x2c6/0x330 [ 2594.601463][T13765] do_syscall_64+0xfa/0x760 [ 2594.605973][T13765] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2594.611863][T13765] RIP: 0033:0x459f49 [ 2594.615758][T13765] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2594.635360][T13765] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2594.643776][T13765] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2594.651750][T13765] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2594.659728][T13765] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2594.667700][T13765] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2594.675669][T13765] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2594.683665][T13768] CPU: 0 PID: 13768 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2594.691555][T13768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2594.701596][T13768] Call Trace: [ 2594.704893][T13768] dump_stack+0x172/0x1f0 [ 2594.709212][T13768] should_fail.cold+0xa/0x15 [ 2594.713799][T13768] ? fault_create_debugfs_attr+0x180/0x180 [ 2594.719596][T13768] ? ___might_sleep+0x163/0x2c0 [ 2594.724439][T13768] __should_failslab+0x121/0x190 [ 2594.729375][T13768] should_failslab+0x9/0x14 [ 2594.733872][T13768] __kmalloc+0x2e0/0x770 [ 2594.738104][T13768] ? __local_bh_enable_ip+0x15a/0x270 [ 2594.743457][T13768] ? lock_sock_nested+0xe2/0x120 [ 2594.748376][T13768] ? __local_bh_enable_ip+0x15a/0x270 [ 2594.753730][T13768] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2594.759012][T13768] ? lock_sock_nested+0x9a/0x120 [ 2594.763953][T13768] ? sock_kmalloc+0xc6/0x120 [ 2594.768563][T13768] sock_kmalloc+0xc6/0x120 [ 2594.772966][T13768] hash_alloc_result.part.0+0x95/0x110 [ 2594.778406][T13768] hash_sendpage+0x7a7/0x9d0 [ 2594.783018][T13768] hash_sendpage_nokey+0x94/0xa0 [ 2594.787961][T13768] kernel_sendpage+0x92/0xf0 [ 2594.792554][T13768] ? hash_check_key.isra.0+0x230/0x230 [ 2594.798032][T13768] sock_sendpage+0x8b/0xc0 [ 2594.802462][T13768] pipe_to_sendpage+0x296/0x360 [ 2594.807317][T13768] ? kernel_sendpage+0xf0/0xf0 [ 2594.812092][T13768] ? direct_splice_actor+0x190/0x190 [ 2594.817390][T13768] ? __put_page+0xa7/0xe0 [ 2594.821731][T13768] ? anon_pipe_buf_release+0x1c6/0x270 [ 2594.827198][T13768] __splice_from_pipe+0x397/0x7d0 [ 2594.832229][T13768] ? direct_splice_actor+0x190/0x190 [ 2594.837535][T13768] ? direct_splice_actor+0x190/0x190 [ 2594.842830][T13768] splice_from_pipe+0x108/0x170 [ 2594.847690][T13768] ? splice_shrink_spd+0xd0/0xd0 [ 2594.852634][T13768] ? apparmor_file_permission+0x25/0x30 [ 2594.858192][T13768] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2594.864442][T13768] ? security_file_permission+0x8f/0x380 [ 2594.870083][T13768] generic_splice_sendpage+0x3c/0x50 [ 2594.875372][T13768] ? splice_from_pipe+0x170/0x170 [ 2594.880396][T13768] do_splice+0x708/0x1410 [ 2594.884739][T13768] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2594.889968][T13768] ? __fget_light+0x1a9/0x230 [ 2594.894679][T13768] __x64_sys_splice+0x2c6/0x330 [ 2594.899539][T13768] do_syscall_64+0xfa/0x760 [ 2594.904053][T13768] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2594.909937][T13768] RIP: 0033:0x459f49 [ 2594.913824][T13768] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2594.913833][T13768] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 23:31:07 executing program 3: r0 = socket(0x2, 0x8001, 0x0) connect$unix(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x10) setsockopt$sock_int(r0, 0xffff, 0x1021, &(0x7f0000000040)=0x6, 0x1000002de) [ 2594.913846][T13768] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2594.913859][T13768] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2594.957764][T13768] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2594.965736][T13768] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2594.973707][T13768] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:31:12 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:12 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000000c0)=0x40, 0x4) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0xa9) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) 23:31:12 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x40000000) 23:31:12 executing program 2 (fault-call:10 fault-nth:13): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:12 executing program 1 (fault-call:11 fault-nth:12): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000440)=0x6, 0x4) [ 2599.852243][T13797] FAULT_INJECTION: forcing a failure. [ 2599.852243][T13797] name failslab, interval 1, probability 0, space 0, times 0 [ 2599.867756][T13798] FAULT_INJECTION: forcing a failure. [ 2599.867756][T13798] name failslab, interval 1, probability 0, space 0, times 0 [ 2599.891199][T13797] CPU: 1 PID: 13797 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2599.899122][T13797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2599.909174][T13797] Call Trace: [ 2599.912464][T13797] dump_stack+0x172/0x1f0 [ 2599.916792][T13797] should_fail.cold+0xa/0x15 [ 2599.921378][T13797] ? fault_create_debugfs_attr+0x180/0x180 [ 2599.927180][T13797] ? ___might_sleep+0x163/0x2c0 [ 2599.932031][T13797] __should_failslab+0x121/0x190 [ 2599.936963][T13797] should_failslab+0x9/0x14 [ 2599.941458][T13797] __kmalloc+0x2e0/0x770 [ 2599.945698][T13797] ? __local_bh_enable_ip+0x15a/0x270 [ 2599.951066][T13797] ? lock_sock_nested+0xe2/0x120 [ 2599.956001][T13797] ? __local_bh_enable_ip+0x15a/0x270 [ 2599.961369][T13797] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2599.966652][T13797] ? lock_sock_nested+0x9a/0x120 [ 2599.971581][T13797] ? sock_kmalloc+0xc6/0x120 [ 2599.976175][T13797] sock_kmalloc+0xc6/0x120 [ 2599.980593][T13797] hash_alloc_result.part.0+0x95/0x110 [ 2599.986051][T13797] hash_sendpage+0x7a7/0x9d0 [ 2599.990648][T13797] hash_sendpage_nokey+0x94/0xa0 [ 2599.995589][T13797] kernel_sendpage+0x92/0xf0 [ 2600.000171][T13797] ? hash_check_key.isra.0+0x230/0x230 [ 2600.005645][T13797] sock_sendpage+0x8b/0xc0 [ 2600.010062][T13797] pipe_to_sendpage+0x296/0x360 [ 2600.014910][T13797] ? kernel_sendpage+0xf0/0xf0 [ 2600.019669][T13797] ? direct_splice_actor+0x190/0x190 [ 2600.024955][T13797] ? __put_page+0xa7/0xe0 [ 2600.029276][T13797] ? anon_pipe_buf_release+0x1c6/0x270 [ 2600.034734][T13797] __splice_from_pipe+0x397/0x7d0 [ 2600.039757][T13797] ? direct_splice_actor+0x190/0x190 [ 2600.045042][T13797] ? direct_splice_actor+0x190/0x190 [ 2600.050325][T13797] splice_from_pipe+0x108/0x170 [ 2600.055180][T13797] ? splice_shrink_spd+0xd0/0xd0 [ 2600.060117][T13797] ? apparmor_file_permission+0x25/0x30 [ 2600.065659][T13797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2600.071894][T13797] ? security_file_permission+0x8f/0x380 [ 2600.077526][T13797] generic_splice_sendpage+0x3c/0x50 [ 2600.082805][T13797] ? splice_from_pipe+0x170/0x170 [ 2600.087823][T13797] do_splice+0x708/0x1410 [ 2600.092158][T13797] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2600.097266][T13797] ? __fget_light+0x1a9/0x230 [ 2600.101940][T13797] __x64_sys_splice+0x2c6/0x330 [ 2600.106800][T13797] do_syscall_64+0xfa/0x760 [ 2600.111316][T13797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2600.117206][T13797] RIP: 0033:0x459f49 [ 2600.121098][T13797] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2600.140719][T13797] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2600.149136][T13797] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2600.157109][T13797] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2600.165090][T13797] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2600.173064][T13797] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2600.181034][T13797] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2600.189025][T13798] CPU: 0 PID: 13798 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 23:31:12 executing program 3: r0 = socket(0x2, 0x8001, 0x0) connect$unix(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x10) [ 2600.196923][T13798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2600.206977][T13798] Call Trace: [ 2600.210280][T13798] dump_stack+0x172/0x1f0 [ 2600.214649][T13798] should_fail.cold+0xa/0x15 [ 2600.219250][T13798] ? fault_create_debugfs_attr+0x180/0x180 [ 2600.225081][T13798] ? ___might_sleep+0x163/0x2c0 [ 2600.225106][T13798] __should_failslab+0x121/0x190 [ 2600.234861][T13798] should_failslab+0x9/0x14 [ 2600.234875][T13798] __kmalloc+0x2e0/0x770 [ 2600.234892][T13798] ? __local_bh_enable_ip+0x15a/0x270 [ 2600.234907][T13798] ? lock_sock_nested+0xe2/0x120 [ 2600.234921][T13798] ? __local_bh_enable_ip+0x15a/0x270 [ 2600.234939][T13798] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2600.234953][T13798] ? lock_sock_nested+0x9a/0x120 [ 2600.234964][T13798] ? sock_kmalloc+0xc6/0x120 [ 2600.234982][T13798] sock_kmalloc+0xc6/0x120 [ 2600.235001][T13798] hash_alloc_result.part.0+0x95/0x110 [ 2600.235017][T13798] hash_sendpage+0x7a7/0x9d0 [ 2600.288549][T13798] hash_sendpage_nokey+0x94/0xa0 [ 2600.293500][T13798] kernel_sendpage+0x92/0xf0 [ 2600.298094][T13798] ? hash_check_key.isra.0+0x230/0x230 [ 2600.303567][T13798] sock_sendpage+0x8b/0xc0 [ 2600.308027][T13798] pipe_to_sendpage+0x296/0x360 [ 2600.312883][T13798] ? kernel_sendpage+0xf0/0xf0 [ 2600.317662][T13798] ? direct_splice_actor+0x190/0x190 [ 2600.322949][T13798] ? __put_page+0xa7/0xe0 [ 2600.327282][T13798] ? anon_pipe_buf_release+0x1c6/0x270 [ 2600.332747][T13798] __splice_from_pipe+0x397/0x7d0 [ 2600.337783][T13798] ? direct_splice_actor+0x190/0x190 [ 2600.343081][T13798] ? direct_splice_actor+0x190/0x190 [ 2600.348374][T13798] splice_from_pipe+0x108/0x170 [ 2600.353248][T13798] ? splice_shrink_spd+0xd0/0xd0 [ 2600.358203][T13798] ? apparmor_file_permission+0x25/0x30 [ 2600.363763][T13798] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2600.370012][T13798] ? security_file_permission+0x8f/0x380 [ 2600.375657][T13798] generic_splice_sendpage+0x3c/0x50 [ 2600.380947][T13798] ? splice_from_pipe+0x170/0x170 [ 2600.385977][T13798] do_splice+0x708/0x1410 [ 2600.390321][T13798] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2600.395434][T13798] ? __fget_light+0x1a9/0x230 [ 2600.400117][T13798] __x64_sys_splice+0x2c6/0x330 23:31:12 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x2000011, r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x2000011, r2, 0x0) [ 2600.404978][T13798] do_syscall_64+0xfa/0x760 [ 2600.409486][T13798] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2600.415374][T13798] RIP: 0033:0x459f49 [ 2600.419275][T13798] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2600.438897][T13798] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2600.447319][T13798] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 23:31:13 executing program 0: vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(0xffffffffffffffff, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x80000001, 0x0) [ 2600.455299][T13798] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2600.463275][T13798] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2600.471248][T13798] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2600.479217][T13798] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2600.487438][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2600.487494][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2600.487606][ C1] protocol 88fb is buggy, dev hsr_slave_0 23:31:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, &(0x7f0000000000), 0xfffffea6) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f00000000c0)=0x101, 0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r2, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r1, 0x0, r4, 0x0, 0x80000001, 0x0) [ 2600.487652][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2600.487754][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2600.487799][ C1] protocol 88fb is buggy, dev hsr_slave_1 23:31:13 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x7f000000) 23:31:18 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:18 executing program 2 (fault-call:10 fault-nth:14): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:18 executing program 1 (fault-call:11 fault-nth:13): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:18 executing program 3: getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x1b, &(0x7f00000000c0), &(0x7f0000000100)=0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc020662a, &(0x7f00000000c0)={0x4000000, r6, 0x1800}) getpeername$unix(r5, &(0x7f0000000240)=@abs, &(0x7f00000002c0)=0x6e) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:18 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r4, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r4, 0x6, 0x15, &(0x7f00000000c0)=0x5, 0x4) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f00000004c0), 0x800) sendmmsg(r7, &(0x7f0000002780), 0x0, 0x20000002) ioctl$FS_IOC_GETVERSION(r6, 0x80087601, &(0x7f00000003c0)) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc020662a, &(0x7f00000000c0)={0x4000000, r9, 0x1800}) r10 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r10, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r11 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r11, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$inet_mreq(r11, 0x0, 0x2e, &(0x7f0000000400)={@loopback, @broadcast}, 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f0000000480)=ANY=[@ANYBLOB="42d2fb2da168b12e043ce9426843fb986c105a04adc35137c22f212a6c53d967ccc28e9c5a0a0e7e874debb024366876c83c873c9a0e", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x66, &(0x7f0000000040)={r12}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000240)={r12, 0x1b2}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r9, 0x84, 0xf, &(0x7f00000002c0)={r13, @in={{0x2, 0x4e23, @remote}}, 0x401, 0x4695, 0x7, 0xaf, 0x1f}, &(0x7f0000000380)=0x98) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:18 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x8dffffff) [ 2606.234530][T13846] FAULT_INJECTION: forcing a failure. [ 2606.234530][T13846] name failslab, interval 1, probability 0, space 0, times 0 [ 2606.239623][T13848] FAULT_INJECTION: forcing a failure. [ 2606.239623][T13848] name failslab, interval 1, probability 0, space 0, times 0 [ 2606.254437][T13846] CPU: 1 PID: 13846 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2606.267710][T13846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2606.277755][T13846] Call Trace: [ 2606.281044][T13846] dump_stack+0x172/0x1f0 [ 2606.285386][T13846] should_fail.cold+0xa/0x15 [ 2606.290073][T13846] ? fault_create_debugfs_attr+0x180/0x180 [ 2606.295896][T13846] ? ___might_sleep+0x163/0x2c0 [ 2606.300754][T13846] __should_failslab+0x121/0x190 [ 2606.305692][T13846] should_failslab+0x9/0x14 [ 2606.310201][T13846] __kmalloc+0x2e0/0x770 [ 2606.314442][T13846] ? __local_bh_enable_ip+0x15a/0x270 [ 2606.319812][T13846] ? lock_sock_nested+0xe2/0x120 [ 2606.324748][T13846] ? __local_bh_enable_ip+0x15a/0x270 [ 2606.330117][T13846] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2606.335401][T13846] ? lock_sock_nested+0x9a/0x120 [ 2606.340339][T13846] ? sock_kmalloc+0xc6/0x120 [ 2606.344931][T13846] sock_kmalloc+0xc6/0x120 [ 2606.349359][T13846] hash_alloc_result.part.0+0x95/0x110 [ 2606.354817][T13846] hash_sendpage+0x7a7/0x9d0 [ 2606.359419][T13846] hash_sendpage_nokey+0x94/0xa0 [ 2606.364370][T13846] kernel_sendpage+0x92/0xf0 [ 2606.368968][T13846] ? hash_check_key.isra.0+0x230/0x230 [ 2606.374434][T13846] sock_sendpage+0x8b/0xc0 [ 2606.378865][T13846] pipe_to_sendpage+0x296/0x360 [ 2606.383738][T13846] ? kernel_sendpage+0xf0/0xf0 [ 2606.388509][T13846] ? direct_splice_actor+0x190/0x190 [ 2606.393888][T13846] ? __put_page+0xa7/0xe0 [ 2606.398230][T13846] ? anon_pipe_buf_release+0x1c6/0x270 [ 2606.403719][T13846] __splice_from_pipe+0x397/0x7d0 [ 2606.408760][T13846] ? direct_splice_actor+0x190/0x190 [ 2606.414061][T13846] ? direct_splice_actor+0x190/0x190 [ 2606.419360][T13846] splice_from_pipe+0x108/0x170 [ 2606.424226][T13846] ? splice_shrink_spd+0xd0/0xd0 [ 2606.429212][T13846] ? apparmor_file_permission+0x25/0x30 [ 2606.434795][T13846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2606.441043][T13846] ? security_file_permission+0x8f/0x380 [ 2606.446686][T13846] generic_splice_sendpage+0x3c/0x50 [ 2606.451977][T13846] ? splice_from_pipe+0x170/0x170 [ 2606.457008][T13846] do_splice+0x708/0x1410 [ 2606.461355][T13846] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2606.466472][T13846] ? __fget_light+0x1a9/0x230 [ 2606.471151][T13846] __x64_sys_splice+0x2c6/0x330 [ 2606.476012][T13846] do_syscall_64+0xfa/0x760 [ 2606.480525][T13846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2606.486411][T13846] RIP: 0033:0x459f49 [ 2606.490304][T13846] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2606.509906][T13846] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2606.518327][T13846] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2606.526304][T13846] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2606.534275][T13846] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2606.542258][T13846] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2606.550241][T13846] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2606.564955][T13848] CPU: 1 PID: 13848 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2606.572885][T13848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2606.583090][T13848] Call Trace: [ 2606.586394][T13848] dump_stack+0x172/0x1f0 [ 2606.590744][T13848] should_fail.cold+0xa/0x15 [ 2606.595356][T13848] ? fault_create_debugfs_attr+0x180/0x180 [ 2606.601174][T13848] ? ___might_sleep+0x163/0x2c0 [ 2606.606037][T13848] __should_failslab+0x121/0x190 [ 2606.610981][T13848] should_failslab+0x9/0x14 [ 2606.615487][T13848] __kmalloc+0x2e0/0x770 [ 2606.619740][T13848] ? __local_bh_enable_ip+0x15a/0x270 [ 2606.625119][T13848] ? lock_sock_nested+0xe2/0x120 [ 2606.630062][T13848] ? __local_bh_enable_ip+0x15a/0x270 [ 2606.635446][T13848] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2606.640766][T13848] ? lock_sock_nested+0x9a/0x120 [ 2606.645705][T13848] ? sock_kmalloc+0xc6/0x120 [ 2606.650301][T13848] sock_kmalloc+0xc6/0x120 [ 2606.654727][T13848] hash_alloc_result.part.0+0x95/0x110 [ 2606.660190][T13848] hash_sendpage+0x7a7/0x9d0 [ 2606.664795][T13848] hash_sendpage_nokey+0x94/0xa0 [ 2606.669746][T13848] kernel_sendpage+0x92/0xf0 [ 2606.674346][T13848] ? hash_check_key.isra.0+0x230/0x230 [ 2606.679810][T13848] sock_sendpage+0x8b/0xc0 [ 2606.684237][T13848] pipe_to_sendpage+0x296/0x360 [ 2606.689092][T13848] ? kernel_sendpage+0xf0/0xf0 [ 2606.693865][T13848] ? direct_splice_actor+0x190/0x190 [ 2606.699155][T13848] ? __put_page+0xa7/0xe0 [ 2606.703490][T13848] ? anon_pipe_buf_release+0x1c6/0x270 [ 2606.708964][T13848] __splice_from_pipe+0x397/0x7d0 [ 2606.714000][T13848] ? direct_splice_actor+0x190/0x190 [ 2606.719302][T13848] ? direct_splice_actor+0x190/0x190 [ 2606.724596][T13848] splice_from_pipe+0x108/0x170 [ 2606.729461][T13848] ? splice_shrink_spd+0xd0/0xd0 [ 2606.734408][T13848] ? apparmor_file_permission+0x25/0x30 [ 2606.739967][T13848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2606.746215][T13848] ? security_file_permission+0x8f/0x380 [ 2606.751852][T13848] generic_splice_sendpage+0x3c/0x50 [ 2606.757144][T13848] ? splice_from_pipe+0x170/0x170 [ 2606.762173][T13848] do_splice+0x708/0x1410 [ 2606.766521][T13848] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2606.771639][T13848] ? __fget_light+0x1a9/0x230 [ 2606.776324][T13848] __x64_sys_splice+0x2c6/0x330 [ 2606.781187][T13848] do_syscall_64+0xfa/0x760 [ 2606.785709][T13848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2606.791599][T13848] RIP: 0033:0x459f49 [ 2606.795494][T13848] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2606.815100][T13848] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2606.823519][T13848] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 23:31:19 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0x0) r2 = socket$inet6(0xa, 0x3, 0x400000000006) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000440)={0x1, 0x1, 0x7a, 0x463, 0x0}, &(0x7f00000005c0)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000800)={r3, @in6={{0xa, 0x4e24, 0x2, @local, 0x5}}, 0x507, 0x80, 0x1, 0xffff, 0x88}, &(0x7f0000000600)=0x98) ioctl(r2, 0x8912, &(0x7f0000000200)='\x00'/11) unshare(0x40000000) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) r6 = accept(0xffffffffffffffff, 0x0, &(0x7f00000028c0)) shutdown(r6, 0x1) getsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, &(0x7f0000002900), &(0x7f0000002940)=0x4) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) getsockopt$packet_int(r6, 0x107, 0xa, &(0x7f0000000080), &(0x7f00000002c0)=0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.net/syz0\x00', 0x200002, 0x0) r7 = openat$cgroup_ro(r5, &(0x7f00000006c0)='cgroup.controllers\x00', 0x0, 0x0) write$cgroup_subtree(r7, &(0x7f00000008c0)=ANY=[@ANYBLOB="2b72646d613669646320296d656d6f7279200002840000000000003100410010000000000000000000db00fed2c0b1b9a510fea97cef791bd7a559016065b577fe1f00000000000000a2256da6646e7533a3a684434fe04fbd94a2aa71a181912cb8a7125b457a0678be5041fbca88f6ce3dadc1aafbc7e960a5"], 0x27) unshare(0x4a000000) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000004c0)={0x0, 0x800}, &(0x7f0000000500)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000540)={r8, 0x5a64c6c5, 0x4, 0xd00}, &(0x7f0000000580)=0x10) sendto$llc(r6, &(0x7f0000000100)="f970073b521a3a2059fcfb4e8ff5daaa892b23d0d93e42e29fd18b0a0ba812eee04266ea1e381a4bb2e397868f69542dd70dd9c732d82d1fb2fc114f477c5628dfd9882cb1704a9f32aac44aae8374041822b9186cf14d60459bd23b2cdfa2331560f6603715660f40eb2abb6eb4ac55a1b1b79c6b0cf8b2b9318c3851c8c082044b202dfddf065073e5b86df813839f8469d5e3897560064588b8857deb8aa08bb97eab5a3c887c75722b8f29c0676355437301c7bab02cae987fb632bc787275cc10ffa7d27aec6dde9675ce109785c50042c06113974ffe11fc8c778aa09dfb093bb384905f3b6b5899e819b4f5263cb840bd", 0xf4, 0x800, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000300)={{{@in=@loopback, @in=@dev}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @dev}}) r9 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r9, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000700)=ANY=[@ANYBLOB="020500000500000000000000000000000106a8e7f200000002000100000000000000000000000000fcae986e71b8b11fb93baf5995fd13c9eac91bbe46431fda87cda82162d4b7d8fd2acdc9688e896b66d86b08050e3af6837d8b22d69b52e62d59c2fe8062eeb2b882014c4ca040c6140a02307388d1a28b29dda642cb429be579537c28725b57353467f915c22aaea714283093c5cda7ecd6666563268247aa188fa47d2d403964317175ac23408a96150db0d02f5adf9e222c16d2443e531b2dd543d7142d9ac16feab310c204211f393b630b8942e2f065a93c10878a2a8e0a4f4d8a2b97b639942805a69bf1eb07d462"], 0x28}}, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="4c0000001200ff09fffefd956fa283b724a6008000000000000000683540150e04001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) getuid() [ 2606.831494][T13848] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2606.839473][T13848] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2606.847449][T13848] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2606.855424][T13848] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2606.952539][T13854] IPVS: ftp: loaded support on port[0] = 21 23:31:19 executing program 2 (fault-call:10 fault-nth:15): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:19 executing program 1 (fault-call:11 fault-nth:14): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:19 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xf0ffffff) [ 2607.007778][T13855] device lo entered promiscuous mode [ 2607.051311][T13855] IPVS: ftp: loaded support on port[0] = 21 23:31:19 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) setsockopt$llc_int(r3, 0x10c, 0x2, &(0x7f00000000c0)=0x20000000, 0x4) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) r5 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMSETDEVNAME(r5, 0x80184947, &(0x7f0000000bc0)={0x7, 'syz0\x00'}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r6, &(0x7f0000000000), 0xfffffea6) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f0000000100)=0x2, 0x4) [ 2607.219620][T13867] FAULT_INJECTION: forcing a failure. [ 2607.219620][T13867] name failslab, interval 1, probability 0, space 0, times 0 [ 2607.225063][T13870] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 2607.253837][T13869] FAULT_INJECTION: forcing a failure. [ 2607.253837][T13869] name failslab, interval 1, probability 0, space 0, times 0 [ 2607.276908][T13867] CPU: 1 PID: 13867 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2607.284829][T13867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2607.294880][T13867] Call Trace: [ 2607.298177][T13867] dump_stack+0x172/0x1f0 [ 2607.302511][T13867] should_fail.cold+0xa/0x15 [ 2607.307116][T13867] ? fault_create_debugfs_attr+0x180/0x180 [ 2607.312927][T13867] ? ___might_sleep+0x163/0x2c0 [ 2607.317784][T13867] __should_failslab+0x121/0x190 [ 2607.322721][T13867] should_failslab+0x9/0x14 [ 2607.327230][T13867] __kmalloc+0x2e0/0x770 [ 2607.331470][T13867] ? __local_bh_enable_ip+0x15a/0x270 [ 2607.336837][T13867] ? lock_sock_nested+0xe2/0x120 [ 2607.341790][T13867] ? __local_bh_enable_ip+0x15a/0x270 [ 2607.347161][T13867] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2607.352446][T13867] ? lock_sock_nested+0x9a/0x120 [ 2607.357375][T13867] ? sock_kmalloc+0xc6/0x120 [ 2607.361976][T13867] sock_kmalloc+0xc6/0x120 [ 2607.366405][T13867] hash_alloc_result.part.0+0x95/0x110 [ 2607.371866][T13867] hash_sendpage+0x7a7/0x9d0 [ 2607.376466][T13867] hash_sendpage_nokey+0x94/0xa0 [ 2607.381413][T13867] kernel_sendpage+0x92/0xf0 [ 2607.385997][T13867] ? hash_check_key.isra.0+0x230/0x230 [ 2607.386019][T13867] sock_sendpage+0x8b/0xc0 [ 2607.386042][T13867] pipe_to_sendpage+0x296/0x360 [ 2607.386057][T13867] ? kernel_sendpage+0xf0/0xf0 [ 2607.386074][T13867] ? direct_splice_actor+0x190/0x190 [ 2607.386090][T13867] ? __put_page+0xa7/0xe0 [ 2607.386106][T13867] ? anon_pipe_buf_release+0x1c6/0x270 [ 2607.386122][T13867] __splice_from_pipe+0x397/0x7d0 [ 2607.386140][T13867] ? direct_splice_actor+0x190/0x190 [ 2607.400818][T13867] ? direct_splice_actor+0x190/0x190 [ 2607.400837][T13867] splice_from_pipe+0x108/0x170 [ 2607.400857][T13867] ? splice_shrink_spd+0xd0/0xd0 [ 2607.400880][T13867] ? apparmor_file_permission+0x25/0x30 [ 2607.400901][T13867] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2607.420668][T13867] ? security_file_permission+0x8f/0x380 [ 2607.420690][T13867] generic_splice_sendpage+0x3c/0x50 [ 2607.420707][T13867] ? splice_from_pipe+0x170/0x170 [ 2607.420726][T13867] do_splice+0x708/0x1410 [ 2607.446043][T13867] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2607.446062][T13867] ? __fget_light+0x1a9/0x230 [ 2607.446081][T13867] __x64_sys_splice+0x2c6/0x330 [ 2607.446104][T13867] do_syscall_64+0xfa/0x760 [ 2607.446126][T13867] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2607.446137][T13867] RIP: 0033:0x459f49 [ 2607.446150][T13867] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2607.446158][T13867] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2607.457913][T13867] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2607.457922][T13867] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2607.457932][T13867] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2607.457939][T13867] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2607.457952][T13867] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2607.510582][T13869] CPU: 1 PID: 13869 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2607.535246][T13869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2607.535253][T13869] Call Trace: [ 2607.535275][T13869] dump_stack+0x172/0x1f0 [ 2607.535299][T13869] should_fail.cold+0xa/0x15 [ 2607.535319][T13869] ? fault_create_debugfs_attr+0x180/0x180 [ 2607.535340][T13869] ? ___might_sleep+0x163/0x2c0 [ 2607.535359][T13869] __should_failslab+0x121/0x190 [ 2607.535376][T13869] should_failslab+0x9/0x14 [ 2607.535387][T13869] __kmalloc+0x2e0/0x770 [ 2607.535400][T13869] ? __local_bh_enable_ip+0x15a/0x270 [ 2607.535412][T13869] ? lock_sock_nested+0xe2/0x120 [ 2607.535425][T13869] ? __local_bh_enable_ip+0x15a/0x270 [ 2607.535441][T13869] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2607.535453][T13869] ? lock_sock_nested+0x9a/0x120 [ 2607.535462][T13869] ? sock_kmalloc+0xc6/0x120 [ 2607.535477][T13869] sock_kmalloc+0xc6/0x120 [ 2607.535496][T13869] hash_alloc_result.part.0+0x95/0x110 [ 2607.535513][T13869] hash_sendpage+0x7a7/0x9d0 [ 2607.551450][T13869] hash_sendpage_nokey+0x94/0xa0 [ 2607.551471][T13869] kernel_sendpage+0x92/0xf0 [ 2607.551485][T13869] ? hash_check_key.isra.0+0x230/0x230 [ 2607.551501][T13869] sock_sendpage+0x8b/0xc0 [ 2607.551521][T13869] pipe_to_sendpage+0x296/0x360 [ 2607.551536][T13869] ? kernel_sendpage+0xf0/0xf0 [ 2607.551554][T13869] ? direct_splice_actor+0x190/0x190 [ 2607.551571][T13869] ? __put_page+0xa7/0xe0 [ 2607.551586][T13869] ? anon_pipe_buf_release+0x1c6/0x270 [ 2607.551607][T13869] __splice_from_pipe+0x397/0x7d0 [ 2607.567522][T13869] ? direct_splice_actor+0x190/0x190 [ 2607.567547][T13869] ? direct_splice_actor+0x190/0x190 [ 2607.567564][T13869] splice_from_pipe+0x108/0x170 [ 2607.567584][T13869] ? splice_shrink_spd+0xd0/0xd0 [ 2607.567606][T13869] ? apparmor_file_permission+0x25/0x30 [ 2607.567624][T13869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2607.567639][T13869] ? security_file_permission+0x8f/0x380 [ 2607.567656][T13869] generic_splice_sendpage+0x3c/0x50 [ 2607.567677][T13869] ? splice_from_pipe+0x170/0x170 [ 2607.583512][T13869] do_splice+0x708/0x1410 [ 2607.583539][T13869] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2607.583556][T13869] ? __fget_light+0x1a9/0x230 [ 2607.583574][T13869] __x64_sys_splice+0x2c6/0x330 [ 2607.583598][T13869] do_syscall_64+0xfa/0x760 [ 2607.583619][T13869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2607.583635][T13869] RIP: 0033:0x459f49 [ 2607.596948][T13869] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2607.596957][T13869] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2607.596970][T13869] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2607.596978][T13869] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2607.596987][T13869] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2607.596996][T13869] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2607.597005][T13869] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:31:20 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xffffff8d) [ 2607.878835][T13870] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 2607.984063][T13874] IPVS: ftp: loaded support on port[0] = 21 [ 2608.060093][T13854] IPVS: ftp: loaded support on port[0] = 21 [ 2608.099471][T13888] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 2608.174559][T13888] netlink: 'syz-executor.3': attribute type 29 has an invalid length. 23:31:25 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, 0x0, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:25 executing program 1 (fault-call:11 fault-nth:15): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:25 executing program 2 (fault-call:10 fault-nth:16): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:25 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x0, 0x4) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 23:31:25 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xfffffff0) 23:31:25 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") close(r2) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000140)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0xb8}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r4, &(0x7f0000002780), 0x400004d, 0x0) clock_gettime(0x0, &(0x7f0000006780)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000006580)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000000)=""/155, 0x9b}, {&(0x7f0000000200)=""/162, 0xa2}, {&(0x7f00000002c0)=""/52, 0x34}, {&(0x7f0000000300)=""/248, 0xf8}, {&(0x7f0000000400)=""/242, 0xf2}, {&(0x7f0000000500)=""/89, 0x59}, {&(0x7f0000000580)=""/105, 0x69}, {&(0x7f0000000600)=""/104, 0x68}, {&(0x7f0000000680)=""/212, 0xd4}, {&(0x7f0000000780)=""/30, 0x1e}], 0xa}, 0x1}, {{&(0x7f0000000880)=@l2, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000900)=""/172, 0xac}, {&(0x7f00000009c0)=""/111, 0x6f}, {&(0x7f0000000a40)=""/223, 0xdf}, {&(0x7f0000000b40)=""/123, 0x7b}, {&(0x7f0000000bc0)=""/149, 0x95}, {&(0x7f0000000c80)=""/30, 0x1e}], 0x6, &(0x7f0000000d40)=""/245, 0xf5}, 0x3}, {{&(0x7f0000000e40)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000ec0)=""/125, 0x7d}, {&(0x7f0000000f40)=""/152, 0x98}], 0x2, &(0x7f0000001040)=""/68, 0x44}, 0x10000}, {{&(0x7f00000010c0)=@un=@abs, 0x80, &(0x7f0000002500)=[{&(0x7f0000001140)=""/113, 0x71}, {&(0x7f00000011c0)=""/158, 0x9e}, {&(0x7f0000001280)=""/158, 0x9e}, {&(0x7f0000001340)=""/124, 0x7c}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/112, 0x70}, {&(0x7f0000002440)=""/135, 0x87}], 0x7, &(0x7f0000002580)=""/32, 0x20}, 0x7fff}, {{&(0x7f00000025c0)=@hci, 0x80, &(0x7f0000003a40)=[{&(0x7f0000002640)=""/179, 0xb3}, {&(0x7f0000002700)=""/126, 0x7e}, {&(0x7f0000002780)=""/68, 0x44}, {&(0x7f0000002800)=""/14, 0xe}, {&(0x7f0000002840)=""/4096, 0x1000}, {&(0x7f0000003840)=""/7, 0x7}, {&(0x7f0000003880)=""/142, 0x8e}, {&(0x7f0000003940)=""/142, 0x8e}, {&(0x7f0000003a00)=""/26, 0x1a}], 0x9, &(0x7f0000003b00)=""/37, 0x25}, 0xd6}, {{&(0x7f0000003b40)=@alg, 0x80, &(0x7f0000005e80)=[{&(0x7f0000003bc0)=""/103, 0x67}, {&(0x7f0000003c40)=""/231, 0xe7}, {&(0x7f0000003d40)=""/4096, 0x1000}, {&(0x7f0000004d40)=""/105, 0x69}, {&(0x7f0000004dc0)=""/4096, 0x1000}, {&(0x7f0000005dc0)=""/149, 0x95}], 0x6, &(0x7f0000005f00)=""/141, 0x8d}, 0x80}, {{&(0x7f0000005fc0)=@ax25={{0x3, @bcast}, [@netrom, @remote, @remote, @null, @null, @remote, @null]}, 0x80, &(0x7f00000061c0)=[{&(0x7f0000006040)=""/234, 0xea}, {&(0x7f0000006140)=""/83, 0x53}], 0x2}, 0x80000000}, {{&(0x7f0000006200)=@caif=@rfm, 0x80, &(0x7f0000006500)=[{&(0x7f0000006280)=""/166, 0xa6}, {&(0x7f0000006340)=""/150, 0x96}, {&(0x7f0000006400)=""/191, 0xbf}, {&(0x7f00000064c0)=""/28, 0x1c}], 0x4, &(0x7f0000006540)=""/58, 0x3a}, 0x6}], 0x8, 0x141, &(0x7f00000067c0)={r5, r6+30000000}) [ 2613.296115][T13912] FAULT_INJECTION: forcing a failure. [ 2613.296115][T13912] name failslab, interval 1, probability 0, space 0, times 0 [ 2613.304730][T13913] FAULT_INJECTION: forcing a failure. [ 2613.304730][T13913] name failslab, interval 1, probability 0, space 0, times 0 [ 2613.314190][T13912] CPU: 1 PID: 13912 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2613.329361][T13912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2613.339413][T13912] Call Trace: [ 2613.342704][T13912] dump_stack+0x172/0x1f0 [ 2613.347036][T13912] should_fail.cold+0xa/0x15 [ 2613.351627][T13912] ? fault_create_debugfs_attr+0x180/0x180 [ 2613.357440][T13912] ? ___might_sleep+0x163/0x2c0 [ 2613.362292][T13912] __should_failslab+0x121/0x190 [ 2613.367231][T13912] should_failslab+0x9/0x14 [ 2613.371729][T13912] __kmalloc+0x2e0/0x770 [ 2613.375965][T13912] ? __local_bh_enable_ip+0x15a/0x270 [ 2613.381338][T13912] ? lock_sock_nested+0xe2/0x120 [ 2613.386278][T13912] ? __local_bh_enable_ip+0x15a/0x270 [ 2613.391651][T13912] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2613.396936][T13912] ? lock_sock_nested+0x9a/0x120 [ 2613.401871][T13912] ? sock_kmalloc+0xc6/0x120 [ 2613.406463][T13912] sock_kmalloc+0xc6/0x120 [ 2613.410890][T13912] hash_alloc_result.part.0+0x95/0x110 [ 2613.416347][T13912] hash_sendpage+0x7a7/0x9d0 [ 2613.420939][T13912] hash_sendpage_nokey+0x94/0xa0 [ 2613.425883][T13912] kernel_sendpage+0x92/0xf0 [ 2613.430469][T13912] ? hash_check_key.isra.0+0x230/0x230 [ 2613.435925][T13912] sock_sendpage+0x8b/0xc0 [ 2613.440347][T13912] pipe_to_sendpage+0x296/0x360 [ 2613.445198][T13912] ? kernel_sendpage+0xf0/0xf0 [ 2613.449962][T13912] ? direct_splice_actor+0x190/0x190 [ 2613.455248][T13912] ? __put_page+0xa7/0xe0 [ 2613.459574][T13912] ? anon_pipe_buf_release+0x1c6/0x270 [ 2613.465037][T13912] __splice_from_pipe+0x397/0x7d0 [ 2613.470066][T13912] ? direct_splice_actor+0x190/0x190 [ 2613.475361][T13912] ? direct_splice_actor+0x190/0x190 [ 2613.480640][T13912] splice_from_pipe+0x108/0x170 [ 2613.485492][T13912] ? splice_shrink_spd+0xd0/0xd0 [ 2613.490432][T13912] ? apparmor_file_permission+0x25/0x30 [ 2613.495983][T13912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2613.502222][T13912] ? security_file_permission+0x8f/0x380 [ 2613.507866][T13912] generic_splice_sendpage+0x3c/0x50 [ 2613.513146][T13912] ? splice_from_pipe+0x170/0x170 [ 2613.518165][T13912] do_splice+0x708/0x1410 [ 2613.522502][T13912] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2613.527620][T13912] ? __fget_light+0x1a9/0x230 [ 2613.532298][T13912] __x64_sys_splice+0x2c6/0x330 [ 2613.537159][T13912] do_syscall_64+0xfa/0x760 [ 2613.541665][T13912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2613.547549][T13912] RIP: 0033:0x459f49 [ 2613.551443][T13912] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2613.571044][T13912] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2613.579454][T13912] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2613.587425][T13912] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2613.595397][T13912] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2613.603367][T13912] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2613.611334][T13912] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2613.619321][T13913] CPU: 0 PID: 13913 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2613.627222][T13913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2613.637274][T13913] Call Trace: [ 2613.640564][T13913] dump_stack+0x172/0x1f0 [ 2613.644903][T13913] should_fail.cold+0xa/0x15 [ 2613.649500][T13913] ? fault_create_debugfs_attr+0x180/0x180 [ 2613.655302][T13913] ? ___might_sleep+0x163/0x2c0 [ 2613.660158][T13913] __should_failslab+0x121/0x190 [ 2613.665099][T13913] should_failslab+0x9/0x14 [ 2613.669582][T13913] __kmalloc+0x2e0/0x770 [ 2613.673801][T13913] ? __local_bh_enable_ip+0x15a/0x270 [ 2613.679152][T13913] ? lock_sock_nested+0xe2/0x120 [ 2613.684066][T13913] ? __local_bh_enable_ip+0x15a/0x270 [ 2613.689420][T13913] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2613.694691][T13913] ? lock_sock_nested+0x9a/0x120 [ 2613.699624][T13913] ? sock_kmalloc+0xc6/0x120 [ 2613.704198][T13913] sock_kmalloc+0xc6/0x120 [ 2613.708613][T13913] hash_alloc_result.part.0+0x95/0x110 [ 2613.714049][T13913] hash_sendpage+0x7a7/0x9d0 [ 2613.718636][T13913] hash_sendpage_nokey+0x94/0xa0 [ 2613.723567][T13913] kernel_sendpage+0x92/0xf0 [ 2613.728151][T13913] ? hash_check_key.isra.0+0x230/0x230 [ 2613.733604][T13913] sock_sendpage+0x8b/0xc0 [ 2613.738013][T13913] pipe_to_sendpage+0x296/0x360 [ 2613.742856][T13913] ? kernel_sendpage+0xf0/0xf0 [ 2613.747616][T13913] ? direct_splice_actor+0x190/0x190 [ 2613.752895][T13913] ? __put_page+0xa7/0xe0 [ 2613.757203][T13913] ? anon_pipe_buf_release+0x1c6/0x270 [ 2613.762643][T13913] __splice_from_pipe+0x397/0x7d0 [ 2613.767662][T13913] ? direct_splice_actor+0x190/0x190 [ 2613.772972][T13913] ? direct_splice_actor+0x190/0x190 [ 2613.778236][T13913] splice_from_pipe+0x108/0x170 [ 2613.783072][T13913] ? splice_shrink_spd+0xd0/0xd0 [ 2613.788018][T13913] ? apparmor_file_permission+0x25/0x30 [ 2613.793558][T13913] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2613.799776][T13913] ? security_file_permission+0x8f/0x380 [ 2613.805400][T13913] generic_splice_sendpage+0x3c/0x50 [ 2613.810683][T13913] ? splice_from_pipe+0x170/0x170 [ 2613.815694][T13913] do_splice+0x708/0x1410 [ 2613.820021][T13913] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2613.825114][T13913] ? __fget_light+0x1a9/0x230 [ 2613.829770][T13913] __x64_sys_splice+0x2c6/0x330 [ 2613.834604][T13913] do_syscall_64+0xfa/0x760 [ 2613.839088][T13913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2613.844959][T13913] RIP: 0033:0x459f49 [ 2613.848831][T13913] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2613.868415][T13913] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2613.876819][T13913] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2613.884787][T13913] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2613.892746][T13913] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2613.900700][T13913] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2613.908674][T13913] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:31:26 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x100000000000000) 23:31:26 executing program 1 (fault-call:11 fault-nth:16): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:26 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r5, &(0x7f0000002780), 0x400004d, 0x0) setsockopt$bt_BT_DEFER_SETUP(r5, 0x112, 0x7, &(0x7f00000000c0), 0x4) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:26 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) sendmsg(r0, &(0x7f00000004c0)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e24}, 0x0, 0x2, 0x0, 0x2}}, 0x80, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000340)="a1c24e9ba4d605c20cd3b7", 0xb}], 0x2}, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) r2 = openat$cgroup(r1, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000001c0)='syz1\x00', 0x1ff) ppoll(&(0x7f0000000040)=[{r0, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='c9\x87\xf9M\x9f\xbd\x03\x97ta\\\x00', 0x26e1, 0x25fa) write$cgroup_subtree(r3, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x8) ppoll(&(0x7f0000000080)=[{r0, 0x80}], 0x1, &(0x7f00000000c0)={0x77359400}, 0x0, 0x20000000) socket$inet6(0xa, 0x2, 0xe0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000ab80)={0x0, 0x0, 0x0}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc020662a, &(0x7f00000000c0)={0x4000000, r5, 0x1800}) setsockopt$TIPC_DEST_DROPPABLE(r5, 0x10f, 0x81, &(0x7f0000000200)=0x4617, 0x4) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) setsockopt$netrom_NETROM_T1(0xffffffffffffffff, 0x103, 0x1, 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000580)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="199e31332e14344b26a749fc824cc89f", @remote, 0x0, 0x2, 0x0, 0x400, 0x7, 0x1000000}) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, 0x0, &(0x7f0000000140)) 23:31:26 executing program 2 (fault-call:10 fault-nth:17): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2614.261768][T13931] FAULT_INJECTION: forcing a failure. [ 2614.261768][T13931] name failslab, interval 1, probability 0, space 0, times 0 [ 2614.302524][T13935] FAULT_INJECTION: forcing a failure. [ 2614.302524][T13935] name failslab, interval 1, probability 0, space 0, times 0 [ 2614.335041][T13931] CPU: 0 PID: 13931 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2614.342970][T13931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2614.353042][T13931] Call Trace: [ 2614.356349][T13931] dump_stack+0x172/0x1f0 [ 2614.360695][T13931] should_fail.cold+0xa/0x15 [ 2614.365299][T13931] ? fault_create_debugfs_attr+0x180/0x180 [ 2614.371113][T13931] ? ___might_sleep+0x163/0x2c0 [ 2614.375985][T13931] __should_failslab+0x121/0x190 [ 2614.380938][T13931] should_failslab+0x9/0x14 [ 2614.385456][T13931] __kmalloc+0x2e0/0x770 [ 2614.389700][T13931] ? __local_bh_enable_ip+0x15a/0x270 [ 2614.395076][T13931] ? lock_sock_nested+0xe2/0x120 [ 2614.400018][T13931] ? __local_bh_enable_ip+0x15a/0x270 [ 2614.405393][T13931] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2614.410681][T13931] ? lock_sock_nested+0x9a/0x120 [ 2614.415618][T13931] ? sock_kmalloc+0xc6/0x120 [ 2614.420208][T13931] sock_kmalloc+0xc6/0x120 [ 2614.424628][T13931] hash_alloc_result.part.0+0x95/0x110 [ 2614.430086][T13931] hash_sendpage+0x7a7/0x9d0 [ 2614.434691][T13931] hash_sendpage_nokey+0x94/0xa0 [ 2614.439633][T13931] kernel_sendpage+0x92/0xf0 [ 2614.444219][T13931] ? hash_check_key.isra.0+0x230/0x230 [ 2614.449679][T13931] sock_sendpage+0x8b/0xc0 [ 2614.454102][T13931] pipe_to_sendpage+0x296/0x360 [ 2614.458954][T13931] ? kernel_sendpage+0xf0/0xf0 [ 2614.463727][T13931] ? direct_splice_actor+0x190/0x190 [ 2614.469022][T13931] ? __put_page+0xa7/0xe0 [ 2614.473358][T13931] ? anon_pipe_buf_release+0x1c6/0x270 [ 2614.478832][T13931] __splice_from_pipe+0x397/0x7d0 [ 2614.483869][T13931] ? direct_splice_actor+0x190/0x190 [ 2614.489172][T13931] ? direct_splice_actor+0x190/0x190 [ 2614.494459][T13931] splice_from_pipe+0x108/0x170 [ 2614.499328][T13931] ? splice_shrink_spd+0xd0/0xd0 [ 2614.504276][T13931] ? apparmor_file_permission+0x25/0x30 [ 2614.509829][T13931] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2614.516073][T13931] ? security_file_permission+0x8f/0x380 [ 2614.521712][T13931] generic_splice_sendpage+0x3c/0x50 [ 2614.527011][T13931] ? splice_from_pipe+0x170/0x170 [ 2614.532039][T13931] do_splice+0x708/0x1410 [ 2614.536379][T13931] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2614.541495][T13931] ? __fget_light+0x1a9/0x230 [ 2614.546179][T13931] __x64_sys_splice+0x2c6/0x330 [ 2614.551041][T13931] do_syscall_64+0xfa/0x760 [ 2614.555556][T13931] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2614.561448][T13931] RIP: 0033:0x459f49 [ 2614.565349][T13931] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2614.584955][T13931] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2614.593373][T13931] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 23:31:27 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc020662a, &(0x7f00000000c0)={0x4000000, r6, 0x1800}) bind$bt_sco(r5, &(0x7f00000000c0)={0x1f, {0x3, 0xff, 0x4, 0x5, 0x16, 0x1}}, 0x8) getsockname(r3, &(0x7f0000000300)=@tipc=@id, &(0x7f0000000380)=0x80) r7 = syz_init_net_socket$ax25(0x3, 0x2, 0xc3) pread64(r7, &(0x7f00000003c0)=""/109, 0x6d, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc020662a, &(0x7f00000000c0)={0x4000000, r9, 0x1800}) getpeername$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'vlan0\x00', r10}) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2614.601344][T13931] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2614.609312][T13931] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2614.617276][T13931] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2614.625243][T13931] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2614.633236][T13935] CPU: 1 PID: 13935 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2614.641132][T13935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2614.651219][T13935] Call Trace: [ 2614.654530][T13935] dump_stack+0x172/0x1f0 [ 2614.658878][T13935] should_fail.cold+0xa/0x15 [ 2614.663476][T13935] ? fault_create_debugfs_attr+0x180/0x180 [ 2614.669287][T13935] ? ___might_sleep+0x163/0x2c0 [ 2614.674162][T13935] __should_failslab+0x121/0x190 [ 2614.679108][T13935] should_failslab+0x9/0x14 [ 2614.683617][T13935] __kmalloc+0x2e0/0x770 [ 2614.687863][T13935] ? __local_bh_enable_ip+0x15a/0x270 [ 2614.693225][T13935] ? lock_sock_nested+0xe2/0x120 [ 2614.698153][T13935] ? __local_bh_enable_ip+0x15a/0x270 [ 2614.703568][T13935] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2614.708840][T13935] ? lock_sock_nested+0x9a/0x120 [ 2614.713771][T13935] ? sock_kmalloc+0xc6/0x120 [ 2614.718430][T13935] sock_kmalloc+0xc6/0x120 [ 2614.722861][T13935] hash_alloc_result.part.0+0x95/0x110 [ 2614.728336][T13935] hash_sendpage+0x7a7/0x9d0 [ 2614.732948][T13935] hash_sendpage_nokey+0x94/0xa0 [ 2614.737935][T13935] kernel_sendpage+0x92/0xf0 [ 2614.742544][T13935] ? hash_check_key.isra.0+0x230/0x230 [ 2614.748027][T13935] sock_sendpage+0x8b/0xc0 [ 2614.752462][T13935] pipe_to_sendpage+0x296/0x360 [ 2614.757321][T13935] ? kernel_sendpage+0xf0/0xf0 [ 2614.762093][T13935] ? direct_splice_actor+0x190/0x190 [ 2614.767389][T13935] ? __put_page+0xa7/0xe0 [ 2614.771728][T13935] ? anon_pipe_buf_release+0x1c6/0x270 [ 2614.777197][T13935] __splice_from_pipe+0x397/0x7d0 [ 2614.782233][T13935] ? direct_splice_actor+0x190/0x190 [ 2614.787533][T13935] ? direct_splice_actor+0x190/0x190 [ 2614.792835][T13935] splice_from_pipe+0x108/0x170 [ 2614.797699][T13935] ? splice_shrink_spd+0xd0/0xd0 [ 2614.802654][T13935] ? apparmor_file_permission+0x25/0x30 [ 2614.808212][T13935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2614.814465][T13935] ? security_file_permission+0x8f/0x380 [ 2614.820117][T13935] generic_splice_sendpage+0x3c/0x50 [ 2614.825443][T13935] ? splice_from_pipe+0x170/0x170 [ 2614.830502][T13935] do_splice+0x708/0x1410 [ 2614.834887][T13935] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2614.840016][T13935] ? __fget_light+0x1a9/0x230 [ 2614.844701][T13935] __x64_sys_splice+0x2c6/0x330 [ 2614.849567][T13935] do_syscall_64+0xfa/0x760 [ 2614.854082][T13935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2614.859970][T13935] RIP: 0033:0x459f49 [ 2614.863870][T13935] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2614.883477][T13935] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2614.891897][T13935] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2614.899879][T13935] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2614.907856][T13935] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2614.915835][T13935] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2614.923812][T13935] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:31:32 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, 0x0, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:32 executing program 1 (fault-call:11 fault-nth:17): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:32 executing program 2 (fault-call:10 fault-nth:18): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:32 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x295471bb24a2ad2) 23:31:32 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x300000200008990, &(0x7f00000000c0)={'bond0\x00?z\a!\x00\x00\x00\x06\x00\x05', @ifru_names='ip_vti0\x00\x03\x00'}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc020662a, &(0x7f00000000c0)={0x4000000, r2, 0x1800}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x34244000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xf8, r3, 0x4, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xa0}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x70, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x1b}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="82d98fd5dfb6f4342cc84cb9ef809f88"}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xf}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xcd}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0xf8}, 0x1, 0x0, 0x0, 0x48002850}, 0x4000850) 23:31:32 executing program 0: r0 = socket$inet_sctp(0x2, 0x4, 0x84) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) listen(r1, 0x8) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r2, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r1, 0x0, r4, 0x0, 0x80000001, 0x0) [ 2619.620341][T13964] bond0: (slave ip_vti0): The slave device specified does not support setting the MAC address [ 2619.631431][T13964] bond0: (slave ip_vti0): Error -95 calling set_mac_address [ 2619.655233][T13964] bond0: (slave ip_vti0): The slave device specified does not support setting the MAC address [ 2619.671343][T13964] bond0: (slave ip_vti0): Error -95 calling set_mac_address [ 2619.681663][T13978] FAULT_INJECTION: forcing a failure. [ 2619.681663][T13978] name failslab, interval 1, probability 0, space 0, times 0 [ 2619.695079][T13978] CPU: 0 PID: 13978 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2619.702981][T13978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2619.713035][T13978] Call Trace: [ 2619.716338][T13978] dump_stack+0x172/0x1f0 [ 2619.720681][T13978] should_fail.cold+0xa/0x15 [ 2619.723767][T13980] FAULT_INJECTION: forcing a failure. [ 2619.723767][T13980] name failslab, interval 1, probability 0, space 0, times 0 [ 2619.725275][T13978] ? fault_create_debugfs_attr+0x180/0x180 [ 2619.725297][T13978] ? ___might_sleep+0x163/0x2c0 [ 2619.725316][T13978] __should_failslab+0x121/0x190 [ 2619.725335][T13978] should_failslab+0x9/0x14 [ 2619.757936][T13978] __kmalloc+0x2e0/0x770 [ 2619.762180][T13978] ? __local_bh_enable_ip+0x15a/0x270 [ 2619.767547][T13978] ? lock_sock_nested+0xe2/0x120 [ 2619.772488][T13978] ? __local_bh_enable_ip+0x15a/0x270 [ 2619.777860][T13978] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2619.783157][T13978] ? lock_sock_nested+0x9a/0x120 [ 2619.788092][T13978] ? sock_kmalloc+0xc6/0x120 [ 2619.792678][T13978] sock_kmalloc+0xc6/0x120 [ 2619.797094][T13978] hash_alloc_result.part.0+0x95/0x110 [ 2619.802546][T13978] hash_sendpage+0x7a7/0x9d0 [ 2619.807137][T13978] hash_sendpage_nokey+0x94/0xa0 [ 2619.812074][T13978] kernel_sendpage+0x92/0xf0 [ 2619.816660][T13978] ? hash_check_key.isra.0+0x230/0x230 [ 2619.822118][T13978] sock_sendpage+0x8b/0xc0 [ 2619.826536][T13978] pipe_to_sendpage+0x296/0x360 [ 2619.831382][T13978] ? kernel_sendpage+0xf0/0xf0 [ 2619.836155][T13978] ? direct_splice_actor+0x190/0x190 [ 2619.841436][T13978] ? __put_page+0xa7/0xe0 [ 2619.845757][T13978] ? anon_pipe_buf_release+0x1c6/0x270 [ 2619.851215][T13978] __splice_from_pipe+0x397/0x7d0 [ 2619.856238][T13978] ? direct_splice_actor+0x190/0x190 [ 2619.861523][T13978] ? direct_splice_actor+0x190/0x190 [ 2619.866799][T13978] splice_from_pipe+0x108/0x170 [ 2619.871646][T13978] ? splice_shrink_spd+0xd0/0xd0 [ 2619.876586][T13978] ? apparmor_file_permission+0x25/0x30 [ 2619.882124][T13978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2619.888357][T13978] ? security_file_permission+0x8f/0x380 [ 2619.893991][T13978] generic_splice_sendpage+0x3c/0x50 [ 2619.899271][T13978] ? splice_from_pipe+0x170/0x170 [ 2619.904292][T13978] do_splice+0x708/0x1410 [ 2619.908626][T13978] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2619.913747][T13978] ? __fget_light+0x1a9/0x230 [ 2619.918428][T13978] __x64_sys_splice+0x2c6/0x330 [ 2619.923282][T13978] do_syscall_64+0xfa/0x760 [ 2619.927786][T13978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2619.933667][T13978] RIP: 0033:0x459f49 [ 2619.937575][T13978] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2619.957444][T13978] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 23:31:32 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='memory.max\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x0, 0x84) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x800005, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000003b3d443b26a57249014354322ff58ee55c709e1e8804c55f5ffa594f80fd326d773d9f94acd175b31834056ea5ac6cef06ed60e0e0c913d9f18d3dc1a501e8ccef4437a3693e5f471d095c251c3037d8d97634047a5d4d98a32a466b02f2d69f67814aacbfbe947a86b56c6ccb6a5a0d0a2d2a4528f0e4e4d30e43f6b752c0c6b978e74e4819ca5cb9757d53ae5f95f3afd6898051befecd7c0bd83078173e1e16be2b3f2f435bec2d45ed516b8317f0a34fdb3c78783b9ea30f775c6e4188ec3ceb682224d984d929828a28637d", @ANYRES32=0x0], 0x0) r5 = socket(0x0, 0x1, 0x0) close(r5) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r5, 0x84, 0x17, &(0x7f0000000180)={r4}, 0x8) sendmsg$nl_netfilter(r5, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4040000}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r7 = accept4$bt_l2cap(r2, &(0x7f0000000280), &(0x7f00000003c0)=0xe, 0x80800) getsockopt$bt_l2cap_L2CAP_CONNINFO(r7, 0x6, 0x2, &(0x7f0000000400), &(0x7f0000000440)=0x6) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x6db6e559) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000480), 0xc, &(0x7f0000000680)={&(0x7f00000004c0)={0x19c, 0x10, 0x4, 0x10, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x6}, [@typed={0xe8, 0x10, @binary="6774e7cc43f3cc4da812922316b5b984cd1d4f7f0ff24ef3f3bc3c4b02eea2ee2c4334a6ee6004ae97f21ec888a166c101b9f3457b950bf1402043ecb2f5120f269b6f1e1b4063eee3cd75f2fbbea0e8a2ce159e897ea0069e83c3674a2442748fc690904f5d9ac8b295b7d604699879c661ed3014c61353653dcf507661ba248eeba5aff0d25e060a146f60d793f1e252305482ce2c94c941c2e26dbfa9af26bc719d940cdc0e010a52760b4da26c3437a4e6df0f032a10a13c661b4d78a87492226897adce515b6754236ef64cad5b65f7408448ced7519edbb61d01575fb2bfa133fb"}, @generic="aa068ab26f2f70a10efd400f9101bb8a7efe45dd73cabde77835b002e3448f3293e0c3906d775f5f14b490f6b998bcdccd31d09ff5609555fe89b7d616b9665fbb1d523dfbeddd7635a81c5565fcf39f8547d7881960457f740f5460e2253af12fe2495fb0653a0c37265dc55e7aec8f2c24d5d5466789ce0a1725a8a4736934943bcb4b0f2139a5e1fd3666e89e705145f8cb1fc74b317a422e53d32f"]}, 0x19c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'rmd128\x00'}, 0x58) r9 = accept(r3, &(0x7f0000000700)=@nfc_llcp, &(0x7f0000000780)=0x80) getsockopt$inet_tcp_buf(r9, 0x6, 0x17, &(0x7f00000007c0)=""/37, &(0x7f0000000800)=0x25) r10 = accept4(r8, 0x0, 0x0, 0x0) sendto$unix(r10, &(0x7f0000000100), 0x14ded905162a6c92, 0x0, 0x0, 0xfffffffffffffec6) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r11 = socket(0x0, 0x0, 0x0) sendmmsg$alg(r11, &(0x7f0000000140), 0x0, 0x0) sendfile(r1, r2, 0x0, 0x20000022) [ 2619.965939][T13978] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2619.973909][T13978] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2619.982428][T13978] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2619.990414][T13978] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2619.998380][T13978] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2620.006374][T13980] CPU: 1 PID: 13980 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2620.014274][T13980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2620.024338][T13980] Call Trace: [ 2620.027659][T13980] dump_stack+0x172/0x1f0 [ 2620.032012][T13980] should_fail.cold+0xa/0x15 [ 2620.036704][T13980] ? fault_create_debugfs_attr+0x180/0x180 [ 2620.042539][T13980] ? ___might_sleep+0x163/0x2c0 [ 2620.047399][T13980] __should_failslab+0x121/0x190 [ 2620.052348][T13980] should_failslab+0x9/0x14 [ 2620.056880][T13980] __kmalloc+0x2e0/0x770 [ 2620.061146][T13980] ? __local_bh_enable_ip+0x15a/0x270 [ 2620.066524][T13980] ? lock_sock_nested+0xe2/0x120 [ 2620.071567][T13980] ? __local_bh_enable_ip+0x15a/0x270 [ 2620.076946][T13980] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2620.082332][T13980] ? lock_sock_nested+0x9a/0x120 [ 2620.087269][T13980] ? sock_kmalloc+0xc6/0x120 [ 2620.087286][T13980] sock_kmalloc+0xc6/0x120 [ 2620.087305][T13980] hash_alloc_result.part.0+0x95/0x110 [ 2620.087319][T13980] hash_sendpage+0x7a7/0x9d0 [ 2620.087338][T13980] hash_sendpage_nokey+0x94/0xa0 [ 2620.087355][T13980] kernel_sendpage+0x92/0xf0 [ 2620.087372][T13980] ? hash_check_key.isra.0+0x230/0x230 [ 2620.121782][T13980] sock_sendpage+0x8b/0xc0 [ 2620.126212][T13980] pipe_to_sendpage+0x296/0x360 [ 2620.131072][T13980] ? kernel_sendpage+0xf0/0xf0 [ 2620.135852][T13980] ? direct_splice_actor+0x190/0x190 [ 2620.141145][T13980] ? __put_page+0xa7/0xe0 [ 2620.145482][T13980] ? anon_pipe_buf_release+0x1c6/0x270 [ 2620.150952][T13980] __splice_from_pipe+0x397/0x7d0 [ 2620.156163][T13980] ? direct_splice_actor+0x190/0x190 [ 2620.161462][T13980] ? direct_splice_actor+0x190/0x190 [ 2620.166749][T13980] splice_from_pipe+0x108/0x170 [ 2620.171610][T13980] ? splice_shrink_spd+0xd0/0xd0 [ 2620.176555][T13980] ? apparmor_file_permission+0x25/0x30 [ 2620.182106][T13980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2620.188352][T13980] ? security_file_permission+0x8f/0x380 [ 2620.194000][T13980] generic_splice_sendpage+0x3c/0x50 [ 2620.199376][T13980] ? splice_from_pipe+0x170/0x170 [ 2620.204406][T13980] do_splice+0x708/0x1410 [ 2620.208751][T13980] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2620.213863][T13980] ? __fget_light+0x1a9/0x230 [ 2620.218545][T13980] __x64_sys_splice+0x2c6/0x330 [ 2620.223670][T13980] do_syscall_64+0xfa/0x760 [ 2620.228185][T13980] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2620.234613][T13980] RIP: 0033:0x459f49 [ 2620.238518][T13980] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2620.258124][T13980] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2620.266547][T13980] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2620.274523][T13980] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2620.282673][T13980] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2620.290647][T13980] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2620.298621][T13980] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:31:32 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000a80)=[{&(0x7f0000000340)="8874df9368bd81f939be399f37c6aece12e83b21881e9e9788b1b62ab9c3f3ab9f170ad982f95ce8"}, {&(0x7f0000000480)="ec4c435f29bd471d1942f4e8d9e46bc43ab02ea6902734a7479f6211638a9664f33a376849645424f1f7ac5ec415de423946bc50c0f142847092da5ae977965a242c40d936487b25b2717f5c5ebe37681d67cf7db4542d8c9ba514021fe07f4a3e86123c2b30f5c32e5bf582d543819fb79830ca9483fa86684f2a50bcd4a5db9a616367f1c80eef68c1d5c4e2d2bbf82abdecbcbfdbfb910be1458175f7196d7a064496c1c2c828b80145a782525ba24682b6d1b61daa0f0b659db7daed9cf1113c0ee8a0cb929d3a10afa0392d5286ec57a612193d4bda4d1fa4bbe217052ead"}, {&(0x7f0000000380)="5e0cec1e99d9fa95f0ade2a04adf0e361bb3c33b39007322714be794594273eab747cfbc9e26a9311f9561c55249526cc88d1a6f7fb5772e7c5cdf3216a7cdd2fe2035b2927afafd6daca8c94f83b092fa36160676b2fa142915e36d0109dd25d9cf1fb0221af67fa7ae7913567488cc3ff59e882f67a8409aa73e13bb"}, {&(0x7f0000000580)="d033204ba3ed38c98cfc3939f032b6f23dbada2ea52c71f167e4a837d60d30df32b451e222dd42a62ccb58f857d9ca99890367dc10e78fa0088c7e55740d2fa313b7ef0dc55776dce7f1abbc041b5d1c4e5cafbfc6922785"}, {&(0x7f0000000600)="ce7732f4f8dded1749f3e2d298f33045eb8278f6f02c07d416ffa9f319ab8b4cd3a5e1afbe70328b0f890e85072484e704a961dd22d2b1d6ea3cbc095f65d360643dc4896c2813607dbda01eb84655416c7bb3a66b3733c38b14bf0908ef0ef4bdb1ce4ce74abc4dc8fd1ffc"}, {&(0x7f0000000680)="f6d845e6cff55b72ffc81b50fbf4372be5470016327fa5e371378e9451929ddbcb0e26c4fd89c5f0daf9321c76df98df8f666099d4b18a8713b8ca244f8124066b79c3e99c008005da67eb06fe9b5423612c74289a005792dfcc26518a36064626e27e935df1d07438c175fc382c1dc2257d2598b200e105291a4d9043ed5e3ff59bbd438ae3f840448ab2d95a96bc673bea431658894c431fdd1bbb15fdc9b1d22366a7fd897cd7737f991e"}, {&(0x7f0000000a00)="980cdf4ce5dfe7b93af63cd7d46dd5ec66847691929d6e9a6bc497f0cf8ffbfe3ef1610aeef89ee59bda8eeb82638cb2c076a6e6f4963f8ad3226be35b57f8a5e24752a9899b4736c9d0fe9bc36043364294e11558e0652596969be7a2dbdf3057dba35c13632e01479199a216", 0xa387a9f14e92f07e}, {&(0x7f00000007c0)="fd3616c560ee790938577cd077f5e419cc2f270f4d4e33681fab3702b6c3de846f255099afb4d094ad7920dc4e9674f9a4e1afb2069d3fa5f7936d4253ccde0438812090bc9b20b5b76de2e5036c47fcedb0b025ba95366d98557f2166b44beab327ec5cb837c0f0245bdc6b7bdfda97d67cf1ae64f2f6808d5881f5d0de949d52b0912d9c5b16188ce778eba3e793f5a12c1cfa0995432772c5098dad7ce272e9a9"}, {&(0x7f0000000400)="7e69eb21170623667576626abcf884c035b12689798a"}, {&(0x7f0000000880)="77ecaafbf67c680a46fa955aa021130894bf1e8fedd9dbed732ca11d164eb5f34b29ebcdc9ca9f7ac74e0adfcfa88fdd0bce82163ac3c4165198b0a520a96da90063185c8404393636dfd832ce55ab754ac0027e09f4b07c756194e5dd4b55bafc191ff0ebd8f704e6e79420c13829e43da569b755b0fb9a50598d6df4b26a5ba678d4dc7e68ef85170e207ed3bdddd93a972d44eec7e2a45f78a8a426e9d1b4038f17f9d9ece9e57e289b"}], 0x236, 0x8) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:33 executing program 2 (fault-call:10 fault-nth:19): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:33 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x6c1826d346ef860) 23:31:33 executing program 1 (fault-call:11 fault-nth:18): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2620.646679][T14008] FAULT_INJECTION: forcing a failure. [ 2620.646679][T14008] name failslab, interval 1, probability 0, space 0, times 0 [ 2620.666583][T14008] CPU: 1 PID: 14008 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2620.674504][T14008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2620.684559][T14008] Call Trace: [ 2620.687863][T14008] dump_stack+0x172/0x1f0 [ 2620.692207][T14008] should_fail.cold+0xa/0x15 [ 2620.696803][T14008] ? fault_create_debugfs_attr+0x180/0x180 [ 2620.702626][T14008] ? ___might_sleep+0x163/0x2c0 [ 2620.707487][T14008] __should_failslab+0x121/0x190 [ 2620.712428][T14008] should_failslab+0x9/0x14 [ 2620.716933][T14008] __kmalloc+0x2e0/0x770 [ 2620.721184][T14008] ? __local_bh_enable_ip+0x15a/0x270 [ 2620.726560][T14008] ? lock_sock_nested+0xe2/0x120 [ 2620.731605][T14008] ? __local_bh_enable_ip+0x15a/0x270 [ 2620.737104][T14008] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2620.742398][T14008] ? lock_sock_nested+0x9a/0x120 [ 2620.747343][T14008] ? sock_kmalloc+0xc6/0x120 [ 2620.751938][T14008] sock_kmalloc+0xc6/0x120 [ 2620.756359][T14008] hash_alloc_result.part.0+0x95/0x110 [ 2620.761820][T14008] hash_sendpage+0x7a7/0x9d0 [ 2620.766419][T14008] hash_sendpage_nokey+0x94/0xa0 [ 2620.771366][T14008] kernel_sendpage+0x92/0xf0 [ 2620.775960][T14008] ? hash_check_key.isra.0+0x230/0x230 [ 2620.781424][T14008] sock_sendpage+0x8b/0xc0 [ 2620.785853][T14008] pipe_to_sendpage+0x296/0x360 [ 2620.790708][T14008] ? kernel_sendpage+0xf0/0xf0 [ 2620.790856][T14009] FAULT_INJECTION: forcing a failure. [ 2620.790856][T14009] name failslab, interval 1, probability 0, space 0, times 0 [ 2620.795471][T14008] ? direct_splice_actor+0x190/0x190 [ 2620.795494][T14008] ? __put_page+0xa7/0xe0 [ 2620.795510][T14008] ? anon_pipe_buf_release+0x1c6/0x270 [ 2620.795528][T14008] __splice_from_pipe+0x397/0x7d0 [ 2620.795546][T14008] ? direct_splice_actor+0x190/0x190 [ 2620.833461][T14008] ? direct_splice_actor+0x190/0x190 [ 2620.838760][T14008] splice_from_pipe+0x108/0x170 [ 2620.843618][T14008] ? splice_shrink_spd+0xd0/0xd0 [ 2620.848568][T14008] ? apparmor_file_permission+0x25/0x30 [ 2620.854117][T14008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2620.860364][T14008] ? security_file_permission+0x8f/0x380 [ 2620.866004][T14008] generic_splice_sendpage+0x3c/0x50 [ 2620.871296][T14008] ? splice_from_pipe+0x170/0x170 [ 2620.876320][T14008] do_splice+0x708/0x1410 [ 2620.880660][T14008] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2620.885771][T14008] ? __fget_light+0x1a9/0x230 [ 2620.890467][T14008] __x64_sys_splice+0x2c6/0x330 [ 2620.895333][T14008] do_syscall_64+0xfa/0x760 [ 2620.899850][T14008] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2620.905744][T14008] RIP: 0033:0x459f49 [ 2620.909643][T14008] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2620.930201][T14008] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2620.938614][T14008] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2620.946593][T14008] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2620.954563][T14008] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2620.962545][T14008] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2620.970648][T14008] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2620.978647][T14009] CPU: 0 PID: 14009 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2620.986551][T14009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2620.996608][T14009] Call Trace: [ 2620.999907][T14009] dump_stack+0x172/0x1f0 [ 2621.004254][T14009] should_fail.cold+0xa/0x15 [ 2621.008857][T14009] ? fault_create_debugfs_attr+0x180/0x180 [ 2621.014715][T14009] ? ___might_sleep+0x163/0x2c0 [ 2621.019586][T14009] __should_failslab+0x121/0x190 [ 2621.024536][T14009] should_failslab+0x9/0x14 [ 2621.029047][T14009] __kmalloc+0x2e0/0x770 [ 2621.033297][T14009] ? __local_bh_enable_ip+0x15a/0x270 [ 2621.038687][T14009] ? lock_sock_nested+0xe2/0x120 [ 2621.043627][T14009] ? __local_bh_enable_ip+0x15a/0x270 [ 2621.049002][T14009] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2621.054286][T14009] ? lock_sock_nested+0x9a/0x120 [ 2621.059225][T14009] ? sock_kmalloc+0xc6/0x120 [ 2621.063818][T14009] sock_kmalloc+0xc6/0x120 [ 2621.068240][T14009] hash_alloc_result.part.0+0x95/0x110 [ 2621.073703][T14009] hash_sendpage+0x7a7/0x9d0 [ 2621.078297][T14009] hash_sendpage_nokey+0x94/0xa0 [ 2621.079594][ T26] audit: type=1800 audit(1572564693.517:366): pid=13985 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name=7374617409C0D2FEBCF9DF2DEAC8C177FF171248E91193513049F831550D6F7DE66CF637BDBF1311920C8A26EDA4DCC3783F9DB5116B34D31B0512A5608AAFF01E7952340CD6FD dev="sda1" ino=16825 res=0 [ 2621.083234][T14009] kernel_sendpage+0x92/0xf0 [ 2621.083250][T14009] ? hash_check_key.isra.0+0x230/0x230 [ 2621.083269][T14009] sock_sendpage+0x8b/0xc0 [ 2621.083291][T14009] pipe_to_sendpage+0x296/0x360 [ 2621.083306][T14009] ? kernel_sendpage+0xf0/0xf0 [ 2621.083320][T14009] ? direct_splice_actor+0x190/0x190 [ 2621.083339][T14009] ? __put_page+0xa7/0xe0 [ 2621.148148][T14009] ? anon_pipe_buf_release+0x1c6/0x270 [ 2621.153618][T14009] __splice_from_pipe+0x397/0x7d0 [ 2621.158654][T14009] ? direct_splice_actor+0x190/0x190 [ 2621.163953][T14009] ? direct_splice_actor+0x190/0x190 [ 2621.169249][T14009] splice_from_pipe+0x108/0x170 [ 2621.174103][T14009] ? splice_shrink_spd+0xd0/0xd0 [ 2621.179053][T14009] ? apparmor_file_permission+0x25/0x30 [ 2621.184608][T14009] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2621.190856][T14009] ? security_file_permission+0x8f/0x380 [ 2621.196497][T14009] generic_splice_sendpage+0x3c/0x50 [ 2621.201785][T14009] ? splice_from_pipe+0x170/0x170 [ 2621.206812][T14009] do_splice+0x708/0x1410 [ 2621.211154][T14009] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2621.216266][T14009] ? __fget_light+0x1a9/0x230 [ 2621.220948][T14009] __x64_sys_splice+0x2c6/0x330 [ 2621.225813][T14009] do_syscall_64+0xfa/0x760 [ 2621.230323][T14009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2621.236208][T14009] RIP: 0033:0x459f49 [ 2621.240113][T14009] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2621.259727][T14009] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2621.268147][T14009] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2621.276127][T14009] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2621.284108][T14009] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 23:31:33 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) tee(0xffffffffffffffff, r2, 0x4, 0x4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) connect$vsock_stream(r0, &(0x7f0000000100)={0x28, 0x0, 0x7e5cacbb1d6fce97, @my=0x0}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc020662a, &(0x7f00000000c0)={0x4000000, r6, 0x1800}) epoll_ctl$EPOLL_CTL_MOD(r6, 0x3, r3, &(0x7f0000000240)={0x10}) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc020662a, &(0x7f00000000c0)={0x4000000, r9, 0x1800}) setsockopt$inet6_udp_int(r9, 0x11, 0x65, &(0x7f0000000300)=0x9, 0x4) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b93df4ee30324e6b23100000000000", 0xf) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r10, &(0x7f0000002780), 0x400004d, 0x0) ioctl$int_out(r10, 0x0, &(0x7f00000000c0)) [ 2621.292089][T14009] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2621.300068][T14009] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:31:40 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, 0x0, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:40 executing program 1 (fault-call:11 fault-nth:19): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:40 executing program 2 (fault-call:10 fault-nth:20): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:40 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xf00000000000000) 23:31:40 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, 0x0, 0x0) close(r2) socket$nl_xfrm(0x10, 0x3, 0x6) r4 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$inet6_opts(r4, 0x29, 0x3b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000400130000000000010005020000000000000000000009000000000000040100efff"], 0x28) sendmmsg(r4, &(0x7f00000092c0), 0x400000000000064, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) getsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) splice(r5, 0x0, r6, 0x0, 0x100000000ffe0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r6, 0x0, 0x14, &(0x7f0000000080)=':cpuset#+vboxnet0^,\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) r9 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r9, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b38e47bf070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000001940)={0x0, 0x0, 0x0}, 0x0) sendmmsg$unix(r10, &(0x7f0000002140)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x8000}, {&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001680), 0x0, &(0x7f00000019c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r12}}}], 0x40, 0x4040}, {&(0x7f0000001a00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001c80)=[{&(0x7f0000001a80)="74b2333c0879e92e6a9f6fce1e1457d06e2f6b2715fd3d8085c97571bb8664ad1ec668fdb56e3229725116380fbbcfafe5897bc66f76edb46fbc1b66bb267b50cf06e72443681eb8e3281c6b21e5a00f7e7f4e4ee4839fdb30d462d16b19d571d38448cbd65e333c1f5b4b6c555fc6", 0x6f}, {&(0x7f0000001c00)="6060bd2c333b69e29e012cde11fc8b1d528c98e25e09a377b5e73ba936ce0187bcf14aa920037a65d0da3a002eb684ba6986bc965ff551993259186700e88405e12e9ad28336bfc147aecab28eedd7e198576c81", 0x54}], 0x2, &(0x7f0000002080)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000bd000000000000000110000002010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r9, @ANYRES32=r11, @ANYRES32=r11, @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="2c000000000000000100000001000040", @ANYRES32=r9, @ANYRES32=r11, @ANYRES32=r11, @ANYRES32=r9, @ANYRES32, @ANYRES32=r9, @ANYRES32=r11, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x20000000}], 0x3, 0x40000) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000280)={r7, r8, r12}, 0xc) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r13, 0xc020662a, &(0x7f00000000c0)={0x4000000, r14, 0x1800}) r15 = openat$cgroup_ro(r13, &(0x7f00000003c0)='pids.current\x00', 0x0, 0x0) sendmsg$nl_xfrm(r15, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000200)=@updpolicy={0xe0, 0x19, 0x1, 0x0, 0x0, {{@in6=@local, @in6=@dev={0xfe, 0x80, [], 0x28}, 0x0, 0x2, 0x0, 0x0, 0xa, 0x0, 0x10, 0x0, 0x0, r8}, {}, {}, 0x0, 0x0, 0x2}, [@address_filter={0x28, 0x1a, {@in6=@rand_addr="ac3ec497e69ca1fe85040817184f5284", @in6=@ipv4={[], [], @broadcast}, 0xa, 0xe5, 0x4}}]}, 0xe0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 23:31:40 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r3, &(0x7f0000002780), 0x400004d, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) sendmmsg(r4, &(0x7f0000002780), 0x400004d, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r5, &(0x7f0000002780), 0x400004d, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = accept4(r6, 0x0, 0x0, 0x800) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r8, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r7, 0x0, 0x80000001, 0x0) [ 2628.173191][T14042] FAULT_INJECTION: forcing a failure. [ 2628.173191][T14042] name failslab, interval 1, probability 0, space 0, times 0 [ 2628.187049][T14042] CPU: 0 PID: 14042 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2628.194978][T14042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2628.205034][T14042] Call Trace: [ 2628.208334][T14042] dump_stack+0x172/0x1f0 [ 2628.212677][T14042] should_fail.cold+0xa/0x15 [ 2628.217370][T14042] ? fault_create_debugfs_attr+0x180/0x180 [ 2628.223196][T14042] ? ___might_sleep+0x163/0x2c0 [ 2628.228058][T14042] __should_failslab+0x121/0x190 [ 2628.233007][T14042] should_failslab+0x9/0x14 [ 2628.237520][T14042] __kmalloc+0x2e0/0x770 [ 2628.241765][T14042] ? __local_bh_enable_ip+0x15a/0x270 [ 2628.247141][T14042] ? lock_sock_nested+0xe2/0x120 [ 2628.252085][T14042] ? __local_bh_enable_ip+0x15a/0x270 [ 2628.257478][T14042] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2628.262774][T14042] ? lock_sock_nested+0x9a/0x120 [ 2628.267714][T14042] ? sock_kmalloc+0xc6/0x120 [ 2628.272309][T14042] sock_kmalloc+0xc6/0x120 [ 2628.276740][T14042] hash_alloc_result.part.0+0x95/0x110 [ 2628.282207][T14042] hash_sendpage+0x7a7/0x9d0 [ 2628.287326][T14042] hash_sendpage_nokey+0x94/0xa0 [ 2628.292281][T14042] kernel_sendpage+0x92/0xf0 [ 2628.296872][T14042] ? hash_check_key.isra.0+0x230/0x230 [ 2628.302339][T14042] sock_sendpage+0x8b/0xc0 [ 2628.306764][T14042] pipe_to_sendpage+0x296/0x360 [ 2628.311635][T14042] ? kernel_sendpage+0xf0/0xf0 [ 2628.316416][T14042] ? direct_splice_actor+0x190/0x190 [ 2628.321711][T14042] ? __put_page+0xa7/0xe0 [ 2628.326045][T14042] ? anon_pipe_buf_release+0x1c6/0x270 [ 2628.331513][T14042] __splice_from_pipe+0x397/0x7d0 [ 2628.336549][T14042] ? direct_splice_actor+0x190/0x190 [ 2628.341843][T14042] ? direct_splice_actor+0x190/0x190 [ 2628.347137][T14042] splice_from_pipe+0x108/0x170 [ 2628.352002][T14042] ? splice_shrink_spd+0xd0/0xd0 [ 2628.356957][T14042] ? apparmor_file_permission+0x25/0x30 [ 2628.362510][T14042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2628.368754][T14042] ? security_file_permission+0x8f/0x380 [ 2628.374396][T14042] generic_splice_sendpage+0x3c/0x50 [ 2628.379688][T14042] ? splice_from_pipe+0x170/0x170 [ 2628.384723][T14042] do_splice+0x708/0x1410 [ 2628.389073][T14042] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2628.394189][T14042] ? __fget_light+0x1a9/0x230 [ 2628.398870][T14042] __x64_sys_splice+0x2c6/0x330 [ 2628.403737][T14042] do_syscall_64+0xfa/0x760 [ 2628.408260][T14042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2628.414151][T14042] RIP: 0033:0x459f49 [ 2628.418071][T14042] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2628.438085][T14042] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2628.442060][T14043] FAULT_INJECTION: forcing a failure. [ 2628.442060][T14043] name failslab, interval 1, probability 0, space 0, times 0 [ 2628.446588][T14042] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2628.446596][T14042] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2628.446606][T14042] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2628.446615][T14042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2628.446624][T14042] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2628.503135][T14043] CPU: 1 PID: 14043 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2628.511049][T14043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2628.521106][T14043] Call Trace: [ 2628.524502][T14043] dump_stack+0x172/0x1f0 [ 2628.528870][T14043] should_fail.cold+0xa/0x15 [ 2628.533476][T14043] ? fault_create_debugfs_attr+0x180/0x180 [ 2628.539305][T14043] ? ___might_sleep+0x163/0x2c0 [ 2628.544174][T14043] __should_failslab+0x121/0x190 [ 2628.549127][T14043] should_failslab+0x9/0x14 [ 2628.553661][T14043] __kmalloc+0x2e0/0x770 [ 2628.557909][T14043] ? __local_bh_enable_ip+0x15a/0x270 [ 2628.563280][T14043] ? lock_sock_nested+0xe2/0x120 [ 2628.568221][T14043] ? __local_bh_enable_ip+0x15a/0x270 23:31:41 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x3f00000000000000) [ 2628.573596][T14043] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2628.578885][T14043] ? lock_sock_nested+0x9a/0x120 [ 2628.583823][T14043] ? sock_kmalloc+0xc6/0x120 [ 2628.588422][T14043] sock_kmalloc+0xc6/0x120 [ 2628.592849][T14043] hash_alloc_result.part.0+0x95/0x110 [ 2628.598314][T14043] hash_sendpage+0x7a7/0x9d0 [ 2628.602918][T14043] hash_sendpage_nokey+0x94/0xa0 [ 2628.607876][T14043] kernel_sendpage+0x92/0xf0 [ 2628.612476][T14043] ? hash_check_key.isra.0+0x230/0x230 [ 2628.617946][T14043] sock_sendpage+0x8b/0xc0 [ 2628.622366][T14043] pipe_to_sendpage+0x296/0x360 [ 2628.627215][T14043] ? kernel_sendpage+0xf0/0xf0 [ 2628.631986][T14043] ? direct_splice_actor+0x190/0x190 [ 2628.637266][T14043] ? __put_page+0xa7/0xe0 [ 2628.637283][T14043] ? anon_pipe_buf_release+0x1c6/0x270 [ 2628.637304][T14043] __splice_from_pipe+0x397/0x7d0 [ 2628.647059][T14043] ? direct_splice_actor+0x190/0x190 [ 2628.647085][T14043] ? direct_splice_actor+0x190/0x190 [ 2628.647102][T14043] splice_from_pipe+0x108/0x170 [ 2628.647122][T14043] ? splice_shrink_spd+0xd0/0xd0 [ 2628.647142][T14043] ? apparmor_file_permission+0x25/0x30 [ 2628.647163][T14043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2628.684214][T14043] ? security_file_permission+0x8f/0x380 [ 2628.689871][T14043] generic_splice_sendpage+0x3c/0x50 [ 2628.695208][T14043] ? splice_from_pipe+0x170/0x170 [ 2628.700242][T14043] do_splice+0x708/0x1410 [ 2628.704565][T14043] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2628.709672][T14043] ? __fget_light+0x1a9/0x230 [ 2628.714356][T14043] __x64_sys_splice+0x2c6/0x330 [ 2628.719228][T14043] do_syscall_64+0xfa/0x760 [ 2628.723748][T14043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2628.729655][T14043] RIP: 0033:0x459f49 [ 2628.733656][T14043] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2628.753269][T14043] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2628.761695][T14043] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2628.769785][T14043] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2628.777765][T14043] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2628.785742][T14043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2628.793716][T14043] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:31:41 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:41 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r2, &(0x7f0000002780), 0x400004d, 0x0) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000140)=0x6, 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, 0x0, 0x3c4) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) close(r3) r4 = socket$inet6(0xa, 0x2000000000801, 0x0) r5 = socket(0x10, 0x80002, 0x0) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r5, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x240}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x1c, r6, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRETLEN={0x8}]}, 0x1c}}, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_int(r4, 0x29, 0x33, &(0x7f00000001c0)=0x1, 0x4) bind$inet6(r4, &(0x7f0000402000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000000, &(0x7f0000f62fe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$XDP_RX_RING(0xffffffffffffffff, 0x11b, 0x2, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:41 executing program 1 (fault-call:11 fault-nth:20): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:41 executing program 2 (fault-call:10 fault-nth:21): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:41 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x4000000000000000) [ 2629.100540][T14057] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 2629.175091][T14067] FAULT_INJECTION: forcing a failure. [ 2629.175091][T14067] name failslab, interval 1, probability 0, space 0, times 0 [ 2629.203346][T14069] FAULT_INJECTION: forcing a failure. [ 2629.203346][T14069] name failslab, interval 1, probability 0, space 0, times 0 [ 2629.223079][T14067] CPU: 1 PID: 14067 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2629.231090][T14067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2629.241137][T14067] Call Trace: [ 2629.244428][T14067] dump_stack+0x172/0x1f0 [ 2629.248768][T14067] should_fail.cold+0xa/0x15 [ 2629.253365][T14067] ? fault_create_debugfs_attr+0x180/0x180 [ 2629.259171][T14067] ? ___might_sleep+0x163/0x2c0 [ 2629.264023][T14067] __should_failslab+0x121/0x190 [ 2629.268966][T14067] should_failslab+0x9/0x14 [ 2629.273462][T14067] __kmalloc+0x2e0/0x770 [ 2629.277701][T14067] ? __local_bh_enable_ip+0x15a/0x270 [ 2629.283070][T14067] ? lock_sock_nested+0xe2/0x120 [ 2629.288017][T14067] ? __local_bh_enable_ip+0x15a/0x270 [ 2629.293388][T14067] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2629.298673][T14067] ? lock_sock_nested+0x9a/0x120 [ 2629.303600][T14067] ? sock_kmalloc+0xc6/0x120 [ 2629.308185][T14067] sock_kmalloc+0xc6/0x120 [ 2629.312600][T14067] hash_alloc_result.part.0+0x95/0x110 [ 2629.318051][T14067] hash_sendpage+0x7a7/0x9d0 [ 2629.322645][T14067] hash_sendpage_nokey+0x94/0xa0 [ 2629.327579][T14067] kernel_sendpage+0x92/0xf0 [ 2629.332160][T14067] ? hash_check_key.isra.0+0x230/0x230 [ 2629.337616][T14067] sock_sendpage+0x8b/0xc0 [ 2629.342032][T14067] pipe_to_sendpage+0x296/0x360 [ 2629.346876][T14067] ? kernel_sendpage+0xf0/0xf0 [ 2629.351642][T14067] ? direct_splice_actor+0x190/0x190 [ 2629.356924][T14067] ? __put_page+0xa7/0xe0 [ 2629.361252][T14067] ? anon_pipe_buf_release+0x1c6/0x270 [ 2629.366706][T14067] __splice_from_pipe+0x397/0x7d0 [ 2629.371725][T14067] ? direct_splice_actor+0x190/0x190 [ 2629.377013][T14067] ? direct_splice_actor+0x190/0x190 [ 2629.382291][T14067] splice_from_pipe+0x108/0x170 [ 2629.387229][T14067] ? splice_shrink_spd+0xd0/0xd0 [ 2629.392172][T14067] ? apparmor_file_permission+0x25/0x30 [ 2629.397717][T14067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2629.403955][T14067] ? security_file_permission+0x8f/0x380 [ 2629.409589][T14067] generic_splice_sendpage+0x3c/0x50 [ 2629.414871][T14067] ? splice_from_pipe+0x170/0x170 [ 2629.419897][T14067] do_splice+0x708/0x1410 [ 2629.424236][T14067] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2629.429356][T14067] ? __fget_light+0x1a9/0x230 [ 2629.434030][T14067] __x64_sys_splice+0x2c6/0x330 [ 2629.439234][T14067] do_syscall_64+0xfa/0x760 [ 2629.443742][T14067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2629.449627][T14067] RIP: 0033:0x459f49 [ 2629.453521][T14067] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2629.473136][T14067] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2629.481538][T14067] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2629.489501][T14067] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2629.497465][T14067] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2629.505429][T14067] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2629.513395][T14067] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2629.521382][T14069] CPU: 0 PID: 14069 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2629.529272][T14069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2629.539315][T14069] Call Trace: [ 2629.542615][T14069] dump_stack+0x172/0x1f0 [ 2629.546951][T14069] should_fail.cold+0xa/0x15 [ 2629.551551][T14069] ? fault_create_debugfs_attr+0x180/0x180 [ 2629.557377][T14069] ? ___might_sleep+0x163/0x2c0 [ 2629.562244][T14069] __should_failslab+0x121/0x190 [ 2629.567195][T14069] should_failslab+0x9/0x14 [ 2629.571703][T14069] __kmalloc+0x2e0/0x770 [ 2629.575970][T14069] ? __local_bh_enable_ip+0x15a/0x270 [ 2629.581356][T14069] ? lock_sock_nested+0xe2/0x120 [ 2629.586305][T14069] ? __local_bh_enable_ip+0x15a/0x270 [ 2629.591686][T14069] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2629.596984][T14069] ? lock_sock_nested+0x9a/0x120 [ 2629.601928][T14069] ? sock_kmalloc+0xc6/0x120 [ 2629.606546][T14069] sock_kmalloc+0xc6/0x120 [ 2629.610973][T14069] hash_alloc_result.part.0+0x95/0x110 [ 2629.616440][T14069] hash_sendpage+0x7a7/0x9d0 [ 2629.621050][T14069] hash_sendpage_nokey+0x94/0xa0 [ 2629.625998][T14069] kernel_sendpage+0x92/0xf0 [ 2629.630597][T14069] ? hash_check_key.isra.0+0x230/0x230 [ 2629.636069][T14069] sock_sendpage+0x8b/0xc0 [ 2629.640505][T14069] pipe_to_sendpage+0x296/0x360 [ 2629.645365][T14069] ? kernel_sendpage+0xf0/0xf0 [ 2629.650146][T14069] ? direct_splice_actor+0x190/0x190 [ 2629.656417][T14069] ? __put_page+0xa7/0xe0 [ 2629.660757][T14069] ? anon_pipe_buf_release+0x1c6/0x270 [ 2629.666239][T14069] __splice_from_pipe+0x397/0x7d0 [ 2629.671278][T14069] ? direct_splice_actor+0x190/0x190 [ 2629.676583][T14069] ? direct_splice_actor+0x190/0x190 [ 2629.681878][T14069] splice_from_pipe+0x108/0x170 [ 2629.686740][T14069] ? splice_shrink_spd+0xd0/0xd0 [ 2629.691692][T14069] ? apparmor_file_permission+0x25/0x30 [ 2629.697250][T14069] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2629.703503][T14069] ? security_file_permission+0x8f/0x380 [ 2629.709145][T14069] generic_splice_sendpage+0x3c/0x50 [ 2629.714445][T14069] ? splice_from_pipe+0x170/0x170 [ 2629.719474][T14069] do_splice+0x708/0x1410 [ 2629.723823][T14069] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2629.728939][T14069] ? __fget_light+0x1a9/0x230 [ 2629.733625][T14069] __x64_sys_splice+0x2c6/0x330 [ 2629.738495][T14069] do_syscall_64+0xfa/0x760 [ 2629.743008][T14069] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2629.748903][T14069] RIP: 0033:0x459f49 [ 2629.752804][T14069] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2629.772409][T14069] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2629.780814][T14069] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2629.788783][T14069] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2629.796732][T14069] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2629.804687][T14069] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2629.812643][T14069] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:31:49 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:49 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00\x00\x00\x00\x00\x00\x00\x00 ', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @empty}, {0x2, 0xfffe, @loopback}, {0x2, 0x4000, @remote}}) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 23:31:49 executing program 1 (fault-call:11 fault-nth:21): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:49 executing program 2 (fault-call:10 fault-nth:22): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:49 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x60f86e346d82c106) 23:31:49 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r3, &(0x7f0000002780), 0x400004d, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000000, 0x50, r3, 0x91aae000) r4 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080), 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 2636.618911][T14092] IPVS: ftp: loaded support on port[0] = 21 [ 2636.684049][T14099] FAULT_INJECTION: forcing a failure. [ 2636.684049][T14099] name failslab, interval 1, probability 0, space 0, times 0 [ 2636.688153][T14098] FAULT_INJECTION: forcing a failure. [ 2636.688153][T14098] name failslab, interval 1, probability 0, space 0, times 0 [ 2636.709877][T14099] CPU: 0 PID: 14099 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2636.717777][T14099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2636.727836][T14099] Call Trace: [ 2636.731133][T14099] dump_stack+0x172/0x1f0 [ 2636.735476][T14099] should_fail.cold+0xa/0x15 [ 2636.740079][T14099] ? fault_create_debugfs_attr+0x180/0x180 [ 2636.745892][T14099] ? ___might_sleep+0x163/0x2c0 [ 2636.750753][T14099] __should_failslab+0x121/0x190 [ 2636.755695][T14099] should_failslab+0x9/0x14 [ 2636.760192][T14099] __kmalloc+0x2e0/0x770 [ 2636.764433][T14099] ? __local_bh_enable_ip+0x15a/0x270 [ 2636.769800][T14099] ? lock_sock_nested+0xe2/0x120 [ 2636.774732][T14099] ? __local_bh_enable_ip+0x15a/0x270 [ 2636.780105][T14099] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2636.785395][T14099] ? lock_sock_nested+0x9a/0x120 [ 2636.790329][T14099] ? sock_kmalloc+0xc6/0x120 [ 2636.794921][T14099] sock_kmalloc+0xc6/0x120 [ 2636.799343][T14099] hash_alloc_result.part.0+0x95/0x110 [ 2636.804810][T14099] hash_sendpage+0x7a7/0x9d0 [ 2636.809409][T14099] hash_sendpage_nokey+0x94/0xa0 [ 2636.814351][T14099] kernel_sendpage+0x92/0xf0 [ 2636.818950][T14099] ? hash_check_key.isra.0+0x230/0x230 [ 2636.824424][T14099] sock_sendpage+0x8b/0xc0 [ 2636.828851][T14099] pipe_to_sendpage+0x296/0x360 [ 2636.833701][T14099] ? kernel_sendpage+0xf0/0xf0 [ 2636.838475][T14099] ? direct_splice_actor+0x190/0x190 [ 2636.843759][T14099] ? __put_page+0xa7/0xe0 [ 2636.848090][T14099] ? anon_pipe_buf_release+0x1c6/0x270 [ 2636.853554][T14099] __splice_from_pipe+0x397/0x7d0 [ 2636.858581][T14099] ? direct_splice_actor+0x190/0x190 [ 2636.863912][T14099] ? direct_splice_actor+0x190/0x190 [ 2636.869197][T14099] splice_from_pipe+0x108/0x170 [ 2636.874053][T14099] ? splice_shrink_spd+0xd0/0xd0 [ 2636.878996][T14099] ? apparmor_file_permission+0x25/0x30 [ 2636.884542][T14099] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2636.890792][T14099] ? security_file_permission+0x8f/0x380 [ 2636.896433][T14099] generic_splice_sendpage+0x3c/0x50 [ 2636.901720][T14099] ? splice_from_pipe+0x170/0x170 [ 2636.906749][T14099] do_splice+0x708/0x1410 [ 2636.911090][T14099] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2636.916204][T14099] ? __fget_light+0x1a9/0x230 [ 2636.920881][T14099] __x64_sys_splice+0x2c6/0x330 [ 2636.925737][T14099] do_syscall_64+0xfa/0x760 [ 2636.930245][T14099] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2636.936129][T14099] RIP: 0033:0x459f49 [ 2636.940019][T14099] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2636.959622][T14099] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2636.968123][T14099] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2636.976100][T14099] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2636.984082][T14099] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2636.992046][T14099] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2636.992055][T14099] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2637.011870][T14098] CPU: 1 PID: 14098 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2637.019770][T14098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2637.029827][T14098] Call Trace: [ 2637.033121][T14098] dump_stack+0x172/0x1f0 [ 2637.037466][T14098] should_fail.cold+0xa/0x15 [ 2637.042059][T14098] ? fault_create_debugfs_attr+0x180/0x180 [ 2637.047882][T14098] ? ___might_sleep+0x163/0x2c0 [ 2637.052743][T14098] __should_failslab+0x121/0x190 [ 2637.057686][T14098] should_failslab+0x9/0x14 [ 2637.062194][T14098] __kmalloc+0x2e0/0x770 [ 2637.066445][T14098] ? __local_bh_enable_ip+0x15a/0x270 [ 2637.071816][T14098] ? lock_sock_nested+0xe2/0x120 [ 2637.076750][T14098] ? __local_bh_enable_ip+0x15a/0x270 [ 2637.076766][T14098] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2637.076781][T14098] ? lock_sock_nested+0x9a/0x120 [ 2637.076793][T14098] ? sock_kmalloc+0xc6/0x120 [ 2637.076812][T14098] sock_kmalloc+0xc6/0x120 [ 2637.076831][T14098] hash_alloc_result.part.0+0x95/0x110 [ 2637.076850][T14098] hash_sendpage+0x7a7/0x9d0 [ 2637.076875][T14098] hash_sendpage_nokey+0x94/0xa0 [ 2637.087509][T14098] kernel_sendpage+0x92/0xf0 [ 2637.087524][T14098] ? hash_check_key.isra.0+0x230/0x230 [ 2637.087541][T14098] sock_sendpage+0x8b/0xc0 [ 2637.087562][T14098] pipe_to_sendpage+0x296/0x360 [ 2637.087579][T14098] ? kernel_sendpage+0xf0/0xf0 [ 2637.101468][T14098] ? direct_splice_actor+0x190/0x190 [ 2637.101485][T14098] ? __put_page+0xa7/0xe0 [ 2637.101504][T14098] ? anon_pipe_buf_release+0x1c6/0x270 [ 2637.111531][T14098] __splice_from_pipe+0x397/0x7d0 [ 2637.111550][T14098] ? direct_splice_actor+0x190/0x190 [ 2637.111570][T14098] ? direct_splice_actor+0x190/0x190 [ 2637.111588][T14098] splice_from_pipe+0x108/0x170 [ 2637.121074][T14098] ? splice_shrink_spd+0xd0/0xd0 [ 2637.121099][T14098] ? apparmor_file_permission+0x25/0x30 [ 2637.121115][T14098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2637.121134][T14098] ? security_file_permission+0x8f/0x380 [ 2637.130960][T14098] generic_splice_sendpage+0x3c/0x50 [ 2637.130978][T14098] ? splice_from_pipe+0x170/0x170 [ 2637.130994][T14098] do_splice+0x708/0x1410 [ 2637.131020][T14098] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2637.140578][T14098] ? __fget_light+0x1a9/0x230 [ 2637.140598][T14098] __x64_sys_splice+0x2c6/0x330 [ 2637.140621][T14098] do_syscall_64+0xfa/0x760 [ 2637.140643][T14098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2637.237852][T14098] RIP: 0033:0x459f49 [ 2637.241751][T14098] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2637.261336][T14098] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2637.269735][T14098] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2637.277696][T14098] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2637.285651][T14098] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2637.293601][T14098] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2637.301560][T14098] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2637.324431][T14092] IPVS: ftp: loaded support on port[0] = 21 23:31:49 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x7f00000000000000) 23:31:49 executing program 2 (fault-call:10 fault-nth:23): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:50 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) sendmmsg(r3, &(0x7f0000002780), 0x400004d, 0x0) splice(r2, &(0x7f0000000100), r3, &(0x7f0000000240), 0x8, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r6, &(0x7f0000002780), 0x400004d, 0x0) tee(r1, r6, 0x1, 0x3) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 23:31:50 executing program 1 (fault-call:11 fault-nth:22): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2637.657381][T14117] FAULT_INJECTION: forcing a failure. [ 2637.657381][T14117] name failslab, interval 1, probability 0, space 0, times 0 [ 2637.686305][T14118] FAULT_INJECTION: forcing a failure. [ 2637.686305][T14118] name failslab, interval 1, probability 0, space 0, times 0 [ 2637.705416][T14117] CPU: 1 PID: 14117 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2637.713348][T14117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2637.723413][T14117] Call Trace: [ 2637.726717][T14117] dump_stack+0x172/0x1f0 [ 2637.731056][T14117] should_fail.cold+0xa/0x15 [ 2637.735655][T14117] ? fault_create_debugfs_attr+0x180/0x180 [ 2637.741474][T14117] ? ___might_sleep+0x163/0x2c0 [ 2637.746329][T14117] __should_failslab+0x121/0x190 [ 2637.751268][T14117] should_failslab+0x9/0x14 [ 2637.755770][T14117] __kmalloc+0x2e0/0x770 [ 2637.760023][T14117] ? __local_bh_enable_ip+0x15a/0x270 [ 2637.765394][T14117] ? lock_sock_nested+0xe2/0x120 [ 2637.770341][T14117] ? __local_bh_enable_ip+0x15a/0x270 [ 2637.775720][T14117] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2637.781004][T14117] ? lock_sock_nested+0x9a/0x120 [ 2637.785941][T14117] ? sock_kmalloc+0xc6/0x120 [ 2637.790533][T14117] sock_kmalloc+0xc6/0x120 [ 2637.794957][T14117] hash_alloc_result.part.0+0x95/0x110 [ 2637.800424][T14117] hash_sendpage+0x7a7/0x9d0 [ 2637.805027][T14117] hash_sendpage_nokey+0x94/0xa0 [ 2637.809978][T14117] kernel_sendpage+0x92/0xf0 [ 2637.814569][T14117] ? hash_check_key.isra.0+0x230/0x230 [ 2637.820035][T14117] sock_sendpage+0x8b/0xc0 [ 2637.824460][T14117] pipe_to_sendpage+0x296/0x360 [ 2637.829309][T14117] ? kernel_sendpage+0xf0/0xf0 [ 2637.834074][T14117] ? direct_splice_actor+0x190/0x190 [ 2637.839363][T14117] ? __put_page+0xa7/0xe0 [ 2637.843700][T14117] ? anon_pipe_buf_release+0x1c6/0x270 [ 2637.849167][T14117] __splice_from_pipe+0x397/0x7d0 [ 2637.854193][T14117] ? direct_splice_actor+0x190/0x190 [ 2637.859482][T14117] ? direct_splice_actor+0x190/0x190 [ 2637.864764][T14117] splice_from_pipe+0x108/0x170 [ 2637.869624][T14117] ? splice_shrink_spd+0xd0/0xd0 [ 2637.874570][T14117] ? apparmor_file_permission+0x25/0x30 [ 2637.880124][T14117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2637.886374][T14117] ? security_file_permission+0x8f/0x380 [ 2637.892015][T14117] generic_splice_sendpage+0x3c/0x50 [ 2637.897304][T14117] ? splice_from_pipe+0x170/0x170 [ 2637.902343][T14117] do_splice+0x708/0x1410 [ 2637.906685][T14117] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2637.911798][T14117] ? __fget_light+0x1a9/0x230 [ 2637.916477][T14117] __x64_sys_splice+0x2c6/0x330 [ 2637.921338][T14117] do_syscall_64+0xfa/0x760 [ 2637.925853][T14117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2637.931736][T14117] RIP: 0033:0x459f49 [ 2637.935633][T14117] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2637.955240][T14117] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2637.964614][T14117] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2637.972585][T14117] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2637.980556][T14117] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2637.988528][T14117] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2637.996494][T14117] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2638.004485][T14118] CPU: 0 PID: 14118 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 2638.012376][T14118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2638.022425][T14118] Call Trace: [ 2638.025721][T14118] dump_stack+0x172/0x1f0 [ 2638.030063][T14118] should_fail.cold+0xa/0x15 [ 2638.034660][T14118] ? fault_create_debugfs_attr+0x180/0x180 [ 2638.040478][T14118] ? ___might_sleep+0x163/0x2c0 [ 2638.045344][T14118] __should_failslab+0x121/0x190 [ 2638.050291][T14118] should_failslab+0x9/0x14 [ 2638.054798][T14118] __kmalloc+0x2e0/0x770 [ 2638.059046][T14118] ? __local_bh_enable_ip+0x15a/0x270 [ 2638.064427][T14118] ? lock_sock_nested+0xe2/0x120 [ 2638.069366][T14118] ? __local_bh_enable_ip+0x15a/0x270 [ 2638.074741][T14118] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2638.080027][T14118] ? lock_sock_nested+0x9a/0x120 [ 2638.084966][T14118] ? sock_kmalloc+0xc6/0x120 [ 2638.089576][T14118] sock_kmalloc+0xc6/0x120 [ 2638.094000][T14118] hash_alloc_result.part.0+0x95/0x110 [ 2638.099464][T14118] hash_sendpage+0x7a7/0x9d0 [ 2638.104068][T14118] hash_sendpage_nokey+0x94/0xa0 [ 2638.109012][T14118] kernel_sendpage+0x92/0xf0 [ 2638.113606][T14118] ? hash_check_key.isra.0+0x230/0x230 [ 2638.119072][T14118] sock_sendpage+0x8b/0xc0 [ 2638.123515][T14118] pipe_to_sendpage+0x296/0x360 [ 2638.128378][T14118] ? kernel_sendpage+0xf0/0xf0 [ 2638.133155][T14118] ? direct_splice_actor+0x190/0x190 [ 2638.138448][T14118] ? __put_page+0xa7/0xe0 [ 2638.142800][T14118] ? anon_pipe_buf_release+0x1c6/0x270 [ 2638.148297][T14118] __splice_from_pipe+0x397/0x7d0 [ 2638.153345][T14118] ? direct_splice_actor+0x190/0x190 [ 2638.158649][T14118] ? direct_splice_actor+0x190/0x190 [ 2638.163940][T14118] splice_from_pipe+0x108/0x170 [ 2638.168799][T14118] ? splice_shrink_spd+0xd0/0xd0 [ 2638.173747][T14118] ? apparmor_file_permission+0x25/0x30 [ 2638.179300][T14118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2638.185545][T14118] ? security_file_permission+0x8f/0x380 [ 2638.191187][T14118] generic_splice_sendpage+0x3c/0x50 [ 2638.196476][T14118] ? splice_from_pipe+0x170/0x170 [ 2638.201506][T14118] do_splice+0x708/0x1410 [ 2638.205851][T14118] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2638.210972][T14118] ? __fget_light+0x1a9/0x230 [ 2638.215650][T14118] __x64_sys_splice+0x2c6/0x330 [ 2638.220515][T14118] do_syscall_64+0xfa/0x760 [ 2638.225032][T14118] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2638.230922][T14118] RIP: 0033:0x459f49 [ 2638.234819][T14118] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:31:50 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x8dffffff00000000) [ 2638.254425][T14118] RSP: 002b:00007fa2dbf8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2638.262876][T14118] RAX: ffffffffffffffda RBX: 00007fa2dbf8fc90 RCX: 0000000000459f49 [ 2638.270860][T14118] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2638.278847][T14118] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2638.286823][T14118] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa2dbf906d4 [ 2638.294794][T14118] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:31:50 executing program 2 (fault-call:10 fault-nth:24): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2638.582727][T14132] FAULT_INJECTION: forcing a failure. [ 2638.582727][T14132] name failslab, interval 1, probability 0, space 0, times 0 [ 2638.602296][T14132] CPU: 0 PID: 14132 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2638.610204][T14132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2638.620258][T14132] Call Trace: [ 2638.623563][T14132] dump_stack+0x172/0x1f0 [ 2638.627902][T14132] should_fail.cold+0xa/0x15 [ 2638.632502][T14132] ? fault_create_debugfs_attr+0x180/0x180 [ 2638.638327][T14132] ? ___might_sleep+0x163/0x2c0 [ 2638.643185][T14132] __should_failslab+0x121/0x190 [ 2638.648127][T14132] should_failslab+0x9/0x14 [ 2638.652627][T14132] __kmalloc+0x2e0/0x770 [ 2638.656874][T14132] ? __local_bh_enable_ip+0x15a/0x270 [ 2638.662255][T14132] ? lock_sock_nested+0xe2/0x120 [ 2638.667208][T14132] ? __local_bh_enable_ip+0x15a/0x270 [ 2638.672591][T14132] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2638.677885][T14132] ? lock_sock_nested+0x9a/0x120 [ 2638.682831][T14132] ? sock_kmalloc+0xc6/0x120 [ 2638.687435][T14132] sock_kmalloc+0xc6/0x120 [ 2638.691859][T14132] hash_alloc_result.part.0+0x95/0x110 [ 2638.697320][T14132] hash_sendpage+0x7a7/0x9d0 [ 2638.701924][T14132] hash_sendpage_nokey+0x94/0xa0 [ 2638.706870][T14132] kernel_sendpage+0x92/0xf0 [ 2638.711462][T14132] ? hash_check_key.isra.0+0x230/0x230 [ 2638.716931][T14132] sock_sendpage+0x8b/0xc0 [ 2638.721373][T14132] pipe_to_sendpage+0x296/0x360 [ 2638.726236][T14132] ? kernel_sendpage+0xf0/0xf0 [ 2638.731003][T14132] ? direct_splice_actor+0x190/0x190 [ 2638.736294][T14132] ? __put_page+0xa7/0xe0 [ 2638.740626][T14132] ? anon_pipe_buf_release+0x1c6/0x270 [ 2638.746075][T14132] __splice_from_pipe+0x397/0x7d0 [ 2638.751081][T14132] ? direct_splice_actor+0x190/0x190 [ 2638.756353][T14132] ? direct_splice_actor+0x190/0x190 [ 2638.761615][T14132] splice_from_pipe+0x108/0x170 [ 2638.766499][T14132] ? splice_shrink_spd+0xd0/0xd0 [ 2638.771418][T14132] ? apparmor_file_permission+0x25/0x30 [ 2638.776945][T14132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2638.783165][T14132] ? security_file_permission+0x8f/0x380 [ 2638.788782][T14132] generic_splice_sendpage+0x3c/0x50 [ 2638.794050][T14132] ? splice_from_pipe+0x170/0x170 [ 2638.799057][T14132] do_splice+0x708/0x1410 [ 2638.803406][T14132] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2638.808498][T14132] ? __fget_light+0x1a9/0x230 [ 2638.813153][T14132] __x64_sys_splice+0x2c6/0x330 [ 2638.817987][T14132] do_syscall_64+0xfa/0x760 [ 2638.822474][T14132] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2638.828350][T14132] RIP: 0033:0x459f49 [ 2638.832229][T14132] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2638.851814][T14132] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2638.860214][T14132] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2638.868177][T14132] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2638.876138][T14132] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2638.884086][T14132] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2638.892036][T14132] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:31:54 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:54 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0xfffffffd, @dev}, {0xa, 0xfffd, 0x0, @mcast2}, 0x0, [0x0, 0x0, 0x6]}, 0x5c) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r1, &(0x7f00000003c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r1, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000705000000000000008000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000fbff020000000000"], 0x38}}, 0x0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x86d5, r4, 0x0, 0x0, 0x0, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @empty}, @FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr="352ca33e985db627c0f86cc6a96c1bd1"}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x8}, @FOU_ATTR_IFINDEX={0x8, 0xb, r3}]}, 0x4c}}, 0x4804) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r6 = socket$inet(0x10, 0x3, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) r8 = accept(r7, &(0x7f0000001580)=@sco, &(0x7f0000001600)=0x80) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000001640)={0x0, @in={{0x2, 0x0, @remote}}, 0x5c33ebdd, 0x40, 0xffff, 0x3, 0x8}, &(0x7f0000001700)=0x98) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r8, 0x84, 0x71, &(0x7f0000001740)={r9, 0x4}, 0x8) ioctl$sock_ifreq(r6, 0x89f2, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) socket(0x0, 0x6, 0x0) 23:31:54 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:54 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) recvmsg(r3, &(0x7f0000000400)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000007c0)=""/129, 0x81}], 0x1, &(0x7f0000000880)=""/80, 0x50}, 0x100) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r4, 0x12, 0x2, &(0x7f0000000900)=""/65, &(0x7f0000000980)=0x41) socket$nl_generic(0x10, 0x3, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a00)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x8000802}, 0xc, &(0x7f0000000b40)={&(0x7f0000000a40)={0xf8, r6, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_LINK={0xa8, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf47}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffff7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'dummy0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000844}, 0x40000) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000300)={0xfffffffffffffffd, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x10c, r10, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xe4e8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xd896}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xbfb4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x43}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e20, @broadcast}}}}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc}]}]}, 0x10c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r9, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x7f8cf6151b4b8a5}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)={0x1cc, r10, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x200}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x401}, @TIPC_NLA_NET_ID={0x7, 0x1, 0x7f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffff}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xd00}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffff9c4}]}, @TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8687}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x7, @local, 0x5}}}}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x8c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3d}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x1cc}}, 0x10) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc020662a, &(0x7f00000000c0)={0x4000000, r8, 0x1800}) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f0000000480)="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", 0xfffffffffffffea3) r11 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r11, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") accept$alg(r5, 0x0, 0x0) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) r12 = socket$caif_stream(0x25, 0x1, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(r12, 0x6611) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:31:54 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xd22a4ab21b479502) 23:31:54 executing program 2 (fault-call:10 fault-nth:25): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2642.049242][T14149] FAULT_INJECTION: forcing a failure. [ 2642.049242][T14149] name failslab, interval 1, probability 0, space 0, times 0 [ 2642.071621][T14149] CPU: 1 PID: 14149 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2642.079547][T14149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2642.089611][T14149] Call Trace: [ 2642.092913][T14149] dump_stack+0x172/0x1f0 [ 2642.097260][T14149] should_fail.cold+0xa/0x15 [ 2642.101865][T14149] ? fault_create_debugfs_attr+0x180/0x180 [ 2642.107678][T14149] ? ___might_sleep+0x163/0x2c0 [ 2642.112544][T14149] __should_failslab+0x121/0x190 [ 2642.117492][T14149] should_failslab+0x9/0x14 [ 2642.121998][T14149] __kmalloc+0x2e0/0x770 [ 2642.126242][T14149] ? __local_bh_enable_ip+0x15a/0x270 [ 2642.131620][T14149] ? lock_sock_nested+0xe2/0x120 [ 2642.136564][T14149] ? __local_bh_enable_ip+0x15a/0x270 [ 2642.141941][T14149] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2642.147234][T14149] ? lock_sock_nested+0x9a/0x120 [ 2642.152167][T14149] ? sock_kmalloc+0xc6/0x120 [ 2642.156760][T14149] sock_kmalloc+0xc6/0x120 [ 2642.161191][T14149] hash_alloc_result.part.0+0x95/0x110 [ 2642.166662][T14149] hash_sendpage+0x7a7/0x9d0 [ 2642.171272][T14149] hash_sendpage_nokey+0x94/0xa0 [ 2642.176218][T14149] kernel_sendpage+0x92/0xf0 [ 2642.180813][T14149] ? hash_check_key.isra.0+0x230/0x230 [ 2642.186279][T14149] sock_sendpage+0x8b/0xc0 [ 2642.190704][T14149] pipe_to_sendpage+0x296/0x360 [ 2642.195561][T14149] ? kernel_sendpage+0xf0/0xf0 [ 2642.200339][T14149] ? direct_splice_actor+0x190/0x190 [ 2642.205638][T14149] ? __put_page+0xa7/0xe0 [ 2642.209966][T14149] ? anon_pipe_buf_release+0x1c6/0x270 [ 2642.215409][T14149] __splice_from_pipe+0x397/0x7d0 [ 2642.220508][T14149] ? direct_splice_actor+0x190/0x190 [ 2642.225775][T14149] ? direct_splice_actor+0x190/0x190 [ 2642.231039][T14149] splice_from_pipe+0x108/0x170 [ 2642.235878][T14149] ? splice_shrink_spd+0xd0/0xd0 [ 2642.240799][T14149] ? apparmor_file_permission+0x25/0x30 [ 2642.246324][T14149] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2642.252553][T14149] ? security_file_permission+0x8f/0x380 [ 2642.258187][T14149] generic_splice_sendpage+0x3c/0x50 [ 2642.263465][T14149] ? splice_from_pipe+0x170/0x170 [ 2642.268476][T14149] do_splice+0x708/0x1410 [ 2642.272813][T14149] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2642.277921][T14149] ? __fget_light+0x1a9/0x230 [ 2642.282589][T14149] __x64_sys_splice+0x2c6/0x330 [ 2642.287423][T14149] do_syscall_64+0xfa/0x760 [ 2642.291922][T14149] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2642.297792][T14149] RIP: 0033:0x459f49 [ 2642.301665][T14149] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2642.321255][T14149] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2642.329644][T14149] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2642.337602][T14149] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2642.345562][T14149] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2642.353519][T14149] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2642.361467][T14149] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:31:54 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x8000000f, 0x0) 23:31:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") sendmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="2e00000014008105e00fe0ecdb4cb92e0a68022c0f000000160001008e7948f328995a017c7b58510600000001ff", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) r1 = socket(0x16, 0x800, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x2, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) 23:31:55 executing program 3: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) r1 = socket(0x10, 0x5, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") write(r0, &(0x7f0000000000)="1f0000000104ff40003b54c007110000f30502000b00020000000f000200cf", 0x1f) 23:31:55 executing program 3: r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f00000a9000)={0x2, 0x0, @local}, 0x10) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r1, &(0x7f0000002780), 0x400004d, 0x0) setsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000000000)=0x1, 0x4) sendmsg$inet_sctp(r0, &(0x7f0000000380)={&(0x7f0000000080)=@in={0x2, 0x0, @multicast2}, 0x7c, 0x0}, 0x4000000) [ 2642.603679][T14168] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2642.621752][T14168] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. 23:31:55 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xf0ffffff00000000) 23:31:55 executing program 2 (fault-call:10 fault-nth:26): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2643.051174][T14184] FAULT_INJECTION: forcing a failure. [ 2643.051174][T14184] name failslab, interval 1, probability 0, space 0, times 0 [ 2643.081653][T14184] CPU: 1 PID: 14184 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2643.089585][T14184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2643.099651][T14184] Call Trace: [ 2643.103057][T14184] dump_stack+0x172/0x1f0 [ 2643.107405][T14184] should_fail.cold+0xa/0x15 [ 2643.112028][T14184] ? fault_create_debugfs_attr+0x180/0x180 [ 2643.117845][T14184] ? ___might_sleep+0x163/0x2c0 [ 2643.122702][T14184] __should_failslab+0x121/0x190 [ 2643.127642][T14184] should_failslab+0x9/0x14 [ 2643.132143][T14184] __kmalloc+0x2e0/0x770 [ 2643.136391][T14184] ? __local_bh_enable_ip+0x15a/0x270 [ 2643.141761][T14184] ? lock_sock_nested+0xe2/0x120 [ 2643.146697][T14184] ? __local_bh_enable_ip+0x15a/0x270 [ 2643.152072][T14184] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2643.157359][T14184] ? lock_sock_nested+0x9a/0x120 [ 2643.162295][T14184] ? sock_kmalloc+0xc6/0x120 [ 2643.166912][T14184] sock_kmalloc+0xc6/0x120 [ 2643.171336][T14184] hash_alloc_result.part.0+0x95/0x110 [ 2643.176801][T14184] hash_sendpage+0x7a7/0x9d0 [ 2643.181405][T14184] hash_sendpage_nokey+0x94/0xa0 [ 2643.186353][T14184] kernel_sendpage+0x92/0xf0 [ 2643.190950][T14184] ? hash_check_key.isra.0+0x230/0x230 [ 2643.196414][T14184] sock_sendpage+0x8b/0xc0 [ 2643.200836][T14184] pipe_to_sendpage+0x296/0x360 [ 2643.205692][T14184] ? kernel_sendpage+0xf0/0xf0 [ 2643.210468][T14184] ? direct_splice_actor+0x190/0x190 [ 2643.215761][T14184] ? __put_page+0xa7/0xe0 [ 2643.220091][T14184] ? anon_pipe_buf_release+0x1c6/0x270 [ 2643.225560][T14184] __splice_from_pipe+0x397/0x7d0 [ 2643.234679][T14184] ? direct_splice_actor+0x190/0x190 [ 2643.239983][T14184] ? direct_splice_actor+0x190/0x190 [ 2643.245273][T14184] splice_from_pipe+0x108/0x170 [ 2643.250146][T14184] ? splice_shrink_spd+0xd0/0xd0 [ 2643.255103][T14184] ? apparmor_file_permission+0x25/0x30 [ 2643.260664][T14184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2643.266913][T14184] ? security_file_permission+0x8f/0x380 [ 2643.272555][T14184] generic_splice_sendpage+0x3c/0x50 [ 2643.277848][T14184] ? splice_from_pipe+0x170/0x170 [ 2643.282881][T14184] do_splice+0x708/0x1410 [ 2643.291056][T14184] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2643.296177][T14184] ? __fget_light+0x1a9/0x230 [ 2643.300858][T14184] __x64_sys_splice+0x2c6/0x330 [ 2643.305823][T14184] do_syscall_64+0xfa/0x760 [ 2643.310325][T14184] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2643.316204][T14184] RIP: 0033:0x459f49 [ 2643.316220][T14184] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2643.316227][T14184] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2643.316240][T14184] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2643.316248][T14184] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2643.316255][T14184] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2643.316264][T14184] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2643.316277][T14184] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:32:02 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:02 executing program 3: r0 = socket$inet(0x2, 0x1, 0xe5de) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000000)=0xffffffffffffff01, 0x4) gettid() r2 = socket(0xa, 0x3, 0x9) setsockopt$packet_buf(r2, 0x107, 0x1f, &(0x7f0000000280)="86025c556b25046c6a92973c3ca3f93e19c182413459753d7857fe208d8af43add44de7bfff8ec54a57168a4dbf6ae2852407f70e4d58bf9fc47f7d3d8bb417c4c8b0ddadcfb015e00d9574e9a43c7be25d2a509a8b06ab1bb0626958c9f18c3093e1226e96f950f0b7fea1b15bbb492b0f32d01a0abec83fe29c9747592241c090c4f048b773b4e778765004b861e796276cd9e7d580332dce8c0c79f0ab1e611c25da437", 0xa5) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000640), 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c0000002f00ff0300000300000000000000000000000000f50400000000000000048d1246a2e85e08caa1d21f093a20a71146ed021ccac257c165084194c72ec81498a4ed57a720059c47498f73f18b2d663b86d7f5d574a83ff010768b", @ANYRES32=r3], 0x1c}}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'bridge0\x00\x00\x01\x00', 0x40}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x89a1, &(0x7f0000000080)={'bridge0\x00', 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000740)={@loopback, @empty, @remote, 0x4, 0x0, 0x0, 0x100, 0xffff}) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000004c0)={0x2, 0x4e26, @empty}, 0xfffffe68) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x8, &(0x7f0000000600)="0adc1f123c123f3788b070") socket(0x400000000010, 0x80801, 0x100000000) sendto$packet(r2, &(0x7f0000000cc0)="6879481f2e1898ff194a2a3b4f71f7ac87efc9423b0d4e9d6ba4f3425b5557d366e904a6ef4eb276be39a55a4d216b50e7f54522f46b89bdb608e04756ffa4aaa06eb7c12b80588ee07e0afb01a3d767df562135189e49c2b5db63850a2d89ca0a2aeeb382fdccd0315444e43bad2bf50ace4a2f63880c", 0x77, 0x4000000000800, 0x0, 0x0) recvmmsg(r2, &(0x7f0000002100)=[{{&(0x7f0000000340)=@nfc_llcp, 0x80, &(0x7f0000000680)=[{&(0x7f00000003c0)=""/30, 0x1e}, {&(0x7f0000000400)=""/47, 0x2f}, {&(0x7f0000000440)=""/18, 0x12}], 0x3, &(0x7f00000006c0)=""/104, 0x68}, 0x10000}, {{&(0x7f00000007c0)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000a80)=""/14, 0xe}, 0x3}, {{&(0x7f0000000ac0)=@ipx, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000b40)=""/95, 0x5f}, {&(0x7f0000000bc0)=""/212, 0xd4}, {&(0x7f0000002300)=""/248, 0xf8}, {&(0x7f0000000dc0)=""/26, 0x1a}, {&(0x7f0000000e00)=""/57, 0x39}, {&(0x7f0000000e40)=""/13, 0xd}, {&(0x7f0000000e80)=""/177, 0xb1}], 0x7, &(0x7f0000000fc0)=""/170, 0xaa}, 0x539f00000}, {{&(0x7f0000001080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000015c0)=[{&(0x7f0000001100)=""/206, 0xce}, {&(0x7f0000001200)=""/159, 0x9f}, {&(0x7f00000012c0)=""/103, 0x67}, {&(0x7f00000009c0)=""/157, 0x9d}, {&(0x7f0000001400)=""/153, 0x99}, {&(0x7f00000014c0)=""/67, 0x43}, {&(0x7f0000001540)=""/93, 0x5d}], 0x7}, 0x88d}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/237, 0xed}, {&(0x7f0000001640)=""/5, 0x5}, {&(0x7f0000001900)=""/183, 0xb7}], 0x4, &(0x7f00000019c0)=""/141, 0x8d}, 0x3}, {{&(0x7f0000001a80)=@can, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001b00)=""/231, 0xe7}, {&(0x7f0000002400)=""/64, 0x40}, {&(0x7f0000001c40)=""/106, 0x6a}, {&(0x7f0000001cc0)=""/37, 0x25}, {&(0x7f0000001d00)=""/227, 0xe3}, {&(0x7f0000001e00)=""/17, 0x11}, {&(0x7f0000001e40)=""/45, 0x2d}, {&(0x7f0000002440)=""/211, 0xd3}], 0x8, &(0x7f0000000840)=""/195, 0xc3}, 0x10001}], 0x6, 0x2020, &(0x7f0000002280)={0x0, 0x1c9c380}) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000940)=ANY=[@ANYBLOB="14000000a37edad4fbcc01006dc538cc936f2a000fb9bcc389bde3f8d50592689f951b35b301a63f1d36aeed220601000000000000003b2a7c94fe269849c5870d237ac94a11068df75f0d551a3feb369320544ebf7d85b0dbc94789a8b5d5a8b11b4f8f3c6e4de4265a540e0c585e41e9e0132f82"], 0x14}}, 0x0) write(r4, &(0x7f0000000000)="2400000021002551075c0165ff0ffc020200000000100f0207e1000c0800100000000000bc0000008f3943793a5ea67658cb22d90000000000000059b97dc8f8b550e66a2bff77c4931da84157f7a733686a22fd8169f6b6b4f464e0c05df670d851f785ea2b85d32b3583d87124da3bb0b9e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c4831f65123819e204853d48a5a6bd525801d5cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1acb78ce510c7a70723741b34981d1b182deb7904", 0xe0) connect$inet(r0, &(0x7f00009322c4)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0x2700, 0x1ff, 0x6, 0x4, 0x8}, &(0x7f00000005c0)=0xfffffffffffffe57) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r7, 0x0) connect$l2tp(r7, &(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e24, @local}, 0x0, 0x2, 0x1}}, 0x2e) r8 = socket$inet(0x2, 0x3ffffffffffffffe, 0x0) bind$inet(r0, &(0x7f00000022c0)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x1) sendto$inet(r8, 0x0, 0x0, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @broadcast}, 0x10) write$binfmt_elf64(r8, &(0x7f00000016c0)=ANY=[@ANYRES16=r5, @ANYRESDEC, @ANYRES16], 0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) 23:32:02 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r0, &(0x7f0000002780), 0x0, 0x0) vmsplice(r2, &(0x7f0000000000), 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc020662a, &(0x7f00000000c0)={0x4000000, r6, 0x1800}) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r7, &(0x7f00000003c0)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r7, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000705000000000000008000000000", @ANYRES32=r9, @ANYBLOB="00000000ffffffff00000000090001006866736300000000fbff020000000000"], 0x38}}, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r10, &(0x7f0000000000), 0xfffffea6) bind$xdp(r6, &(0x7f0000000200)={0x2c, 0x2, r9, 0x3e, r10}, 0x10) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r11 = socket$inet_icmp_raw(0x2, 0x3, 0x1) clock_gettime(0x6, &(0x7f0000000100)) ioctl(r11, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0x54d0c017) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 23:32:02 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:02 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000300, 0x0) 23:32:02 executing program 2 (fault-call:10 fault-nth:27): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2650.485153][T14197] bridge0: port 2(bridge_slave_1) entered disabled state [ 2650.493713][T14197] bridge0: port 1(bridge_slave_0) entered disabled state [ 2650.619321][T14211] FAULT_INJECTION: forcing a failure. [ 2650.619321][T14211] name failslab, interval 1, probability 0, space 0, times 0 [ 2650.644597][T14211] CPU: 1 PID: 14211 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2650.652554][T14211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2650.662613][T14211] Call Trace: [ 2650.665913][T14211] dump_stack+0x172/0x1f0 [ 2650.670262][T14211] should_fail.cold+0xa/0x15 [ 2650.674876][T14211] ? fault_create_debugfs_attr+0x180/0x180 [ 2650.680694][T14211] ? ___might_sleep+0x163/0x2c0 [ 2650.685631][T14211] __should_failslab+0x121/0x190 [ 2650.690586][T14211] should_failslab+0x9/0x14 [ 2650.695102][T14211] __kmalloc+0x2e0/0x770 [ 2650.699357][T14211] ? __local_bh_enable_ip+0x15a/0x270 [ 2650.708736][T14211] ? lock_sock_nested+0xe2/0x120 [ 2650.713678][T14211] ? __local_bh_enable_ip+0x15a/0x270 [ 2650.719322][T14211] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2650.724614][T14211] ? lock_sock_nested+0x9a/0x120 [ 2650.729582][T14211] ? sock_kmalloc+0xc6/0x120 [ 2650.734185][T14211] sock_kmalloc+0xc6/0x120 [ 2650.738630][T14211] hash_alloc_result.part.0+0x95/0x110 [ 2650.744122][T14211] hash_sendpage+0x7a7/0x9d0 [ 2650.748735][T14211] hash_sendpage_nokey+0x94/0xa0 [ 2650.753686][T14211] kernel_sendpage+0x92/0xf0 [ 2650.758282][T14211] ? hash_check_key.isra.0+0x230/0x230 [ 2650.763932][T14211] sock_sendpage+0x8b/0xc0 [ 2650.768366][T14211] pipe_to_sendpage+0x296/0x360 [ 2650.773227][T14211] ? kernel_sendpage+0xf0/0xf0 [ 2650.778008][T14211] ? direct_splice_actor+0x190/0x190 [ 2650.783306][T14211] ? __put_page+0xa7/0xe0 [ 2650.787823][T14211] ? anon_pipe_buf_release+0x1c6/0x270 [ 2650.793524][T14211] __splice_from_pipe+0x397/0x7d0 [ 2650.799022][T14211] ? direct_splice_actor+0x190/0x190 [ 2650.804337][T14211] ? direct_splice_actor+0x190/0x190 [ 2650.809638][T14211] splice_from_pipe+0x108/0x170 [ 2650.814512][T14211] ? splice_shrink_spd+0xd0/0xd0 [ 2650.819478][T14211] ? apparmor_file_permission+0x25/0x30 [ 2650.825035][T14211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2650.831374][T14211] ? security_file_permission+0x8f/0x380 [ 2650.837020][T14211] generic_splice_sendpage+0x3c/0x50 [ 2650.842321][T14211] ? splice_from_pipe+0x170/0x170 [ 2650.847361][T14211] do_splice+0x708/0x1410 [ 2650.851727][T14211] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2650.856851][T14211] ? __fget_light+0x1a9/0x230 [ 2650.861537][T14211] __x64_sys_splice+0x2c6/0x330 [ 2650.866408][T14211] do_syscall_64+0xfa/0x760 [ 2650.871010][T14211] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2650.876989][T14211] RIP: 0033:0x459f49 [ 2650.880885][T14211] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2650.900583][T14211] RSP: 002b:00007f28eb52fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2650.909004][T14211] RAX: ffffffffffffffda RBX: 00007f28eb52fc90 RCX: 0000000000459f49 [ 2650.916994][T14211] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2650.924975][T14211] RBP: 000000000075c070 R08: 0000000080000001 R09: 0000000000000000 [ 2650.932990][T14211] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5306d4 [ 2650.940979][T14211] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2651.063859][T14206] device bridge_slave_1 left promiscuous mode [ 2651.076509][T14206] bridge0: port 2(bridge_slave_1) entered disabled state [ 2651.136751][T14206] device bridge_slave_0 left promiscuous mode [ 2651.150971][T14206] bridge0: port 1(bridge_slave_0) entered disabled state 23:32:03 executing program 2 (fault-call:10 fault-nth:28): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:03 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0xfffffea6) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f00000000c0)=0x5, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) r6 = accept$ax25(r4, &(0x7f0000000300)={{}, [@remote, @null, @rose, @null, @null, @bcast, @netrom, @netrom]}, &(0x7f0000000380)=0x48) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc020662a, &(0x7f00000000c0)={0x4000000, r8, 0x1800}) getsockopt$MISDN_TIME_STAMP(r8, 0x0, 0x1, &(0x7f0000000100), &(0x7f0000000240)=0x4) setsockopt$ax25_SO_BINDTODEVICE(r6, 0x101, 0x19, &(0x7f00000003c0)=@rose={'rose', 0x0}, 0x10) 23:32:03 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000600, 0x0) 23:32:03 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2651.496506][T14226] FAULT_INJECTION: forcing a failure. [ 2651.496506][T14226] name failslab, interval 1, probability 0, space 0, times 0 [ 2651.525674][T14226] CPU: 0 PID: 14226 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2651.533611][T14226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2651.543671][T14226] Call Trace: [ 2651.546972][T14226] dump_stack+0x172/0x1f0 [ 2651.551322][T14226] should_fail.cold+0xa/0x15 [ 2651.555934][T14226] ? fault_create_debugfs_attr+0x180/0x180 [ 2651.561757][T14226] ? ___might_sleep+0x163/0x2c0 [ 2651.567315][T14226] __should_failslab+0x121/0x190 [ 2651.572264][T14226] should_failslab+0x9/0x14 [ 2651.576775][T14226] __kmalloc+0x2e0/0x770 [ 2651.581028][T14226] ? __local_bh_enable_ip+0x15a/0x270 [ 2651.586408][T14226] ? lock_sock_nested+0xe2/0x120 [ 2651.591696][T14226] ? __local_bh_enable_ip+0x15a/0x270 [ 2651.597075][T14226] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2651.602365][T14226] ? lock_sock_nested+0x9a/0x120 [ 2651.607307][T14226] ? sock_kmalloc+0xc6/0x120 [ 2651.611906][T14226] sock_kmalloc+0xc6/0x120 [ 2651.616337][T14226] hash_alloc_result.part.0+0x95/0x110 [ 2651.621802][T14226] hash_sendpage+0x7a7/0x9d0 [ 2651.626409][T14226] hash_sendpage_nokey+0x94/0xa0 [ 2651.631360][T14226] kernel_sendpage+0x92/0xf0 [ 2651.635959][T14226] ? hash_check_key.isra.0+0x230/0x230 [ 2651.641954][T14226] sock_sendpage+0x8b/0xc0 [ 2651.646389][T14226] pipe_to_sendpage+0x296/0x360 [ 2651.651243][T14226] ? kernel_sendpage+0xf0/0xf0 [ 2651.656013][T14226] ? direct_splice_actor+0x190/0x190 [ 2651.661308][T14226] ? __put_page+0xa7/0xe0 [ 2651.665646][T14226] ? anon_pipe_buf_release+0x1c6/0x270 [ 2651.671119][T14226] __splice_from_pipe+0x397/0x7d0 [ 2651.676331][T14226] ? direct_splice_actor+0x190/0x190 [ 2651.681631][T14226] ? direct_splice_actor+0x190/0x190 [ 2651.686921][T14226] splice_from_pipe+0x108/0x170 [ 2651.691781][T14226] ? splice_shrink_spd+0xd0/0xd0 [ 2651.696730][T14226] ? apparmor_file_permission+0x25/0x30 [ 2651.702629][T14226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2651.708881][T14226] ? security_file_permission+0x8f/0x380 [ 2651.714684][T14226] generic_splice_sendpage+0x3c/0x50 [ 2651.720002][T14226] ? splice_from_pipe+0x170/0x170 [ 2651.725142][T14226] do_splice+0x708/0x1410 [ 2651.729491][T14226] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2651.734699][T14226] ? __fget_light+0x1a9/0x230 [ 2651.739407][T14226] __x64_sys_splice+0x2c6/0x330 [ 2651.744275][T14226] do_syscall_64+0xfa/0x760 [ 2651.748790][T14226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2651.754686][T14226] RIP: 0033:0x459f49 [ 2651.758585][T14226] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2651.778193][T14226] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2651.787049][T14226] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 23:32:04 executing program 3: [ 2651.795030][T14226] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2651.803098][T14226] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2651.811170][T14226] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2651.819146][T14226] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:32:04 executing program 3: 23:32:09 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:09 executing program 3: 23:32:09 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000003c0)={0x0, r1}, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc020662a, &(0x7f00000000c0)={0x4000000, r6, 0x1800}) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r7, &(0x7f0000002780), 0x400004d, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r7, &(0x7f0000000380)={0x2}) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) accept4$netrom(r3, &(0x7f0000000240)={{0x3, @netrom}, [@default, @netrom, @null, @rose, @rose, @bcast, @null]}, &(0x7f00000002c0)=0x48, 0x80400) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc020662a, &(0x7f00000000c0)={0x4000000, r9, 0x1800}) getsockopt$XDP_STATISTICS(r9, 0x11b, 0x7, &(0x7f0000000300), &(0x7f0000000340)=0x18) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f00000000c0), &(0x7f0000000100)=0xb) 23:32:09 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xf) 23:32:09 executing program 2 (fault-call:10 fault-nth:29): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:09 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000240)={{{@in=@empty, @in6=@dev}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r6, &(0x7f0000002780), 0x400004d, 0x0) setsockopt$SO_TIMESTAMP(r6, 0x1, 0x40, &(0x7f0000000100)=0xfffffffc, 0x4) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:09 executing program 3: 23:32:09 executing program 3: [ 2657.057842][T14268] FAULT_INJECTION: forcing a failure. [ 2657.057842][T14268] name failslab, interval 1, probability 0, space 0, times 0 [ 2657.074408][T14268] CPU: 0 PID: 14268 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2657.082325][T14268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2657.093681][T14268] Call Trace: [ 2657.096981][T14268] dump_stack+0x172/0x1f0 [ 2657.101326][T14268] should_fail.cold+0xa/0x15 [ 2657.105931][T14268] ? fault_create_debugfs_attr+0x180/0x180 [ 2657.111747][T14268] ? ___might_sleep+0x163/0x2c0 [ 2657.116693][T14268] __should_failslab+0x121/0x190 [ 2657.121642][T14268] should_failslab+0x9/0x14 [ 2657.126163][T14268] __kmalloc+0x2e0/0x770 [ 2657.130420][T14268] ? __local_bh_enable_ip+0x15a/0x270 [ 2657.135799][T14268] ? lock_sock_nested+0xe2/0x120 [ 2657.140749][T14268] ? __local_bh_enable_ip+0x15a/0x270 [ 2657.146130][T14268] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2657.151422][T14268] ? lock_sock_nested+0x9a/0x120 [ 2657.156370][T14268] ? sock_kmalloc+0xc6/0x120 [ 2657.160967][T14268] sock_kmalloc+0xc6/0x120 [ 2657.165393][T14268] hash_alloc_result.part.0+0x95/0x110 [ 2657.170857][T14268] hash_sendpage+0x7a7/0x9d0 [ 2657.175460][T14268] hash_sendpage_nokey+0x94/0xa0 [ 2657.180411][T14268] kernel_sendpage+0x92/0xf0 [ 2657.185006][T14268] ? hash_check_key.isra.0+0x230/0x230 [ 2657.190471][T14268] sock_sendpage+0x8b/0xc0 [ 2657.194900][T14268] pipe_to_sendpage+0x296/0x360 [ 2657.199759][T14268] ? kernel_sendpage+0xf0/0xf0 [ 2657.204531][T14268] ? direct_splice_actor+0x190/0x190 [ 2657.209822][T14268] ? __put_page+0xa7/0xe0 [ 2657.214159][T14268] ? anon_pipe_buf_release+0x1c6/0x270 [ 2657.219626][T14268] __splice_from_pipe+0x397/0x7d0 [ 2657.224659][T14268] ? direct_splice_actor+0x190/0x190 [ 2657.230304][T14268] ? direct_splice_actor+0x190/0x190 [ 2657.236940][T14268] splice_from_pipe+0x108/0x170 [ 2657.241806][T14268] ? splice_shrink_spd+0xd0/0xd0 [ 2657.246824][T14268] ? apparmor_file_permission+0x25/0x30 [ 2657.252380][T14268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2657.258618][T14268] ? security_file_permission+0x8f/0x380 [ 2657.264236][T14268] generic_splice_sendpage+0x3c/0x50 [ 2657.269505][T14268] ? splice_from_pipe+0x170/0x170 [ 2657.274590][T14268] do_splice+0x708/0x1410 [ 2657.278922][T14268] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2657.284017][T14268] ? __fget_light+0x1a9/0x230 [ 2657.288770][T14268] __x64_sys_splice+0x2c6/0x330 [ 2657.293681][T14268] do_syscall_64+0xfa/0x760 [ 2657.298188][T14268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2657.304085][T14268] RIP: 0033:0x459f49 [ 2657.307984][T14268] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2657.327625][T14268] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2657.336039][T14268] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2657.343993][T14268] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 23:32:09 executing program 3: 23:32:09 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000002c0)={0x2f, @dev={0xac, 0x14, 0x14, 0x19}, 0x4e24, 0x2, 'sh\x00', 0x36, 0x81, 0x77}, 0x2c) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc020662a, &(0x7f00000000c0)={0x4000000, r5, 0x1800}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc020662a, &(0x7f00000000c0)={0x4000000, r7, 0x1800}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r7, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x4, 0x4}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f0000000240)={r8, 0x1f}, 0x8) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r9, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2657.352061][T14268] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2657.360019][T14268] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2657.367984][T14268] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:32:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0xa, &(0x7f0000000000), 0x4) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x2, 0x250, [0x0, 0x20000100, 0x20000130, 0x20000280], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000002000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000697036677265300000000000000000007465616d30000000000000000000000076657468305f746f5f626f6e6400000076657468305f746f5f626f6e64000000aaaaaaaaaa0000000000000024ffffffffff0000000000000000f0000000f0000000200100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000000002000000000000000000000000000000000000000000000000000000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000041554449540000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000feffffff0100000011000000000000000000766c616e3000000000000000000000006c6f0000000000000000000000000000726f736530000000000000000000000062726964676530000000000000000000ffffffffffff000000000000aaaaaaaaaa0000000000000000007000000070000000a000000041554449540000000000000000000000000000000000000000000000000000000800"/592]}, 0x2c8) socket$inet_udplite(0x2, 0x2, 0x88) 23:32:10 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, 0x0, &(0x7f0000000180)=0x1b51243f174c416e) r1 = accept(r0, &(0x7f0000000500)=@ax25={{0x3, @null}, [@netrom, @null, @remote, @remote, @rose, @remote, @bcast, @null]}, 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000480)={'TPROXY\x00'}, &(0x7f0000000580)=0x1e) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$bt_l2cap(r3, &(0x7f00000001c0)={0x1f, 0x1, {0x0, 0x4, 0x0, 0x8, 0x6, 0x5}, 0x100000001, 0x2838}, 0xe) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x5c832, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r4, &(0x7f0000002780), 0x400004d, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYRES32=r4], 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000004c0)={r5, 0x9}, 0x8) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000300)=0x3, 0x4) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc020662a, &(0x7f00000000c0)={0x4000000, r10, 0x1800}) r11 = openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r15 = openat$cgroup_ro(r14, &(0x7f00000006c0)='cpuacct.usage_percpu_user\x00', 0x7a05, 0x1700) write$binfmt_misc(r13, &(0x7f0000000140)=ANY=[], 0xfffffc8f) getsockopt$inet_sctp6_SCTP_MAX_BURST(r15, 0x84, 0x14, &(0x7f0000000040), 0x0) splice(r12, 0x0, r15, 0x0, 0x100000000ffe0, 0x0) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r16 = socket(0x5, 0x9, 0xd1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f0000000040)={r17}, &(0x7f0000000140)=0x20000048) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={r17, @in={{0x2, 0x0, @multicast1}}}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r16, 0x84, 0xa, &(0x7f0000000080)={0x82, 0xde7, 0x8, 0x1f, 0x2, 0xf57, 0x200, 0xfffffffa, r17}, 0x20) getsockopt$inet6_mreq(r6, 0x29, 0x1c, &(0x7f0000000100), &(0x7f0000000200)=0x14) r18 = socket$nl_route(0x10, 0x3, 0x0) r19 = socket(0x11, 0x800000003, 0x0) bind(r19, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r19, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r18, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="380000002400e50d0000000000000000000000004389ddfb61f798a23a5ea828a9146435ae2d2900fa04a41e3bdb", @ANYRES32=r20, @ANYBLOB="00000000ffffffff00000059f006000068686e3247e8caba0c981a00000006335aadbcd6bd94205fab18edbb00"], 0x38}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000005c0)={@ipv4={[], [], @loopback}, 0x13, r20}) splice(r6, 0x0, r11, 0x0, 0x100000000000a, 0x0) r21 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x20, 0x4) ioctl(r21, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") 23:32:17 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002540), 0x1, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:17 executing program 2 (fault-call:10 fault-nth:30): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:17 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xf00) 23:32:17 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$inet6(r2, &(0x7f0000000400)={&(0x7f0000000100)={0xa, 0x4e23, 0xac6, @local, 0x4}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000000240)="8f701539c8e0b91075a8ca4cf2", 0xd}, {&(0x7f0000000280)="637f5c48f04902069ce18d5d6a2a0bfd7d520da762f9498d24e2a7fd4f083ea25e70b37f5f41e8d90ef2fbe3f7639986a0810e9aadc74d673181afa0350669eadac25e5edcb817e3ae5734880c68ca8f2d83281801fa66fe4a5858caab74c9d75b0e0d3927ce6997513e22ed8f0b0836f101430e985d04c14f89a4d015903fe20e875b67b51e48ec67de39ede645e1ec5e760cbc732aae7bfaa33887bd4c911572fae87067d6220eb277dc90c0c26bd4611c1b3c47dc27fc3f", 0xb9}, {&(0x7f0000000340)="ec5e00b86c22a184f7bd454a2a1015360a01b74ded4f21fea428c0e39665fcf8a61ba8e9f6c0c972fca8ddf4459a1b38df58eb9b81ca0f916e966237cbf5766898", 0x41}], 0x4, &(0x7f0000001480)=ANY=[@ANYBLOB="e80000000000000029000000040000003c19000000000000c204000000010001000105000000000005020030071800000100040409000700000000000000d7000000000000000730000000810a040018e703000000000000e6b593c229b154c1cd514c075c0000000000000007000000000000000661db6f7b112be67f6c26bc8bd49b9cc4269f3c3638f45b309863f99f88b452991c06dc24ab079b67aa5ad0290cb6398e09bf8fc69b2fb169a02b05607477d2a96d61e67b13cd3bbb25a1563c2df8906ffc0b9f108ed288ac280cefbc51de930299d90502"], 0xe8}, 0x20040010) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) ioctl$SIOCX25GCALLUSERDATA(r3, 0x89e4, &(0x7f00000018c0)={0x70, "546b517d933f090a68a6209d1ed90c877adfd0042e8bb64e99b0839aba24b7e72853e20890464d006c602348081392344ba9182cdd7ada94f36f72def1e2cdc25e549112ceb14d21adb3d3c8a86f7d1551c247b270f5306528b47dc747f260fed0f247eb8a4dbb4e18b33a612b16dc004303709dc30f3a612b5bdf1afb7b417f"}) r4 = socket$alg(0x26, 0x5, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0xfffffea6) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000001580)='fou\x00') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc020662a, &(0x7f00000000c0)={0x4000000, r8, 0x1800}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r8, 0x10e, 0x8, &(0x7f0000001980)=0x4, 0x4) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc020662a, &(0x7f00000000c0)={0x4000000, r10, 0x1800}) sendmsg$nl_crypto(r9, &(0x7f0000001880)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x2002000}, 0xc, &(0x7f0000001840)={&(0x7f0000001740)=@getstat={0xe0, 0x15, 0x1, 0x70bd2a, 0x25dfdbfc, {{'authenc(nhpoly1305-sse2,ecb(blowfish))\x00'}, [], [], 0x7000, 0x2000}, ["", "", ""]}, 0xe0}, 0x1, 0x0, 0x0, 0x20000000}, 0x40600d0) sendmsg$FOU_CMD_ADD(r5, &(0x7f00000016c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x90103000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001640)={0x70, r6, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x84}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @empty}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x5c}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @local}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @mcast2}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_PEER_V4={0x8, 0x8, @rand_addr=0x75e6}, @FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) bind$alg(r4, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r11 = accept4(r4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r12 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r12, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r13 = socket$caif_stream(0x25, 0x1, 0x1) write(r13, &(0x7f0000001600)="b9c48211150000000000ff100050000000001a00000000000001", 0xfffffffffffffff5) splice(r0, 0x0, r11, 0x0, 0x80000001, 0x0) 23:32:17 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000240)="b3b6089b77898bf04ab8f6c2b59e549c110dd98810b9616cbc14fd0671fa612a8d9163a5bf8ec885117d7a5a14959ed05d15bc041c997934f1c5abce0c62d8df3747073304dc900d13f02b143bbb4da164896f0be3b41c45e72e28931b3d72109326773ce3a6affd8cb5a240598972fe8a15763b65d87c7d563757574dec4c679a0128f7c6c38a9eb5f6123679ec2cc304936764c13200ad847030343caaa198175439c973bd8a9ec6ec29d0f2fa2654955fd1e42e97aef37d7cecd5a013c2a99160d14088c7e9ce316876275d", 0xcd}], 0x1) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 23:32:17 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, 0x0, &(0x7f0000000180)=0x1b51243f174c416e) r1 = accept(r0, &(0x7f0000000500)=@ax25={{0x3, @null}, [@netrom, @null, @remote, @remote, @rose, @remote, @bcast, @null]}, 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000480)={'TPROXY\x00'}, &(0x7f0000000580)=0x1e) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$bt_l2cap(r3, &(0x7f00000001c0)={0x1f, 0x1, {0x0, 0x4, 0x0, 0x8, 0x6, 0x5}, 0x100000001, 0x2838}, 0xe) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x4, 0x5c832, 0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r4, &(0x7f0000002780), 0x400004d, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYRES32=r4], 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000004c0)={r5, 0x9}, 0x8) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$inet_mtu(r8, 0x0, 0xa, &(0x7f0000000300)=0x3, 0x4) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc020662a, &(0x7f00000000c0)={0x4000000, r10, 0x1800}) r11 = openat$cgroup_ro(r9, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz0\x00', 0x200002, 0x0) r15 = openat$cgroup_ro(r14, &(0x7f00000006c0)='cpuacct.usage_percpu_user\x00', 0x7a05, 0x1700) write$binfmt_misc(r13, &(0x7f0000000140)=ANY=[], 0xfffffc8f) getsockopt$inet_sctp6_SCTP_MAX_BURST(r15, 0x84, 0x14, &(0x7f0000000040), 0x0) splice(r12, 0x0, r15, 0x0, 0x100000000ffe0, 0x0) write$binfmt_misc(r7, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r16 = socket(0x5, 0x9, 0xd1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f0000000040)={r17}, &(0x7f0000000140)=0x20000048) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000009c0)={r17, @in={{0x2, 0x0, @multicast1}}}, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r16, 0x84, 0xa, &(0x7f0000000080)={0x82, 0xde7, 0x8, 0x1f, 0x2, 0xf57, 0x200, 0xfffffffa, r17}, 0x20) getsockopt$inet6_mreq(r6, 0x29, 0x1c, &(0x7f0000000100), &(0x7f0000000200)=0x14) r18 = socket$nl_route(0x10, 0x3, 0x0) r19 = socket(0x11, 0x800000003, 0x0) bind(r19, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r19, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r18, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="380000002400e50d0000000000000000000000004389ddfb61f798a23a5ea828a9146435ae2d2900fa04a41e3bdb", @ANYRES32=r20, @ANYBLOB="00000000ffffffff00000059f006000068686e3247e8caba0c981a00000006335aadbcd6bd94205fab18edbb00"], 0x38}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f00000005c0)={@ipv4={[], [], @loopback}, 0x13, r20}) splice(r6, 0x0, r11, 0x0, 0x100000000000a, 0x0) r21 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r2, 0x111, 0x1, 0x20, 0x4) ioctl(r21, 0x1000008912, &(0x7f0000000000)="0a5c1f023c126285719070") [ 2665.492556][T14314] FAULT_INJECTION: forcing a failure. [ 2665.492556][T14314] name failslab, interval 1, probability 0, space 0, times 0 [ 2665.522622][T14314] CPU: 0 PID: 14314 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2665.530554][T14314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2665.540615][T14314] Call Trace: [ 2665.543918][T14314] dump_stack+0x172/0x1f0 [ 2665.548262][T14314] should_fail.cold+0xa/0x15 [ 2665.552867][T14314] ? fault_create_debugfs_attr+0x180/0x180 [ 2665.558686][T14314] ? ___might_sleep+0x163/0x2c0 [ 2665.563544][T14314] __should_failslab+0x121/0x190 [ 2665.568493][T14314] should_failslab+0x9/0x14 [ 2665.573008][T14314] __kmalloc+0x2e0/0x770 [ 2665.577267][T14314] ? __local_bh_enable_ip+0x15a/0x270 [ 2665.582640][T14314] ? lock_sock_nested+0xe2/0x120 [ 2665.587583][T14314] ? __local_bh_enable_ip+0x15a/0x270 [ 2665.592961][T14314] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2665.598247][T14314] ? lock_sock_nested+0x9a/0x120 [ 2665.603185][T14314] ? sock_kmalloc+0xc6/0x120 [ 2665.607781][T14314] sock_kmalloc+0xc6/0x120 [ 2665.612206][T14314] hash_alloc_result.part.0+0x95/0x110 [ 2665.617672][T14314] hash_sendpage+0x7a7/0x9d0 [ 2665.622274][T14314] hash_sendpage_nokey+0x94/0xa0 [ 2665.627221][T14314] kernel_sendpage+0x92/0xf0 [ 2665.631813][T14314] ? hash_check_key.isra.0+0x230/0x230 [ 2665.637277][T14314] sock_sendpage+0x8b/0xc0 [ 2665.641706][T14314] pipe_to_sendpage+0x296/0x360 [ 2665.646564][T14314] ? kernel_sendpage+0xf0/0xf0 [ 2665.651335][T14314] ? direct_splice_actor+0x190/0x190 [ 2665.656628][T14314] ? __put_page+0xa7/0xe0 [ 2665.660965][T14314] ? anon_pipe_buf_release+0x1c6/0x270 [ 2665.666433][T14314] __splice_from_pipe+0x397/0x7d0 [ 2665.671466][T14314] ? direct_splice_actor+0x190/0x190 [ 2665.676765][T14314] ? direct_splice_actor+0x190/0x190 [ 2665.682059][T14314] splice_from_pipe+0x108/0x170 [ 2665.686922][T14314] ? splice_shrink_spd+0xd0/0xd0 [ 2665.691872][T14314] ? apparmor_file_permission+0x25/0x30 [ 2665.697423][T14314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2665.703680][T14314] ? security_file_permission+0x8f/0x380 [ 2665.709325][T14314] generic_splice_sendpage+0x3c/0x50 [ 2665.714613][T14314] ? splice_from_pipe+0x170/0x170 [ 2665.719647][T14314] do_splice+0x708/0x1410 [ 2665.723996][T14314] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2665.729123][T14314] ? __fget_light+0x1a9/0x230 [ 2665.733989][T14314] __x64_sys_splice+0x2c6/0x330 [ 2665.738853][T14314] do_syscall_64+0xfa/0x760 [ 2665.743370][T14314] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2665.749260][T14314] RIP: 0033:0x459f49 [ 2665.753159][T14314] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2665.772761][T14314] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2665.781179][T14314] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2665.789154][T14314] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2665.797125][T14314] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2665.805099][T14314] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2665.813085][T14314] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:32:18 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, &(0x7f00000000c0)=""/98, 0x62, 0x40000121, &(0x7f0000000240)=@file={0x0, './file0\x00'}, 0x6e) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) getgid() bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0xfffffea6) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r6, &(0x7f0000002780), 0x400004d, 0x0) epoll_ctl$EPOLL_CTL_MOD(r5, 0x3, r6, &(0x7f00000002c0)={0x10000008}) 23:32:18 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r4, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e21, @local}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x0, {0x2, 0x4e23, @multicast2}, 'veth1_to_bond\x00'}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:18 executing program 2 (fault-call:10 fault-nth:31): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:18 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x3f00) 23:32:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x1b1, &(0x7f0000000200)={&(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x18}}, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=0xe, 0x400) connect$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0xfff, {0x0, 0x1}}, 0xe) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000080), 0xe) r2 = getuid() setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in6=@remote, 0x4e22, 0x2, 0x4e23, 0x9, 0xfe9f605bfab53419, 0x20, 0x20, 0x0, 0x0, r2}, {0x0, 0x3, 0x8, 0x8000, 0x0, 0x0, 0xffffffffffffff80}, {0x401, 0x9}, 0xbaa, 0x6e6bbb, 0x2, 0x5293d9c3fe85acc1, 0x0, 0x1}, {{@in6=@remote, 0x4d2, 0x3c}, 0xa, @in6=@remote, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7, 0x4}}, 0xe8) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b509000000e87b0071") r4 = socket$inet_tcp(0x2, 0x1, 0x0) socket(0x10, 0xa, 0x5) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000007c0)={{{@in6=@empty, @in6=@loopback}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000100)=0xfffffffffffffe72) r5 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000a80)={{}, [@null, @default, @null, @null, @netrom, @remote, @netrom, @default]}, &(0x7f0000000600)=0x48, 0x80000) ioctl$SIOCAX25ADDFWD(r5, 0x89ea, &(0x7f0000000b00)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) splice(r8, 0x0, r6, 0x0, 0x80000001, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif-generic\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) splice(r11, 0x0, r9, 0x0, 0x80000001, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000002040)={{{@in6=@remote, @in6=@mcast2}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000500)=0xffffff8e) r12 = socket$unix(0x1, 0x5, 0x0) bind$unix(r12, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) [ 2666.459769][T14345] FAULT_INJECTION: forcing a failure. [ 2666.459769][T14345] name failslab, interval 1, probability 0, space 0, times 0 [ 2666.478681][T14345] CPU: 0 PID: 14345 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2666.478695][T14345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2666.478700][T14345] Call Trace: [ 2666.478719][T14345] dump_stack+0x172/0x1f0 [ 2666.478738][T14345] should_fail.cold+0xa/0x15 [ 2666.504501][T14345] ? fault_create_debugfs_attr+0x180/0x180 [ 2666.504526][T14345] ? ___might_sleep+0x163/0x2c0 [ 2666.504547][T14345] __should_failslab+0x121/0x190 [ 2666.504570][T14345] should_failslab+0x9/0x14 [ 2666.519769][T14345] __kmalloc+0x2e0/0x770 [ 2666.519786][T14345] ? __local_bh_enable_ip+0x15a/0x270 [ 2666.519800][T14345] ? lock_sock_nested+0xe2/0x120 [ 2666.519815][T14345] ? __local_bh_enable_ip+0x15a/0x270 [ 2666.519831][T14345] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2666.519847][T14345] ? lock_sock_nested+0x9a/0x120 [ 2666.529246][T14345] ? sock_kmalloc+0xc6/0x120 [ 2666.529266][T14345] sock_kmalloc+0xc6/0x120 [ 2666.529287][T14345] hash_alloc_result.part.0+0x95/0x110 [ 2666.529304][T14345] hash_sendpage+0x7a7/0x9d0 [ 2666.529325][T14345] hash_sendpage_nokey+0x94/0xa0 [ 2666.538896][T14345] kernel_sendpage+0x92/0xf0 [ 2666.538911][T14345] ? hash_check_key.isra.0+0x230/0x230 [ 2666.538930][T14345] sock_sendpage+0x8b/0xc0 [ 2666.538951][T14345] pipe_to_sendpage+0x296/0x360 [ 2666.538966][T14345] ? kernel_sendpage+0xf0/0xf0 [ 2666.538982][T14345] ? direct_splice_actor+0x190/0x190 [ 2666.539005][T14345] ? __put_page+0xa7/0xe0 [ 2666.554533][T14345] ? anon_pipe_buf_release+0x1c6/0x270 [ 2666.554557][T14345] __splice_from_pipe+0x397/0x7d0 [ 2666.554574][T14345] ? direct_splice_actor+0x190/0x190 [ 2666.554596][T14345] ? direct_splice_actor+0x190/0x190 [ 2666.554613][T14345] splice_from_pipe+0x108/0x170 [ 2666.568509][T14345] ? splice_shrink_spd+0xd0/0xd0 [ 2666.568534][T14345] ? apparmor_file_permission+0x25/0x30 [ 2666.568554][T14345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2666.568573][T14345] ? security_file_permission+0x8f/0x380 [ 2666.578589][T14345] generic_splice_sendpage+0x3c/0x50 [ 2666.578605][T14345] ? splice_from_pipe+0x170/0x170 [ 2666.578623][T14345] do_splice+0x708/0x1410 [ 2666.578652][T14345] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2666.578669][T14345] ? __fget_light+0x1a9/0x230 [ 2666.578685][T14345] __x64_sys_splice+0x2c6/0x330 [ 2666.578708][T14345] do_syscall_64+0xfa/0x760 [ 2666.588195][T14345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2666.588207][T14345] RIP: 0033:0x459f49 [ 2666.588224][T14345] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2666.588232][T14345] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2666.598069][T14345] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2666.598078][T14345] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 23:32:19 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r3, &(0x7f0000002780), 0x400004d, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f00000000c0)={'ip6gretap0\x00', {0x2, 0x1, @initdev={0xac, 0x1e, 0x1, 0x0}}}) r4 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 2666.598087][T14345] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2666.598095][T14345] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2666.598104][T14345] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:32:24 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r4, 0x0, 0x0, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:24 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x0, 0x4) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r4, &(0x7f0000002780), 0x400004d, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x224, &(0x7f0000000000)=[{&(0x7f0000000140)='$'}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:24 executing program 3: socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff}) close(r0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000080)=0xfd1, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1010005}, 0xc, &(0x7f0000000200)={&(0x7f0000000d40)=ANY=[@ANYBLOB="68000000840bbd88c38c25121d159981d3e36afe376f483bb4775742eb78a9b4aa0100dc448d4b17d190885156157e100e65c791a40d4789dbd2b81cf042a457af81c7eec447e323e45e3b09b20050b38c36bf6fb7fdf215410eb9078cc708e235bd1ed18695e9e5dc000007a66a000000e16cc239ca24be908646e8000000fdb35b4cae64cf9077543a05871f483b289f88ad8726eb968e472b71fe07273db12d5cf9b6f6e5846aac6435d5a1e87bc77f87e96cd10000", @ANYRES16=r3, @ANYBLOB="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"], 0x68}, 0x1, 0x0, 0x0, 0x20008000}, 0x8000) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') bind$inet(r1, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x13db, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r4 = socket$inet6(0xa, 0x802, 0x88) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c) getsockopt$inet_sctp6_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) syz_init_net_socket$llc(0x1a, 0x0, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f00000002c0)={{0x89, @rand_addr=0x9, 0x4e23, 0x2, 'lblc\x00', 0x16, 0x4, 0x47}, {@loopback, 0x4e24, 0x2001, 0x5ed08dba, 0x2, 0x3}}, 0x1a4) r6 = socket(0x10, 0x3, 0x0) ioctl$SIOCSIFMTU(r6, 0x8922, &(0x7f0000000000)={'team0\x00\x030\xff\xfdL%`\xc3\xff\xff', 0xb5}) accept4$llc(r6, 0x0, &(0x7f0000000540), 0x0) r7 = socket(0x10, 0x3, 0x0) ioctl$SIOCSIFMTU(r7, 0x8922, &(0x7f0000000000)={'team0\x00\x030\xff\xfdL%`\xc3\xff\xff', 0xb5}) getsockopt$EBT_SO_GET_INIT_INFO(r7, 0x0, 0x82, &(0x7f0000000340)={'broute\x00'}, &(0x7f00000003c0)=0x78) connect$llc(r5, &(0x7f0000000100)={0x1a, 0x0, 0x0, 0x0, 0x1, 0x0, @link_local}, 0x10) sendmmsg(r5, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) listen(r5, 0x2) recvmmsg(r5, &(0x7f00000001c0), 0x1cf, 0x0, 0x0) accept4$llc(r5, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000001c0)=0x10, 0x0) socket(0x2000000000000021, 0x2, 0x2) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") 23:32:24 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x4000) 23:32:24 executing program 2 (fault-call:10 fault-nth:32): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:24 executing program 0: r0 = socket(0x3, 0x2, 0x5) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000240)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@newchain={0x30, 0x64, 0x0, 0x70bd26, 0x25dfdbfd, {0x0, 0x0, 0x0, r1, {0x6}, {0x7, 0x8}, {0x6, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x40}]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r6, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r3, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r2, 0x0, r5, 0x0, 0x80000001, 0x0) [ 2671.812884][T14373] llc_conn_state_process: llc_conn_service failed [ 2671.881070][T14377] FAULT_INJECTION: forcing a failure. [ 2671.881070][T14377] name failslab, interval 1, probability 0, space 0, times 0 [ 2671.908388][T14377] CPU: 0 PID: 14377 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2671.916319][T14377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2671.926385][T14377] Call Trace: [ 2671.929687][T14377] dump_stack+0x172/0x1f0 [ 2671.934034][T14377] should_fail.cold+0xa/0x15 [ 2671.938640][T14377] ? fault_create_debugfs_attr+0x180/0x180 [ 2671.944455][T14377] ? ___might_sleep+0x163/0x2c0 [ 2671.949315][T14377] __should_failslab+0x121/0x190 [ 2671.954260][T14377] should_failslab+0x9/0x14 [ 2671.958766][T14377] __kmalloc+0x2e0/0x770 [ 2671.963012][T14377] ? __local_bh_enable_ip+0x15a/0x270 [ 2671.968387][T14377] ? lock_sock_nested+0xe2/0x120 [ 2671.973329][T14377] ? __local_bh_enable_ip+0x15a/0x270 [ 2671.978702][T14377] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2671.983989][T14377] ? lock_sock_nested+0x9a/0x120 [ 2671.988929][T14377] ? sock_kmalloc+0xc6/0x120 [ 2671.993529][T14377] sock_kmalloc+0xc6/0x120 [ 2671.997952][T14377] hash_alloc_result.part.0+0x95/0x110 [ 2672.003412][T14377] hash_sendpage+0x7a7/0x9d0 [ 2672.008013][T14377] hash_sendpage_nokey+0x94/0xa0 [ 2672.012959][T14377] kernel_sendpage+0x92/0xf0 [ 2672.017553][T14377] ? hash_check_key.isra.0+0x230/0x230 [ 2672.023017][T14377] sock_sendpage+0x8b/0xc0 [ 2672.027443][T14377] pipe_to_sendpage+0x296/0x360 [ 2672.032299][T14377] ? kernel_sendpage+0xf0/0xf0 [ 2672.037073][T14377] ? direct_splice_actor+0x190/0x190 [ 2672.042371][T14377] ? __put_page+0xa7/0xe0 [ 2672.046715][T14377] ? anon_pipe_buf_release+0x1c6/0x270 [ 2672.052181][T14377] __splice_from_pipe+0x397/0x7d0 [ 2672.057209][T14377] ? direct_splice_actor+0x190/0x190 [ 2672.062507][T14377] ? direct_splice_actor+0x190/0x190 [ 2672.067794][T14377] splice_from_pipe+0x108/0x170 [ 2672.072656][T14377] ? splice_shrink_spd+0xd0/0xd0 [ 2672.077602][T14377] ? apparmor_file_permission+0x25/0x30 [ 2672.083155][T14377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2672.089403][T14377] ? security_file_permission+0x8f/0x380 [ 2672.095044][T14377] generic_splice_sendpage+0x3c/0x50 [ 2672.100335][T14377] ? splice_from_pipe+0x170/0x170 [ 2672.105363][T14377] do_splice+0x708/0x1410 [ 2672.109706][T14377] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2672.114823][T14377] ? __fget_light+0x1a9/0x230 [ 2672.119510][T14377] __x64_sys_splice+0x2c6/0x330 [ 2672.124375][T14377] do_syscall_64+0xfa/0x760 [ 2672.128894][T14377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2672.134787][T14377] RIP: 0033:0x459f49 [ 2672.138688][T14377] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2672.158297][T14377] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2672.166715][T14377] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2672.174689][T14377] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 23:32:24 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc020662a, &(0x7f00000000c0)={0x4000000, r5, 0x1800}) setsockopt$nfc_llcp_NFC_LLCP_RW(r5, 0x118, 0x0, &(0x7f00000000c0)=0x49, 0x4) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r6, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2672.182679][T14377] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2672.190654][T14377] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2672.198633][T14377] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:32:24 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000), 0x100001c0}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_DELDEST(r4, 0x0, 0x488, &(0x7f00000000c0)={{0x4, @broadcast, 0x4e22, 0x3, 'dh\x00', 0x16, 0x3ff, 0x3d}, {@multicast1, 0x4e22, 0x4, 0x71f, 0x6, 0x2}}, 0x44) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2672.471233][T14390] IPVS: set_ctl: invalid protocol: 4 255.255.255.255:20002 23:32:25 executing program 2 (fault-call:10 fault-nth:33): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2672.585241][T14373] llc_conn_state_process: llc_conn_service failed 23:32:25 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) socket$inet(0x2, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0xa) close(r2) r3 = socket$netlink(0x10, 0x3, 0x4) r4 = socket$packet(0x11, 0x20000000000003, 0x300) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000280)={'veth0_to_hsr\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000080)={r6, 0x3, 0x6, @random="e09bf7dbe39f"}, 0x10) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x2b1, 0x0) r7 = socket(0x0, 0x0, 0x0) sendmmsg$alg(r7, 0x0, 0x0, 0x0) 23:32:25 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x7f00) 23:32:25 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) ioctl$SIOCX25SDTEFACILITIES(r3, 0x89eb, &(0x7f00000000c0)={0x3ff, 0x26c, 0x400, 0x7, 0x5, 0x1a, 0x17, "85bcef8981074d2e021d1af968fd08f8bf443aec", "cb34b83bb4b64e66971d7945737e2512e7b97e1d"}) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)={[{0x2b, 'cpu'}]}, 0x5) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0xfffffea6) accept$nfc_llcp(r5, &(0x7f0000000240), &(0x7f0000000100)=0x60) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r6, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 2672.780302][T14412] device veth0_to_hsr entered promiscuous mode [ 2672.809562][T14402] FAULT_INJECTION: forcing a failure. [ 2672.809562][T14402] name failslab, interval 1, probability 0, space 0, times 0 [ 2672.827071][T14402] CPU: 1 PID: 14402 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2672.834975][T14402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2672.845022][T14402] Call Trace: [ 2672.848298][T14402] dump_stack+0x172/0x1f0 [ 2672.852627][T14402] should_fail.cold+0xa/0x15 [ 2672.857826][T14402] ? fault_create_debugfs_attr+0x180/0x180 [ 2672.863631][T14402] ? ___might_sleep+0x163/0x2c0 [ 2672.868480][T14402] __should_failslab+0x121/0x190 [ 2672.873427][T14402] should_failslab+0x9/0x14 [ 2672.877925][T14402] __kmalloc+0x2e0/0x770 [ 2672.882157][T14402] ? __local_bh_enable_ip+0x15a/0x270 [ 2672.887613][T14402] ? lock_sock_nested+0xe2/0x120 [ 2672.892581][T14402] ? __local_bh_enable_ip+0x15a/0x270 [ 2672.897941][T14402] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2672.903216][T14402] ? lock_sock_nested+0x9a/0x120 [ 2672.908132][T14402] ? sock_kmalloc+0xc6/0x120 [ 2672.912703][T14402] sock_kmalloc+0xc6/0x120 [ 2672.917138][T14402] hash_alloc_result.part.0+0x95/0x110 [ 2672.922577][T14402] hash_sendpage+0x7a7/0x9d0 [ 2672.927157][T14402] hash_sendpage_nokey+0x94/0xa0 [ 2672.932115][T14402] kernel_sendpage+0x92/0xf0 [ 2672.936695][T14402] ? hash_check_key.isra.0+0x230/0x230 [ 2672.942176][T14402] sock_sendpage+0x8b/0xc0 [ 2672.946613][T14402] pipe_to_sendpage+0x296/0x360 [ 2672.951455][T14402] ? kernel_sendpage+0xf0/0xf0 [ 2672.956213][T14402] ? direct_splice_actor+0x190/0x190 [ 2672.961488][T14402] ? __put_page+0xa7/0xe0 [ 2672.965833][T14402] ? anon_pipe_buf_release+0x1c6/0x270 [ 2672.971287][T14402] __splice_from_pipe+0x397/0x7d0 [ 2672.976297][T14402] ? direct_splice_actor+0x190/0x190 [ 2672.981578][T14402] ? direct_splice_actor+0x190/0x190 [ 2672.986869][T14402] splice_from_pipe+0x108/0x170 [ 2672.991729][T14402] ? splice_shrink_spd+0xd0/0xd0 [ 2672.996666][T14402] ? apparmor_file_permission+0x25/0x30 [ 2673.002299][T14402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2673.008547][T14402] ? security_file_permission+0x8f/0x380 [ 2673.014216][T14402] generic_splice_sendpage+0x3c/0x50 [ 2673.019488][T14402] ? splice_from_pipe+0x170/0x170 [ 2673.024494][T14402] do_splice+0x708/0x1410 [ 2673.028822][T14402] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2673.033924][T14402] ? __fget_light+0x1a9/0x230 [ 2673.038582][T14402] __x64_sys_splice+0x2c6/0x330 [ 2673.043418][T14402] do_syscall_64+0xfa/0x760 [ 2673.047905][T14402] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2673.053786][T14402] RIP: 0033:0x459f49 [ 2673.057681][T14402] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2673.079203][T14402] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2673.087604][T14402] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2673.095567][T14402] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2673.103531][T14402] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2673.111487][T14402] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2673.119438][T14402] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2673.135047][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2673.140842][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2673.146737][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2673.152513][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2673.494981][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2673.500836][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2673.506735][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2673.513038][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2673.518907][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2673.524655][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2673.531010][T14403] device veth0_to_hsr left promiscuous mode 23:32:30 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r4, 0x0, 0x0, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:30 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:30 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r2, &(0x7f0000000000), 0xfffffea6) r3 = accept$packet(r2, 0x0, &(0x7f00000000c0)) pwrite64(r3, &(0x7f0000000240)="cdf1c923075a1ca3bfb1f932ce487c48b0ed835d252f3762bf449e4a1a904e785ccc99c5f88f827ea1bb20fad8003e375c747ff5064141bd571725a60c2d09106b123c45e1e61b648bae68858a807799081b616692da1144ba7f010441936e3b32e06c9f146383aa1309ff72c7f547b5955af18d7a786d134990006bf0f767d2822dfb562886818d23d08d69459714bedd33d7b6a9f1f8164dcbaddff1305ab982a664374a7bf5dcb2017caa37b3adafe865b0294d9b4564ed7097c57bca06202237d7f840c47db2a8573da8dade19b2741deca9d57e09317589468102d18342f2b62ac58c346941f68b5c25dd0d322e15179abf3f", 0xf5, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r6, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 23:32:30 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x1000000) 23:32:30 executing program 2 (fault-call:10 fault-nth:34): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:30 executing program 3: setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) unshare(0x40000000) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x3, [0x2, 0xfff, 0x8001]}, &(0x7f0000000200)=0xa) socket(0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) socket(0x200040000000015, 0x805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2) socket$inet_udp(0x2, 0x2, 0x0) pipe(0x0) pipe(0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stau\x00<#\xfbW*\x1f\x02\x94\xe6\xf3\x1dS\xd1\xe5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x93n,e+:G\x1bJ\x7f\xa2\xf6\xe04\x8c\x04\xe5\xf0\xdfK\x1d\xee\xc8;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\x00\x00a.\xfd\x1d\xf5\x86\xa7\xec]\xe8\x04\x00\x00\x00\x9c f\x11\x9ay0U\x10\xae\x0es\x96\xd0\xbf\xa0f\xfb4\xbbB\xc6b\xaa\xbc\x82\x99\xff\xf9\xe1\x82.\xd2\xac\xb1\xa5\xa0\xdf.\xaaO\x03\xa1\xa0j\xaf4\xc4Y\x94\xe3\x90\xfe\x04(dl\x90\x8fCqwc2\xc4\x951\x1e\x8e\xb6|s\xfb\x06+w^\x98N>sr\xcal\x18\x9c\xed\x1dC\x8a4\b\xcc\v\x1e@\xe4x5', 0x2761, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000040)={0x0, 0x7ffffffc}) r3 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r3, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=@ethtool_test={0x1a, 0x0, 0x0, 0x182}}) [ 2678.202010][T14435] IPVS: ftp: loaded support on port[0] = 21 [ 2678.388597][T14443] FAULT_INJECTION: forcing a failure. [ 2678.388597][T14443] name failslab, interval 1, probability 0, space 0, times 0 [ 2678.439210][T14443] CPU: 0 PID: 14443 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2678.447142][T14443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2678.457225][T14443] Call Trace: [ 2678.460533][T14443] dump_stack+0x172/0x1f0 [ 2678.464891][T14443] should_fail.cold+0xa/0x15 [ 2678.469507][T14443] ? fault_create_debugfs_attr+0x180/0x180 [ 2678.475335][T14443] ? ___might_sleep+0x163/0x2c0 [ 2678.480200][T14443] __should_failslab+0x121/0x190 [ 2678.485145][T14443] should_failslab+0x9/0x14 [ 2678.489650][T14443] __kmalloc+0x2e0/0x770 [ 2678.493899][T14443] ? __local_bh_enable_ip+0x15a/0x270 [ 2678.499273][T14443] ? lock_sock_nested+0xe2/0x120 [ 2678.504215][T14443] ? __local_bh_enable_ip+0x15a/0x270 [ 2678.509590][T14443] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2678.514876][T14443] ? lock_sock_nested+0x9a/0x120 [ 2678.519816][T14443] ? sock_kmalloc+0xc6/0x120 [ 2678.524424][T14443] sock_kmalloc+0xc6/0x120 [ 2678.528853][T14443] hash_alloc_result.part.0+0x95/0x110 [ 2678.534327][T14443] hash_sendpage+0x7a7/0x9d0 [ 2678.538933][T14443] hash_sendpage_nokey+0x94/0xa0 [ 2678.543882][T14443] kernel_sendpage+0x92/0xf0 [ 2678.548475][T14443] ? hash_check_key.isra.0+0x230/0x230 [ 2678.553948][T14443] sock_sendpage+0x8b/0xc0 [ 2678.558373][T14443] pipe_to_sendpage+0x296/0x360 [ 2678.563226][T14443] ? kernel_sendpage+0xf0/0xf0 [ 2678.563246][T14443] ? direct_splice_actor+0x190/0x190 [ 2678.563268][T14443] ? __put_page+0xa7/0xe0 [ 2678.573310][T14443] ? anon_pipe_buf_release+0x1c6/0x270 [ 2678.573333][T14443] __splice_from_pipe+0x397/0x7d0 [ 2678.573349][T14443] ? direct_splice_actor+0x190/0x190 [ 2678.573374][T14443] ? direct_splice_actor+0x190/0x190 [ 2678.573390][T14443] splice_from_pipe+0x108/0x170 [ 2678.573406][T14443] ? splice_shrink_spd+0xd0/0xd0 [ 2678.573427][T14443] ? apparmor_file_permission+0x25/0x30 [ 2678.583183][T14443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2678.583202][T14443] ? security_file_permission+0x8f/0x380 [ 2678.583223][T14443] generic_splice_sendpage+0x3c/0x50 [ 2678.583239][T14443] ? splice_from_pipe+0x170/0x170 [ 2678.583256][T14443] do_splice+0x708/0x1410 [ 2678.583284][T14443] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2678.593564][T14443] ? __fget_light+0x1a9/0x230 [ 2678.593584][T14443] __x64_sys_splice+0x2c6/0x330 [ 2678.593609][T14443] do_syscall_64+0xfa/0x760 [ 2678.593630][T14443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2678.593646][T14443] RIP: 0033:0x459f49 [ 2678.603749][T14443] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2678.603756][T14443] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2678.603770][T14443] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2678.603778][T14443] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2678.603787][T14443] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2678.603796][T14443] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2678.603805][T14443] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:32:31 executing program 5: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) socketpair(0xa, 0x5, 0x1, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_rose_SIOCRSCLRRT(r2, 0x89e4) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f00000000c0)) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000100), &(0x7f0000000240)=0x8) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 2678.821982][T14435] IPVS: ftp: loaded support on port[0] = 21 23:32:31 executing program 3: setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) unshare(0x40000000) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000000c0)={0x3, [0x2, 0xfff, 0x8001]}, &(0x7f0000000200)=0xa) socket(0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) socket(0x200040000000015, 0x805, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2) socket$inet_udp(0x2, 0x2, 0x0) pipe(0x0) pipe(0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stau\x00<#\xfbW*\x1f\x02\x94\xe6\xf3\x1dS\xd1\xe5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x93n,e+:G\x1bJ\x7f\xa2\xf6\xe04\x8c\x04\xe5\xf0\xdfK\x1d\xee\xc8;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\x00\x00a.\xfd\x1d\xf5\x86\xa7\xec]\xe8\x04\x00\x00\x00\x9c f\x11\x9ay0U\x10\xae\x0es\x96\xd0\xbf\xa0f\xfb4\xbbB\xc6b\xaa\xbc\x82\x99\xff\xf9\xe1\x82.\xd2\xac\xb1\xa5\xa0\xdf.\xaaO\x03\xa1\xa0j\xaf4\xc4Y\x94\xe3\x90\xfe\x04(dl\x90\x8fCqwc2\xc4\x951\x1e\x8e\xb6|s\xfb\x06+w^\x98N>sr\xcal\x18\x9c\xed\x1dC\x8a4\b\xcc\v\x1e@\xe4x5', 0x2761, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000040)={0x0, 0x7ffffffc}) r3 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r3, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=@ethtool_test={0x1a, 0x0, 0x0, 0x182}}) 23:32:31 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xf000000) 23:32:31 executing program 2 (fault-call:10 fault-nth:35): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2678.998770][T14467] IPVS: ftp: loaded support on port[0] = 21 23:32:31 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r1, &(0x7f00000003c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r1, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000705000000000000008000000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300000000fbff020000000000"], 0x38}}, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r4, &(0x7f00000003c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r4, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000705000000000000008000000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff00000000090001006866736300000000fbff020000000000"], 0x38}}, 0x0) sendmmsg$inet6(r0, &(0x7f0000005140)=[{{&(0x7f00000000c0)={0xa, 0x4e24, 0x1, @empty, 0x5}, 0x1c, &(0x7f0000000100)=[{&(0x7f0000000240)="c84a773ca4dd0e2ce41b7bbe25bf68da23a1342593faa0f4b8066fb8a1c1c67afb68207996671997386f9f1ff07bb126ac02779c8c3b6b79f9f4ee62d9c0cb7c73135e0409e4433c5b71e01963bf9cb83ec416c7fe78d540e05a359cce202aa6", 0x60}, {&(0x7f00000002c0)="36ee4a812e09bad48319bf9c6e992a463e7caab91a40a7ffea7edcc07a8f9e491babc1f09ed820facfb8b2dc9868e26f72fd08444ea695f45ce165552b26170bcdfa243bf9453bf119ce10b4a88022a3d5df8714ea21efef9fd67bc766591ad4fe263d5c6c22b981c30834929c3986f0462fd7d61713dd7eb5d6f5ae9194243e42bfa0c8ed552a7ea2e82b5b9fe691e615251bc0a1d6fbec01e86eacb8d6dc55d2734065d0cabea9aa21cd55d54d312add722b445c1fd9c1270fd71c2ba560cf8c1168fa99b7f52f662451dad4470078372577baa9d2436a7686878922771f14", 0xe0}], 0x2, &(0x7f0000000480)=[@dstopts_2292={{0x20, 0x29, 0x4, {0x2c, 0x0, [], [@enc_lim={0x4, 0x1, 0x9f}]}}}, @hopopts_2292={{0x1058, 0x29, 0x36, {0x33, 0x207, [], [@generic={0x1, 0x1000, "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"}, @enc_lim={0x4, 0x1, 0x1}, @calipso={0x7, 0x28, {0x3f, 0x8, 0x2, 0xfff7, [0xa2e, 0x9, 0x4, 0x1000]}}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x42}, @enc_lim={0x4, 0x1, 0x4}]}}}, @rthdr={{0x58, 0x29, 0x39, {0x3c, 0x8, 0x3, 0x1, 0x0, [@local, @dev={0xfe, 0x80, [], 0x19}, @remote, @rand_addr="4f2d6a3719f92e8a12974f1ca99e5fe4"]}}}], 0x10d0}}, {{&(0x7f00000003c0)={0xa, 0x4e21, 0xff, @rand_addr="e2acac9c4c0c843d2fef3cc09b5c531e", 0x80000000}, 0x1c, &(0x7f0000001a00)=[{&(0x7f0000001580)="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", 0xfc}, {&(0x7f0000001680)="875c99b0a1d9a6901ada1d8afafb71ee68177d8f442aca1e4fda750cd5be95300f796ccdcfb3915ff1082511d6200f678fe87bb0eae2cd31413a94fa023bd0809235e80879dd1b7405dd4113b0eae198a4176f3bfae740711a1294897af2934ca0e9839395870c65af51ebe7e5b1ebba8755e58b3533cd2520f1f823be", 0x7d}, {&(0x7f0000000400)="09c7cbce30d252c58fd46b005e12f6f581f0b7aa46c864dc28d988b0c5ab354b2b69f80beb98b864019421d5e4bbeccea09633e11acf0e6b4a6e52", 0x3b}, {&(0x7f0000001700)="3c3e27f82dd7f71fb426d166c9c94dcb6b6a9468ecbaa2375877808d2a96f2c27bb9e4f21d6ca0030f0a80c54c1912bee9fb2019bc9d15533c01fbefe703bfcab23fa627725f2db85c529467075338a27bee336d499801b2077ddbc894684c863ac11bd24e968973b5ddb59ef71eab35a35172cf3dc3bf025a08fec130fe6b8a815776194b3e16cc8e79cd8d461937312a0d412d913c2657ae95c1ea2b0f27491add2ce56f6f3f962706", 0xaa}, {&(0x7f00000017c0)="b422200f1564a6d971cbc1bcd7b11c77114010ed3bd03d45cf85d0a34a516cb1117adffcefe977641ad25d85f9abcfea6e2f4c09159d60345a4639be74d747242d23fc5fd1f161eae33841bdb81898a7b14e850f17a331dccad65fd5b00618722504d79a205473f0f4dbfb459606a27cad47ecf55069ce63a4898241f4f0423163c6c1080cbcf0df764b14b64fe416d8dae2f42c", 0x94}, {&(0x7f0000001880)="2501d2e06f90430eed896d071903b758315bfe2aba89cad995e6f7eac56af0d81e5923be2d26d905ee5465082064", 0x2e}, {&(0x7f00000018c0)="f2ee3a752c4db84627a88953fc7d30ecc9b6bfe09d06f22f57f836de49d51a73c2a1bbb8f5f43ce17248adafb16adadd3316cce8c870de75260b983883f4a9", 0x3f}, {&(0x7f0000001900)="0ab576e10e446a73b7501e8fd073a9245c21aee0d72d4d3150787c244bee2fb15302e484e666b34d4b608e24d280def7eed18bd7ece29a5810e4ad2c0c9c2e4187aad9876cd09e1fb64800bb74f47f6a45a66c0a04808c63393f976d89bd12fea484f6a1fe3c31aa1c12a3e8204120c62dc0d56a71a2dac03ee177412178a96ded5e69cd79f2f70efb0d3375b5fccb0f0378b7e405ecbd96cf", 0x99}, {&(0x7f00000019c0)="20103fd0e04bbafe95d35433a94541fbe52f287ab3508bf0", 0x18}], 0x9}}, {{0x0, 0x0, &(0x7f00000020c0)=[{&(0x7f0000001ac0)="d3dc93c0907c36adb4039ce016e0c105566029e0f5fe45f6f19ad159e69184731639ce011cf3c0db8dedf5ef21aa7684714879a07afe0e4c5cfc901a14c49be21fb372dfe51e4ac3910447c2ac455a54564340fe264ee76a15", 0x59}, {&(0x7f0000001b40)="9f1609c3eecc9332ac7f651f7011d599d8b2a8ef966f8904fc3fcdcf72caff9ee47758a2bcb60ea635a683937603fc09e472ee10939b7cdcc5698d43111b20f3bf2eccaca795e6c041261d58888115c09d51750fd4b35843e2a1eed6635210b611a70cfb1b4c3a147e4c276ca455dfd226c9537ed7757bbfe22b6236b1f1a616f36ecdfe946098350dccbc91508bb73a42a6e766fef4ebe69fa69152d270bbd82cceca99b5ecd90a23c049572d6c41ebcfa8b3be2736811c43d27026efe56662a21eed7ef536d774f4ac4e290dca74b34d121372a23b3aa1e18c8303e97a7762f63bae2ddda2a378cb3488d826f1e287", 0xf0}, {&(0x7f0000001c40)="8cbb3d0c959e124424c97f58accaccaa9d1195352f389c7b35225c00d57af31286f3da964af28c1c6b11a068cdd0", 0x2e}, {&(0x7f0000001c80)="0909312bbfb434c10c533d484b9329c27c9ae925731d6ff371eb2907a21df6e2ba074f15e67ae06f52568693ab0f4d5b7c1b3f0b1c62d5fe2fb6cf471015ce995bc2e20997e58673bcca065d01713630ce9b2a31024fd8ff5886f037e20b777f8b73a4bd468d04e9a28290c6cd3c6e887389e0027bb339c695d0181b74", 0x7d}, {&(0x7f0000001d00)="efbc07e98b249d33510fa265f43e72b2baf60c9f38e495b4c8d0460229b01ff5e0a0dfee0aa23b3da0e2dc755eaf526333f102e6776d64322ef9880a8210df2b93b37b0b822d468199bccfab0c3c7ca9120cca1d2b", 0x55}, {&(0x7f0000001d80)="6cc9d495ea593401694efe9d12d4c0f82766606e8d8cd100fd3a752b2d7d926dcff4b5e667ff6728c0c1dbb23db267aa59068f8a78463b6ec583aaac2ace0091be9c6d520ce7764975ef7acf43bee100f7b9add64dfc714c25fb067663cee4f6487f4626aab4d23b28104eeb8a8282450f0550a7fab80565", 0x78}, {&(0x7f0000001e00)="de4864b4f83dbb68ebd55913f3e7dd4260d785e24e035590d5aad01c0a1b07506927d4d11505c3754ff499e9161e59492229980bc248aa90b56ce991120847ffea8a79fa008662c6b30c003a8dfef40b8aec60503909a8a26dcc7d2ef76a5b5fc21a6cd8ec2f47f8d0e32baee7c3cc270fb333feb4bde634cab16977dd207e991ab2138019f25494fb79d6d63296ec17eede7574eee4aeb5a33d9e185b38eb6b426f82fbb0de8ec8038d7a0bc737d5ae6ad77ba69f3844a803f97b710964fb62bd3ec0b65125d0", 0xc7}, {&(0x7f0000001f00)="2674181068fc76e1b2a72683a124722c3b743187828519e288e2aa7f4f6678a3f79a82e25a2a3e12de0307524954c019bc3ac615be5b4078a7ed93e578d3205ef6360e6e3a1087927d26c14c7b04b47fff1c908dd002b67e4678543a2d5d32f2a1b3d6126b1c36e30743236c8c56205f42f566315d646684fe963b7818f1a1cb3a83ecd5ea5197cf11ecb6ca8cc0c8244231092929250ddac45fa9c0fae0857843fdba6b0e19a64f1f567a6ec00dc60c52b42171a3cea2c3ecfa9484d601a94ceebe679a27", 0xc5}, {&(0x7f0000002000)="4f47d12894ba893aeb889029a28b4fd373293dbe2bb0de545c93f8fc17d976e4abc09c92bb0427b2dfde3fb93abb26d73cadd599c04f2b14d8a604bcdf07e4", 0x3f}, {&(0x7f0000002040)="500df47b75c242d08724db862793a22a14f057360ecb603dde80852097eda2810910e0bef30575f897bc588657bca44bd3fb082fbcbf81e5fb87f17199f3df51479a", 0x42}], 0xa, &(0x7f0000002180)=[@rthdr_2292={{0x28, 0x29, 0x39, {0x5e, 0x2, 0x64926c933b358a11, 0x0, 0x0, [@remote]}}}], 0x28}}, {{&(0x7f00000021c0)={0xa, 0x4e21, 0x9, @ipv4={[], [], @empty}, 0x5}, 0x1c, &(0x7f0000002300)=[{&(0x7f0000002200)="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", 0xfd}], 0x1, &(0x7f0000002340)=[@tclass={{0x14, 0x29, 0x43, 0x9}}, @dstopts={{0x40, 0x29, 0x37, {0x3b, 0x4, [], [@jumbo={0xc2, 0x4, 0xffff}, @ra={0x5, 0x2, 0xf577}, @pad1, @hao={0xc9, 0x10, @mcast1}, @pad1]}}}, @hopopts={{0x38, 0x29, 0x36, {0x3b, 0x3, [], [@hao={0xc9, 0x10, @loopback}, @padn={0x1, 0x2, [0x0, 0x0]}, @ra={0x5, 0x2, 0x7c}, @enc_lim={0x4, 0x1, 0x3f}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@remote, r3}}}, @pktinfo={{0x24, 0x29, 0x32, {@empty}}}, @pktinfo={{0x24, 0x29, 0x32, {@remote, r6}}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x62, 0x0, [], [@pad1]}}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x3c, 0x4, 0xeb00f79049a4bf51, 0x58, 0x0, [@rand_addr="466ffca4f0eddeb6353bbb8fdad03c14", @local]}}}], 0x160}}, {{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f00000024c0)="36991be2e0d938", 0x7}, {&(0x7f0000002500)="a70253601a7a8f91b604a1700b428e8d447492dbe91b0b90bfe73256cf20727b2c6312d42a8ccfe343640fd14a195cca0e699363c9de14c7ee04be762465ed99cea7bfcdb42c6c6c23931b7b18b0931c7e013cec6127b188165b1f3972aae48cc5fae9a58100d1de1a2fde10d18d3ad74b8828ded487f0794f7a4b33bf61f72ff685ff1fcd594ebe557ea34b06e1084b18f9425b6bff7e405941", 0x9a}], 0x2, &(0x7f0000002600)=[@dstopts_2292={{0x88, 0x29, 0x4, {0x15, 0xd, [], [@ra, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x1f}, @generic={0x9, 0x14, "c53648ed328dbe8146ae578860e2006dab4fa80a"}, @ra={0x5, 0x2, 0x1}, @enc_lim={0x4, 0x1, 0xf}, @calipso={0x7, 0x30, {0x5, 0xa, 0x0, 0x6, [0x3, 0x0, 0x8, 0x2, 0x8]}}, @hao={0xc9, 0x10, @rand_addr="b017c18559a9aa86ed41a1ad59e4c4e8"}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}, @flowinfo={{0x14}}], 0xc8}}, {{&(0x7f0000002700)={0xa, 0x4e20, 0x3, @local, 0x3}, 0x1c, &(0x7f0000003900)=[{&(0x7f0000002740)="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", 0xfb}, {&(0x7f0000002840)='lF', 0x2}, {&(0x7f0000002880)="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", 0x1000}, {&(0x7f0000003880)="ec2de407ab956b2b887aa4e52c844c1fba1125666da9ff15452ff5e176de7e2b0400e92a0bc48becb11024cc9a0fa8d21167581abcebc2877b651bd742a4031754b170f7a7c95abb59148b156e3bd568c0b79be96c3f87e60d7dc4671107519be2b4e74b", 0x64}], 0x4, &(0x7f0000003940)=[@tclass={{0x14}}], 0x18}}, {{&(0x7f0000003980)={0xa, 0x4e23, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x10001}, 0x1c, &(0x7f0000004c40)=[{&(0x7f00000039c0)="274b638e51fb95320e20cfe829846bf7e8aa46b5a049c584e062fef46bc03c0021a26bc2b6499e6b1bd7cff14b3f3043178d8ca9b4f3119cd0b06c82a5098e5f6ac7cc0d78b71a41f1fc90ab98ffaad2cff4f7ca44c842271ed9e6f4219d950430650593b3671a212d772e5caf87ae4a2714546bc9bd51d61bde90f0227f4e21478d10a2ca865db435458b668e7f35ddfe2403adc921d292a86531489e6109ca726e63f9f913f8cd176a2e29b95f933b4b2a93bdd7e98298aece42e5e150c8733a1fad2f7f91b041891a1d773bbdae9e3bac5946bc3c2696e0e7fb8b", 0xdc}, {&(0x7f0000003ac0)="fbc2a5a423ecf0022a73640f0d1d85e0b0cc676779af7e842a22b66b5f98b5557423dcca264d43faa6e9b0c30e597bb50b33556368327059b2ed2b7498f77e6e1ff8127de7238bf44f593afb7e5c8ef79d031186b227e6ed371a9cf3e4a750fe6577d3515c710d3d0924db50985ee82aec6cad7e375cc50f4792cfd6f3744e1dbe495e38f00458c3c6c224b6df77b846ef8deef533849ba08b24e3fa23f465ba614bfbe2a5fd4ada337c4709b584b6b90b281cd1a9c5ade2", 0xb8}, {&(0x7f0000003b80)="2552c5476cb1b16876d604bd0f9d21252bedb2ab4a63e6105a63d741192ab651cdee40d85bc115b00d9356630bba407ee680c7555242d7274d91362b271c6c1194c25d6742fbbef5be7fad2ae525ab2516f16d9b293727c7a58e4df8b58d17247533dab8958983ddcfc0936b6946b29d1b8637da59598b788e3b1df40d546243c44e23c7b68b73f30cfe519fb0e199fba839ff0985c0bbdbc6653379837a9eaaa76919b89f476b0442c3c6473c80efd4", 0xb0}, {&(0x7f0000003c40)="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", 0x1000}], 0x4, &(0x7f0000004c80)=[@dontfrag={{0x14, 0x29, 0x3e, 0x98c}}, @flowinfo={{0x14, 0x29, 0xb, 0x20}}, @dstopts={{0x108, 0x29, 0x37, {0x8, 0x1d, [], [@padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x3}, @hao={0xc9, 0x10, @rand_addr="405d07f2b97370c48346f5d6414a30b8"}, @jumbo={0xc2, 0x4, 0x400}, @generic={0xa5, 0xc6, "edc55e8a3fa66a7634bcd193f6b03dd37085eb1a1f92cbe29c8b57e913c58307efeaedc31a010216b5d09217fe63cb7dab8d52cd14cb67107495179733eca984c43e09738aa0ece782aa50b2f07e3a3293d541056df2d98aaab4a590c9f86bd7b67bdcf5e3b2f808467e859ad46d6747ff1b6e9b99cc0e39f5ae6e420f1c9fee98953bba5bd85ab371081a1ee3ce651886517f30d2741466168c52411e57d434d16fdec537d7b9d84c81101fe6bf6ade2234d5921d2b1ce46a77e2f171edc420057b3c9e4fb5"}]}}}, @rthdr={{0x68, 0x29, 0x39, {0x3b, 0xa, 0x0, 0x20, 0x0, [@dev={0xfe, 0x80, [], 0x12}, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @empty}, @mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7}}, @rthdrdstopts={{0x248, 0x29, 0x37, {0xd5, 0x45, [], [@ra={0x5, 0x2, 0x5}, @ra={0x5, 0x2, 0x5}, @generic={0x4, 0x82, "457b8da01256401d862d8f1ff47d002675afbe6b2a542e591f7da76f35f9e43c875a155f333f35063e8068558d692482bbeee112aaf58e710359b1040abf9f89de09dce0cd5eea92fbdf8568169d52f737d175d1b5b1177dc22173a5391e3fdfb8261dad8acbd112e75816b643439a893869a0a397043ea911d609cc7510856e30e2"}, @generic={0x1, 0x5c, "7f7893ce91d4a3060ceaf834e0fddd94e6b19c1154feee7b81775602124be82bfb80bae5611ee88c8ca4b350aca9fa94bd6bd49db050382e6c9efb3586a4792a9ce0d6fc6e182ba96ea17c3c4e3c522e912a9d295c01b458fc52896a"}, @calipso={0x7, 0x20, {0x6, 0x6, 0xe5, 0x25e, [0x6, 0x8, 0x2]}}, @ra={0x5, 0x2, 0xf364}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x1, 0xed, "d05d6eec27e63773973a33046000957989d7219ba54b27c9143fed3c3dad92eaefc246551becf46428266516ce7b888422402d2189f5d9bf1ba9ec786b2448fd577ee7745304616df839e82ba148c916e08d9e1e338beb53aa20379143a16305ff90dcdbf44cb624292550224ee8b72f274b089ca1b615f361096dabbc63944a8ec7562e0fab86b856ff143077b97ad14bfb2db1b87ff098bb8abb6d0570545b05cae9184f201c7ac0e74016bb6bcb8dc8fad6f1261ce122ac43d2b48787c7c3d1ffd1b246da3450026346edfe4c6e2312996f4dd1ffee1fe075e1bd014d4f0a988f04cf828293df4319c068f9"}, @calipso={0x7, 0x20, {0xffffffff, 0x6, 0x3, 0x0, [0x78, 0x2, 0x3]}}]}}}, @tclass={{0x14, 0x29, 0x43, 0x4fb8}}, @hopopts_2292={{0x28, 0x29, 0x36, {0x87, 0x1, [], [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @dstopts={{0x68, 0x29, 0x37, {0x2d, 0x9, [], [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x28, {0x5, 0x8, 0x6, 0x400, [0x0, 0x4, 0x101, 0xfffffffffffffc00]}}, @hao={0xc9, 0x10, @mcast1}]}}}], 0x4a8}}], 0x7, 0x18089) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r9, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r11 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r11, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r8, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r7, 0x0, r10, 0x0, 0x80000001, 0x0) [ 2679.261536][T14480] FAULT_INJECTION: forcing a failure. [ 2679.261536][T14480] name failslab, interval 1, probability 0, space 0, times 0 [ 2679.329044][T14480] CPU: 0 PID: 14480 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2679.336988][T14480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2679.347052][T14480] Call Trace: [ 2679.350359][T14480] dump_stack+0x172/0x1f0 [ 2679.354707][T14480] should_fail.cold+0xa/0x15 [ 2679.359316][T14480] ? fault_create_debugfs_attr+0x180/0x180 [ 2679.365159][T14480] ? ___might_sleep+0x163/0x2c0 [ 2679.370024][T14480] __should_failslab+0x121/0x190 [ 2679.374970][T14480] should_failslab+0x9/0x14 [ 2679.379472][T14480] __kmalloc+0x2e0/0x770 [ 2679.383719][T14480] ? __local_bh_enable_ip+0x15a/0x270 [ 2679.389091][T14480] ? lock_sock_nested+0xe2/0x120 [ 2679.394030][T14480] ? __local_bh_enable_ip+0x15a/0x270 [ 2679.399411][T14480] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2679.404705][T14480] ? lock_sock_nested+0x9a/0x120 [ 2679.409649][T14480] ? sock_kmalloc+0xc6/0x120 [ 2679.414247][T14480] sock_kmalloc+0xc6/0x120 [ 2679.418676][T14480] hash_alloc_result.part.0+0x95/0x110 [ 2679.424150][T14480] hash_sendpage+0x7a7/0x9d0 [ 2679.428767][T14480] hash_sendpage_nokey+0x94/0xa0 [ 2679.433722][T14480] kernel_sendpage+0x92/0xf0 [ 2679.438323][T14480] ? hash_check_key.isra.0+0x230/0x230 [ 2679.443800][T14480] sock_sendpage+0x8b/0xc0 [ 2679.448222][T14480] pipe_to_sendpage+0x296/0x360 [ 2679.453128][T14480] ? kernel_sendpage+0xf0/0xf0 [ 2679.457884][T14480] ? direct_splice_actor+0x190/0x190 [ 2679.463212][T14480] ? __put_page+0xa7/0xe0 [ 2679.467549][T14480] ? anon_pipe_buf_release+0x1c6/0x270 [ 2679.472989][T14480] __splice_from_pipe+0x397/0x7d0 [ 2679.478013][T14480] ? direct_splice_actor+0x190/0x190 [ 2679.483301][T14480] ? direct_splice_actor+0x190/0x190 [ 2679.488582][T14480] splice_from_pipe+0x108/0x170 [ 2679.493430][T14480] ? splice_shrink_spd+0xd0/0xd0 [ 2679.498382][T14480] ? apparmor_file_permission+0x25/0x30 [ 2679.503939][T14480] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2679.510205][T14480] ? security_file_permission+0x8f/0x380 [ 2679.515860][T14480] generic_splice_sendpage+0x3c/0x50 [ 2679.521169][T14480] ? splice_from_pipe+0x170/0x170 [ 2679.526207][T14480] do_splice+0x708/0x1410 [ 2679.526234][T14480] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2679.535661][T14480] ? __fget_light+0x1a9/0x230 [ 2679.540370][T14480] __x64_sys_splice+0x2c6/0x330 [ 2679.540396][T14480] do_syscall_64+0xfa/0x760 [ 2679.540418][T14480] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2679.540430][T14480] RIP: 0033:0x459f49 [ 2679.540452][T14480] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:32:32 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r3, &(0x7f0000002780), 0x400004d, 0x0) recvmmsg(r3, &(0x7f0000002480)=[{{&(0x7f0000002680)=@sco, 0x80, &(0x7f0000000340)=[{&(0x7f0000000240)=""/214, 0xd6}], 0x1, &(0x7f0000000380)=""/58, 0x3a}, 0x6}, {{&(0x7f00000003c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000480)=""/210, 0xd2}], 0x1, &(0x7f00000005c0)=""/217, 0xd9}, 0x9}, {{&(0x7f00000006c0)=@nfc, 0x80, &(0x7f0000001840)=[{&(0x7f0000000740)=""/232, 0xe8}, {&(0x7f0000000840)=""/4096, 0x1000}], 0x2, &(0x7f0000001880)=""/231, 0xe7}, 0x6}, {{&(0x7f0000001980)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000001a00)=""/67, 0x43}, {&(0x7f0000001a80)=""/18, 0x12}], 0x2}, 0x4}, {{&(0x7f0000001b00)=@pppol2tpin6, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001b80)=""/242, 0xf2}, {&(0x7f0000001c80)=""/59, 0x3b}, {&(0x7f0000001cc0)=""/180, 0xb4}, {&(0x7f0000001d80)=""/164, 0xa4}, {&(0x7f0000001e40)=""/54, 0x36}, {&(0x7f0000001e80)=""/69, 0x45}, {&(0x7f0000001f00)=""/93, 0x5d}], 0x7, &(0x7f0000002700)=""/87, 0x57}, 0x6}, {{0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000002080)=""/112, 0x70}], 0x1, &(0x7f0000002140)=""/117, 0x75}, 0x91d}, {{&(0x7f00000021c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002240)=""/250, 0xfa}, {&(0x7f0000002340)=""/110, 0x6e}], 0x2, &(0x7f0000002400)=""/68, 0x44}, 0xff}], 0x7, 0x10000, &(0x7f0000002640)={0x77359400}) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) openat$cgroup_ro(r6, &(0x7f0000002000)='cgroup.events\x00', 0x0, 0x0) setsockopt$inet_mreqn(r5, 0x0, 0x20, &(0x7f00000000c0)={@rand_addr=0x4, @empty, r4}, 0xc) r7 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r8, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r7, 0x0, 0x80000001, 0x0) [ 2679.559769][T14480] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2679.559785][T14480] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2679.559794][T14480] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2679.559803][T14480] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2679.559812][T14480] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2679.559820][T14480] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:32:37 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r4, 0x0, 0x0, 0x41, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc020662a, &(0x7f00000000c0)={0x4000000, r1, 0x1800}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r2, &(0x7f0000000a00)={&(0x7f00000001c0)={0x1d, r3}, 0x10, &(0x7f0000000200)={&(0x7f0000000ec0)={0x3, 0xda5, 0x8, {0x77359400}, {}, {0x1, 0x0, 0x1, 0x1}, 0x1, @canfd={{0x3, 0x1, 0x0, 0x1}, 0x8, 0x1, 0x0, 0x0, "17021bda50f9b17a42cd4112f34620a9e0c1df18266458f4e467a5988cd7b3bd9c8821b8497f4e9117e537ec32737fa8754a855c0b0b7bc37030bed35770369a"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000}, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="48fb8b567c5ec991586a4c383b8959d6f55c22d362631183c3ebd0257961d8ea9602b8a405d4759b42e8c20f96875a38dd5c12be7db1bc1b79bb4a9621058c051aae0abfbf25de03893d9623fb0ca3a9a4944f552cea953c2fa68900c3c829395942c87abc37975749c21e673999fbcbac"], 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r5, &(0x7f0000002780), 0x400004d, 0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r7 = socket$inet(0x10, 0x2000000002, 0x7b) sendmsg(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r7, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000002800)={{{@in=@remote, @in6=@initdev}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f0000000f40)=0xba) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r8, &(0x7f0000000000), 0xfffffea6) openat$cgroup_ro(r8, &(0x7f0000000f80)='memory.stat\x00', 0x0, 0x0) sendmmsg(r6, &(0x7f0000003740)=[{{&(0x7f0000000240)=@rc={0x1f, {0xfc, 0x2, 0x40, 0x20, 0x2, 0xfe}, 0x9}, 0x0, &(0x7f0000000600)=[{&(0x7f0000000400)="7a4e8e597a6d8d2b1c8640bd0c415f7faf7d087ad32c510a680d11bb9c1d8277adf0bc94636a9c766c267f0619a2d8f53723c770f166c352492ad3fd95ddf13591bc60a68f0747825a51a302d35303ba3fa166e55cb5e207f68a48f9"}, {&(0x7f0000000480)="4be563ce201d5e6678b49a9e7b58470f0d49d94418bbcffefbdbbcc020e0f563d3597a1ae20668514227cd3092ce20c8be0316abca62657eff0aa8e0364690458c0f840e508beb22475c52d2a796f2ab4d9469fc27cd4c90abbfc3d20b90b333e69b9d9e0f83985c742f40698fbb989c2d107b8c9b6ed122b937ad7ec6c0880660524a54a414"}, {&(0x7f00000002c0)="31bb65972926ff286038ea9a4c"}, {&(0x7f0000000540)="875d6e8110f0bd890789852d4a80e0025eda7dafa92b397aa902c1066c667cdef619b187b39441ecd3411aabb1626256f746dc717564d8a8e61ef51eb1"}, {&(0x7f0000000580)="26c530967e77bf1c4102c501f8e9376f375e"}, {&(0x7f00000005c0)="34b4a8a2c7144be48b14f4e8b22d3387ab37ff57c3ac9743abcd"}], 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]}}, {{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000980)="fb4364ffd04a0edf1af23c0c525b53ed353b1b4dcde5f916542c58e35c61a76a23ca654ff2cd89634700542057aabfa70c0f02ad54177a9c4f03092be898e2c14ff02a762df4942ee49e0c2191ef6de9c3e3f6429adb444dc2"}, {&(0x7f0000000a00)}], 0x0, &(0x7f0000000a80)=[{0x0, 0x10c, 0x1, "1dc8dc415a38c8d1ec492107debe73ccacd9f6ea440ad2cf5536447e7497a9044eaf4a50058b18b5cdb502a33b113f5b0e9ba7e5991d5fad84a89df0ba3a893c432db045d7ca504fdad59b9a8ee6ebaa535004482945890d23f1ddb89010db9e8bb8abaa261caf84c1f400c3a7b4add380837ddb586295e092e7b7f820450233f52350d43e0483c3a9de47713d9586f1a933603ab85e1a68a607e929"}, {0x0, 0x361, 0x8001, 'D'}, {0x0, 0xa842a658e3abe729, 0x1000, "922ffa4c4b9d59c4b93cf361fa20fcfa41d05c4ae25ce109e16d3c577fdb3996f5a287b27cbbfd654312304bb5b6f33b7a4fcf578a27316c62a21ab8f3b333d5dc3aad9cc4e233ad688ca45dc56134da6621a6cff768508162e3a58d08e7badac80775abbbe5d294bceb158184d035fba91baf28f1a9a6bbe9116749ad0231eac8031ad2fc817d06f4331ee672bd6a44cc14ad5f590a0a6f7e593690340e8249910a18003dad61c51fbb5501236472bdc7d2f9cb365e38e53cf14bbd12e457add3666badc9102fed0873"}]}}, {{&(0x7f0000000c40)=@ax25={{0x3, @bcast, 0x1}, [@null, @bcast, @bcast, @bcast, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000cc0)="8e35d601375e8b6ff12a607214add488261886f20b5a097134e166dfad70deddcaa8ed7b2a2b7f2b91b13f7020a3701db4805860cb6b0ada5bc3985634b735f616a858a44dc132ac49cedf95d81da5d067dc959ba7847d9ec14f2478e1d1f0146eb11c6648caae712c3eb7c7ad7b166fb77dced3f256c9094bc0b3f18957bd6a25c79bcfa3c3ff278aa59713e2cb2d01c383a6ba4f9885de453978043204de84bafeb06ab5e1ef5d95b0f4c8e7c588d9c38955"}, {&(0x7f0000000d80)="01eed1635da9a90f96873327ec92d8499488ec18b3a722467e25cd40fd9e131eac470415267b7c3502358ccb2158ac723e"}, {&(0x7f0000000dc0)="bbb1113a75771696335c8be4f0468a44a7aad73a1a99280b8bccf4d2af0be8d38e892a432f8594211d8df957a38ea2e74eb14652b2574bcff7ce6448ef9062de14c71a66cef94671afd6a4caeea97412dc277da5fd66575d086b674610091d8694b03a29ed3d224d225257170a935dd8d4004ce98defabdec82104c085c218e5ae34d1ca5d0ce5cdfb37d6135cdd6c788a5420713452631878efd0ed97996595a20fd392382aa77d47770839b8a1ae3d215310470f40320e395d"}], 0x0, &(0x7f0000003280)=ANY=[@ANYBLOB="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"/1196]}}, {{&(0x7f0000001380)=@un=@file={0x2, './file0\x00'}, 0x0, &(0x7f0000002780)=[{&(0x7f0000001400)="d5316d2743515c499a8f22e7703ea18790ed1f3b76eaa48b8de82716ff0fceb20a185b0384199b28733297c7a22fa03d9eb241d6b64942e8e5257a1a1b0f7afba64da44a3ac764e8d855d2b30b45a119a7f644e9248e6f9c441fd859c61518b13251bc9d4556cacdbe7d3870b0bf4ee8b09f136c"}, {&(0x7f0000001480)="6aee9f3626a13c1b817368564a7b5c3e57718d57b15bb135d220c5f52552c67433a1d2d99c871da50d92f40cf928434823d324bb6cb171d5eca09b64b87fe28187459a138b24d8fdbdcf7ee9608113dd3d056e4f2df9900bfef92f3650d2e50c980bc6cf68a301e97ba864c986561d40f345aa8c9c365cda16e30c34609decbf42c5c8c28db88f70e4ec910c7eb5138b1e30d98318af7aaa9dc5354a1a869dc372349f42a1ee902268d4e35ae0a6f7792f"}, {&(0x7f0000001540)="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", 0x372}, {&(0x7f0000001640)="decf9718f471db0acd8981463c524b230322e04a8fa37616b869b0aad172553ce87077a7500df6c541149c77b292977eeb8d63b5ca52fb91ec8a05581497587ff89758a138e2ad59d4b05a0228e69e6d6c1a3e67864a66d1dbd9a06570c1e7cc2010ec6f10604799f31a7f681b01b35847bb4ea309f1e2616dda28c63a987ee9fdda8d268b2c0a619006318a4eb4f36d7718aa61dae99b038ac8bd33aa2d11d2265269e926cae8f03ec0bf700af0c9fdbb4c00bcefdb3d1e9606ed0a5f6de585132b98cd079d51411b6b7d6e259683dffbe36b856338ef5cd7132d6c0fa5b640a6114a68a47aba16afff951239fd5f0601e5e44e6173a85d2308e852ecae199f7ea2d3792e7d0841abd8f46001a21cdd2ddfb813c0593b6161ebc9758be6dee8595ffcf72e9bd7d7b3a529f36f9935e3f477e05c93e11a747b549fbaa88c15af2e6638007aff9d16178a4e788cb4d9fa6e88b9c1751c3d8e00cb298a9c6ae3ebc14c54c3c99c26bc61301b73a543b0885473ef264c7fae3f18dfa7cb1d08e96a1088b06f32739a1b0a7c5430fcd31fd8a0168281b4a98ad01706a12f01a521fddc2b93db6da7415c08c7c54b83afabf21f59c417efea07b92dbdf79aa9481c75d163aea4f9060e50e2746830b6945e7971200fce937e09c8030875128839468670ab8c0464ca7d614f3e00dd45711c485ba788743d28ee6324b61be6a610166eeb3c615735358e520dd6f5c8dfc16593017989abd54b46ad49e65bb80b4316e3a3a5b1fcf623090b46aa274b6f5fdb7e5cd463db4c8bcbf4eb3f988c3eea7642ca8509d61b90830e7e903cdf841a102777a99c86d36bd98ffee0802ac4013eb8c905a1ae3350270a17821266dce88de70da296e36640b3df2511daece5fb7f98f8cb1b40344345f053b4575a5db487d5f8743d7bc22d0587a60fd469c855531770f8b7ba6461035f817208ca159f138e171a921926d3781d35a82d360c6a7ccc030cc8d5783684fbd4ac25139b5da064311f07b896dc677c2a0b3ba3c9357e5b54fe479bfa9ee09ace3492c4c67ca6be9e1a0d66ee00cd08290d71ab0b5744429ac591af3e25182c24e32726d66f0ed2baebf9503372532458fae15435c44679bf99479049268c6118c655814e8f2211c60f2a1434e680e11f741636f126a08190a73c075606a27bf38152d2899df17828aed46a4ac4eea71667e2298d9eba8fca4b23ca04dcad8567f24181cde1de6c97821962086eb188f6e1f79d4cbbd0e6470999c47f3e1767844f044a861ade7310d927ae224fb7c044f36fffe77264b63c3174b87b5f441c12f487601da150c1a029b92dd7a1ef032aabfca534f98ad5da6cdd5cb64d8fd94d511bd279bdf2d040f332155426759cdb7c77431b85c8b1ece28f392c31f871f87f3c3776e80e1e72d680fb44856ff7a17063946ae87982e932f67a0e2f5cd5cfef59f45bb74a639c5fdc809946df45ea1c7ed16ef3e5e0356990f35642c33699c02b98e9943eb89ace68db0f52ef8f6a8ed8deba951592bd52138fdfb247d01f1f525ca80d6efb29181b7a30446ac6320f67f8e2a00cdcb589060aa0d816fb7d0c2fc1eaf332bc0853f6f8164a89f76cc3ab4cc5e3c48211487e10851179f8331d2c67fc27392dbbabe5e5504b3303a61ddb4235fd5ca9f919af433fa55d365081d2f41af79adc5fd8b7472454ef42fd921f4c625c5919c741d8ec7dfeac07853c11d88ec1e197777150449d6a2cb5eb273e00cdf855ea9b5b3367589a16c95132d6d4f7a35bc0252a5d526731b89e80cde8048dc9007e162a91e55c48e4f06aaa3a79337d77909d7c4c1c4e874c917efc25665fd7834d6f643454b71e41b3f20f2f1a2e0e5717003c2226cfbdbeed42d464f5ce67f092b7e1696279efedbec4fd539f5a6153b3adcbb9028facba71de90ca5eb3ed5009c1bac85a9f48718faa5a353e68f172c6c8aed93a7df4fd6ff65f616585306cf15650e43f1fa2aca2bec144f9dce7f58b923c5db3f606f2986c49541d8d9ca9cad4f8b33becf3c72784f9ef65e027758557ce84f9082d4c749d33aa6093d487642782a3bb23d2da56353e14ec2d41c8f19ce0a3e05b2f86a2e87dda5d935fa828a11035cf83b4d2b104ef72c41bac6c65c3c20955b6105a5bbcc132bd475c5997f19ae3d9b2ab4ecb93082e05a6dd8ba0a8cf5868874c4c0f9b664f6e73bd5251fc7bd90269dd6099e399cf9f2451a7c440a27a887b2dba1c2f69524b9ff6c044f990754e57c72fb76c7e0cdadddc85636938dcaee8e8e78e2e2891be88d3e43de6a345c732eb828a6138852615fd51ec689d3a62a07f8e5bab282ba3314ed1a73058a2307c402a962f22f74af9c4e807c0be2bf4920f321731979fff8ef17ab2dda6cb3c653ed611b8bfa5fd2bfc98d2e3f072e38057b9f937ecf1d205ec032a0e5ed824d11f29ca81cdf49453c59190b81e7bb906adca4619e08ad9cff1c4da3a1af029f2d428b9c015e4d684cd8c64d386f5861ab7b878cee032a8c17855667f730649fb1446abdc8fb54cb5e239b96fa9e1082ea1ee4b5eb254906200f752e181bcd6663354d24cac3fde305455c9c34cc0766d95924cc1219a9c987a3c421f740ad32292f60b4f063e4aeefbb7e66e57e2dc7f1066b084548399a4dd5b9c8efb1d39f7cdd9513868a2c53cff6481b932bf934e7e7d0086879ee4fd994bc1519df2f280e232816bda425ab28965d1e4527f71ed3b2e6d6b9417c6b2e956a0e82a21a4e480cdf6158537f960e2a5277d97a85be920afb5a2831d59ea7b06598cab4b122cf1e664546c2a5ac378b3ccd9e7985518cf8e2029e2327ac5c0b6e7e09d5e9b5bb35088075eda67c1c47c561697cee62fe46d9503143371732e97615c86c1e279e1de3d72be4513cf37fdad34036c0e774889e4de87ef48213c47603b136405da08f72489729e81d12bf1943385611705edd63c4f260ad33ed97df6daf91c442b3f46973b34e6b54905e0000529c9c1e37dedb3cc81c386a74792a88052309488cedbf9b8b25a2a77307e036be663a48643dc74b888d715838e5161fd93352971af18619a5626c236a55d8b63cb266e1f3aff62ebbe26e25073ce5e6159a1d7391df29aec776ff5a3384cc0d8c4d8098dcc0efc1ea643bfcd451f8bcbc35fda466baa11ed27a933573b676ef7c70eec91bb4d918c7f105ca8941fe4257b1815964366be42212d2c3eaec777a50b92f1aa8dca8120a75e68593b765afce2d4342506f62654a9115e6e0c007a52cf6a413933db162964904bffd3620b0b0c273e2da0120bb1d31b430eb2cc007fb7cc6bb2a44e1104144c6d7395052bae23ae54ec2da6965233fd8fa0cb3d507cd07f37fbe3b815776edca82d9e6b5f730c72c4d62929ca4282cd7969e0000251615a5e3576193aab0d43bd2a6f835f8428bccad8da152921f767076ad85814aebd09a2bf04fbda8234f2be3c72e87d006e9e480015464f68290814dd08593db5443621e7a0cd77ef6f1113d2fed4dbbbf5fecfd6661e4764c06c7fbf31c7d9be8b57ae59c46b31988b0ca6cca2fcb80ceaba8ecec43cb86ccfdac3e60d660336a4ed0650c4b0d15259e8e015954eb0a1c6af77717784df0657a0bf4bfe63f4f1a43dbd54d5bb98a97202fcd974658d269de1963320972f8254be53c3b39f3bf3a362400dbbc13ceee44de104c599ad9dde53281e022d566fdf7b0d32efec1cc37d0ade385ac2aaab85a571bd382c9ad73eb2f919da202ad3bd81abdf2a4b9f62df1be90d5f0d075132cbefb5b0413c15b66734662d9ba2ac4a8e14e81b03b6e5e63fc2b7af17644f2ccaa5e1e7cf330eca0134e1069b370e69ea3bc41c72eda6c92f81c6eec913d02bb0b05c70b1d98fe6d8beefc399852a4a998944500240c11e9a8413b3dbd6cf3cd6ef0e1192c46cf3b4c85d72250587be4e424b2a2e60843258d9c9ce26277692b22b36b46bc85dd87b2723435e9c49c14e8b18625526747ad03d438073a38649176d046b8a2fb7517f8428fee6a8c052a55a3741e35d553489735180b224af93b066e7e397c5b70bb9f8837379035e1c108b8fcb3c3fb830cffdb6e9844dfdce48d449a849e8ff97b12fe52f801753bde3147dbeb37e6a417fec2cf4f04a8e6308817f423657ac8a1d488a1f6bbfda6d76d9a182b0c0f4e12119d9b53e9fb6f9b702aaee47b2da943a2bef5e4669984dbb6b701e384b038d01fd179a1b12a5eb1217da2f7ce6fa188e05abefb90c959ea519905d72033be9450e3508fd45936d08c4f9c7b086687de9735e28dcfdcd374340c767264082769574cc594ca83a7a7d8bb433a72ece227b59ef101d8e517fa78f3390f1210c94f963c7f0ba4e0b5ad52189ed3e101c734aa7a461c7d864f2c9d69ecb4448ba0effd848942f7e34ccf972fd34faef470fc357378d381ef4895697734ee7ce6aa51109bc3345cc5d46fc2620dd7bdd0568a740753ac98aa49e8d93d3ad9d3b8d3c550504a1c7298956b9bd88e34bd91b4bd7b20cc424739e4cb7cb341f7d29fb0fca2b044b5c59a4284e7a9e3a2f4e9e470a401c060cae7f3207eaf1960b0a2fe5727385b208f1ee3dbe79a39db90f8ab5871ad738c4efd02797f24226cfdfc515029b65b9f70a3f608d5bcad19a88b9a21eac3bd0aaaa8f2182f0dffc7e966da83fa022758c2c2998dc2427979a340b83aa777a67915b1124b641a827214ef8fea44148b823eeba013004ffe4698008e552e8276176e499a5e419728b2dff2fb6f75d5b7f3797143ae2d7e83190b13b6fd75c4b6d9ab73d830f459c2c957e21a0e98c265eb4afb1a6b48d4bdf1644a6e6cc344c1bcf8e8dacd115897504f057d6a5ebc0e9dd4fd4bb0b92fe5edc558c0cc07e03eb4a887b2eb0f1ff6c40a10ea4bf2933bee9d3064fb39fafcce43535b4084d9e7e4fbb75b4b3dd45da79e87e6d45c029a1530a7cc70751933b7f0aa2e11558a206ca5baed2523b37571b23510aa2b40fc7825353d8a81634787d7c69e35e8dbbd079d278b53a2edd7a928f6adbbcf762797061a347232cdf27af582aa8d42ffe68df2479e5034c435fe29dc20c81c211967a3747243c9071240d1c6787034f3101c5b98c5f1bc06272e7a56a4df388f024a60951a169dde12312967d18295685377d05ce587ba93e0e721227d1e3a4b69715d431ba0fc378445b64a19cfad89d43ec052f5935e81d3d0123d89f499425076adbe962cd5b02c7862063a27d494c88c242429d92aa5d43a697648be5081233697f5475a0ae26f95b88b1d1fcf7b66cdddd5d5de627ed969a4fda47bdc480e44aac0172dbd4bbc1b87f5026aebafaf22bf8a90a5adafe30770c46f8e61af9692f53b16890da1e8330376f29bdaf78333b209f0aa4dd35b2a2788b340e62d9182a1dfac62fd8690dc930d7741cd9fe6e27ef94aa3115c3ea32df3e9d1b59e20659ce62375ea7eafc6f6d53492758fad5864a5edf167eb64104d33169226908290c041a19bae591fcfaa14788f92e599bcf362bd39249d95fb9803ebdb94bcc1263a79eaa7da340d8437d96d2485e0c48f327f9e7fcb7eb9a92536245de4291c031a7075f5e35cc87be09082b8771f59bec0380cd7b40e730c7b6d65bffd8c9841fd67c24747bdcedf4e2063be83075adeaa60263ba3ddabb787d299a5e23556b1c8f8312ea320603db4135a77c0ae05072d759d3876549bfb21056f6116fa3d84200b4b59c5938db8504180776ea0543f1ab82625a90465f243fdc2e52f06d6106416f53a953aa1ae7d8"}, {&(0x7f0000002640)="ade028d39fd2ada475b3e3f6489e1c34457a5279a4b79bfbc45042f5d4c053f5bd60ac6208a0b47296ff0520c077f5fe36207d29d92307f54bf733bd6db68ff7de3a81fb84b954489860238c647c04805ba8cafd727e4f00717089b8e42812ecb7b4ab37dd8ca2f7c1032376058a179459f5877f3b4b35776edcf9b6f9da669510"}, {&(0x7f0000004600)="be06eaaa5d63fac644cf00b28510478aed2ff7ceb3894eff1ca8cbdf9fc88b821c61112733813520191a2372fb5f41714be9b9fa081c863b768a372b0e7d17e74713700826b4e07f3ba1124b2b5b3a262f892dd0df16b2d4405ef7652a9d9e475ff99cdf72e990fe0f891e6ec2462022108089a2e8d611cc3824af0868ca60779b6cc4479d896a085f85f35fd1f0f916f4db3fb3f91ce91e0600fe446bb02000dea81c840c09cfee388689aac861a0"}], 0x0, 0x0, 0xfffffe90}}, {{&(0x7f0000002940)=@pptp={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, &(0x7f0000002b40)=[{&(0x7f00000029c0)="aaf151e46353afe44303efd489fcb6f414b8efd2b0473174da68731a30dc18dbcc9eb9be90ef47569129a8638639cdfe8468879941231be82d4917555cb4eaf118a67995ffceb2183d0489a4aa91b5a7865ff2fa5223e652dc6233dc6e29b20acda9a6889761a3dfecb94149f4654c3d58257c72dbf03f808af13ac0c1874029afcf", 0xfffffffffffffec6}, {&(0x7f0000002a80)="5fe2ce04fbdfdcaea8f0ce92b802cc26c0ad74abb611b6bd157acb36c87db15b8fdb320a8af2db8c847a6a39cf52a6"}, {&(0x7f0000002ac0)="c1661f0ff6d4bcec2375dd6dfb370fd05be43d90bde668dec66c011162bb72390f9d959d53971feec58a6d944c5b75adef821000ce2f8e28eb90c2ea71a01617ebe387c790506a2a0e0cb010de77d8b4844e8776120136f0853c"}]}}, {{0x0, 0x0, &(0x7f0000002dc0)=[{&(0x7f0000002b80)="f7a61a5a6508e4f92f5a606631202b2358386d8573e572538793d90bfab503d064bf"}, {&(0x7f0000003f00)="ebecde2c2f5e0a9476cabcb9e00750c4b98b888666c0e6d84242f0d4dfd452059e4c1abc703455f05d1be8633640fc3f60562e1c07d1266e28ffe083aa0861ed777c901ae6cb85c6a809c46e460e13c40ce99f68f48c8e215ef18d9537b6866865baeb76ad21714d340a97d98640dd4548233f9f7e511b6d50cc57669b627d9a17032eb90e502ac0d627815c0a86b59adfd74d5e3443469aff0f57c09a78ac5a494037b89e3cc0c976fade7096109c3c50d7298f45b9d8dbe3055b047f67a2ba33aef816be2ee35864a0c5a188dcff659eeaf6aaab85b2c112fd3175f85279c3d318d683f4ae21cf577af9b9"}, {&(0x7f0000002c00)="39b3e5f0a4581d9320b5ba68f91a8b3063eef2e6d3776d702b5a6921e5c1fdac8e93bfebd4146aa9e40404b270e7e4fd41a4973753b756c14a9cf44fc1ed0da6669b2cf71fb7ef926794b0123a05f8ce8e3cc50b9952a61f2179587a"}, {&(0x7f0000002c80)="6fb967f48ac6efe935364ce7fab785a6fdace4b2a390dba14898d7b1c4c34998903f2e2b4f9cebe12409467bcd280e18f26a3e06ad66f71a57e09ebe68cfa70418b2d5dd7e716768a85e551974"}, {&(0x7f0000002d00)="2aaf04ff1e783becb8cf6c0649a35fae92b730641e4979d5c4f7a648c696580eaacd165b0abf9a4a550668279e0364bc64a523d53b357ad74b2339872686f3c4b35d4ebc9361d2ac42e59c22d1f551d65171d8583b23cd93adcffb701f45ae4344e27381e3750ce0b7d444d1a3964332e18d18d9e3ff7af0036ff90d815fea4ba2571f486672330664fb07ea578fd21ac06b6a56a105fc5ddf59ab40d33b7a2f579bcbe86a504534626e58d3319c2b3fb990157ceebb68ddda4f815b267eb92c"}], 0x0, &(0x7f0000002e40)=[{0x0, 0x88, 0x54f8, "bbc15f7eda595953a428b3e3ce4d3b741dc3a895896b3e884eb8a03c33471e0fc7262b2a234365158ef06e194c0c37c1ff1bb3a4eb7279cb63d08e2811760514c1cff3c5a9e5cf3813441af6cbb3607dc2465850af0c6447650ebe33a9"}, {0x0, 0x84, 0x1000, "df1daced8bdbce65db145b77f5d4f142dd6daa1d2c0e1e186633b5c3bc32127406c846292dbe5cc4564aabc2b6a79ea884ff41840406637fce5f5f10a46bea4b4b0e8d5c774b83a546a3626a663ad6dbb23bfd563ebf9da8f66c6323e2685c555823d3bac6131700cbc1847cf43a6a082260c56e1cd6680a81bc8dc26dd8541729c1cd4c275ba3a883fc506629d80834b8a341e87c66bbbddc4d2cd88828d6ba60a96b448a6bd70152f8b236301aa4f0987774d1dcf4a1104abbc84d79fea61cffcbdb412c16ad4b8c32c47c"}, {0x0, 0x0, 0x0, "f128f4a67a94d5a8b0184bcb46adb773b1f9747384a04b2e6810c409de3f6444a0abed95f53b90316d8de0dbe641c11189dd01e4a76131c78cc78a47ec53f2a48ea3435a85c3e09d32465b514e12de57be231885abf0b074027f7a4f6ba6d8c0768c29759425987a9e45f14a969992aed37adad81ef95bf9715373e9"}, {0x0, 0x105, 0x1, "5e1063d8c2f11af21dec648ace35cf254df8772a1824911784ef5806e4520fa209667942a573b160b9db8b643199a324ad98e8cc57107e08e9bb8166fbca562c4801423a022c341fbdda0642bf60dfed24dea5b7393d5e4bd64257f4fdaf930f7350306bb3ef0133906df8b40b0d81db6cfeef30680681e5a6c2c87bed2d5aa4b208ea0ee9e693c5995380b7c4f9868b03a712a772b444142e7258f24dddfa9ed291c3a8d82c7ad8616354831f617a187f"}]}}, {{0x0, 0x0, &(0x7f0000003240)=[{&(0x7f00000039c0)="d1d8b0082b08eac646567c36a494f98bb3a4a957e846f83cac0003d58462c418f2188d16dd2e91c0e887479a702d1f075583bce57924a189e0e0ac0424f3b4b931a90abb44ef8da584c650701fd79dcde740ccbad5d0fe06dce7d1ec5afcec4bfacdb033f33b7d0ef6eeff"}, {&(0x7f0000003180)="201a4d8a68e29954c0be5446e3eddbdb3a04c99bfaae4b8e65bac6a97914df873beb75d6058d6ff8a77628ce5b01ae2f5ee3d162052d08fb3d3f9041ebd2c7b4466966a1c93b427c017972ff51764ba103dc70f1eafe1896b0f6dacfc5693e112a857778e6d6f396bfbd7d9062248d29bf18e1170662d96bab2cf6664c4e8276a0ad8f"}], 0x0, &(0x7f0000004000)=[{0x0, 0x103, 0x5, "6b0b287ef89f8f6a09387ab5201ce8ac1f1cd0985f20347ff2095e3a440d1c65e2cda7d14d4dd53de6620a2e757cdc9850d27c1ba0ecc44ccf1b321a37c9eb8c019a7e79c029f94c5078b07f63a7017052dab5b4d3f76dc087ea66b5c6420eaaef62a52155314b51985d72c9415b8b84263f99da6be27a4f8dcc20d445bd5d2308"}, {0x0, 0x115, 0x101, "597a0450cf2a"}, {0x0, 0xff, 0x0, "4d8eba6059e5d0d076e1e3e2b96841aa4ca829b237c01314643d6bd3ff30ab3308bf2b3e159f35c71733baa71a9d0417d666a4a8e82f8094f46491d855698b307f45ca755b1f1a9d936fdc6217cefb994be00f90bbe33843"}, {0x0, 0x84, 0x5, "89b95f0e6e39453cec1c8abb4a49f65d6e7568babc8d6befbfd6bc277be8b08ae1602b2a5274cc1f"}, {0x381, 0x88, 0x7ff, "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"}, {0x0, 0xa3b1caa46e20dab3, 0xfffffffa, "eb7104ad158ffdc2e701644e6a00ec423695ec76866f0be060ec60ed08e554de3ff09145e8a750a8cd7018a7fd"}, {0x0, 0x6b27f4c5fab8f0fe, 0x9c, "02d210a53bd05dd4a304d6e57dc99bb93ce894e4ff5bcb79597e55b4e987d8c24bb8b56b0609c802b2eb4c0e7eb01ef4dfd30275353eaf1283fa6839332944aaafb6cde3c782764f99ad48ada4713cbb"}, {0x0, 0x0, 0x7fffffff, "98877153c0572d879a9d34ed426294ab508a9f727a750e21dd2867da6cf8016fd3d39ac2231c5ac49ff857302eca66da9aba029b89f06ecfbbcb9076a5702d77b275314da3b71ea28be2234cbc78fc859255c9eede3669580393a1e32639414a7a67ef991f36daf61f3bbc6c2bf1371087f241a49743c5f6b02984bde5bca64be1fa2b51c96a10ae456dbca015003fcf194f9a319dda246f0f2889e6efb35e100a65"}, {0x0, 0x1, 0xfffffffb, "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"}]}}], 0x1, 0x800) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETFSLABEL(r4, 0x800452d2, &(0x7f0000000300)) 23:32:37 executing program 2 (fault-call:10 fault-nth:36): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:37 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080), 0x40) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r5, &(0x7f0000002780), 0x400004d, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={'ifb0\x00', {0x2, 0x4e24, @broadcast}}) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:37 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x3f000000) 23:32:37 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x6) accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) r3 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r3, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000240)={'raw\x00'}, &(0x7f0000000100)=0x54) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r5, &(0x7f0000002780), 0x400004d, 0x0) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f00000000c0)=0x100) [ 2684.669463][T14521] FAULT_INJECTION: forcing a failure. [ 2684.669463][T14521] name failslab, interval 1, probability 0, space 0, times 0 [ 2684.682322][T14521] CPU: 0 PID: 14521 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2684.690225][T14521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2684.700285][T14521] Call Trace: [ 2684.703594][T14521] dump_stack+0x172/0x1f0 [ 2684.707945][T14521] should_fail.cold+0xa/0x15 [ 2684.712552][T14521] ? fault_create_debugfs_attr+0x180/0x180 [ 2684.718372][T14521] ? ___might_sleep+0x163/0x2c0 [ 2684.723239][T14521] __should_failslab+0x121/0x190 [ 2684.728188][T14521] should_failslab+0x9/0x14 [ 2684.732702][T14521] __kmalloc+0x2e0/0x770 [ 2684.736959][T14521] ? __local_bh_enable_ip+0x15a/0x270 [ 2684.742337][T14521] ? lock_sock_nested+0xe2/0x120 [ 2684.747291][T14521] ? __local_bh_enable_ip+0x15a/0x270 [ 2684.752684][T14521] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2684.757985][T14521] ? lock_sock_nested+0x9a/0x120 [ 2684.762931][T14521] ? sock_kmalloc+0xc6/0x120 [ 2684.767539][T14521] sock_kmalloc+0xc6/0x120 [ 2684.771970][T14521] hash_alloc_result.part.0+0x95/0x110 [ 2684.777437][T14521] hash_sendpage+0x7a7/0x9d0 [ 2684.782052][T14521] hash_sendpage_nokey+0x94/0xa0 [ 2684.787002][T14521] kernel_sendpage+0x92/0xf0 [ 2684.791598][T14521] ? hash_check_key.isra.0+0x230/0x230 [ 2684.797070][T14521] sock_sendpage+0x8b/0xc0 [ 2684.801512][T14521] pipe_to_sendpage+0x296/0x360 [ 2684.806370][T14521] ? kernel_sendpage+0xf0/0xf0 [ 2684.811140][T14521] ? direct_splice_actor+0x190/0x190 [ 2684.816432][T14521] ? __put_page+0xa7/0xe0 [ 2684.820768][T14521] ? anon_pipe_buf_release+0x1c6/0x270 [ 2684.826266][T14521] __splice_from_pipe+0x397/0x7d0 [ 2684.831297][T14521] ? direct_splice_actor+0x190/0x190 [ 2684.836601][T14521] ? direct_splice_actor+0x190/0x190 [ 2684.841892][T14521] splice_from_pipe+0x108/0x170 [ 2684.846750][T14521] ? splice_shrink_spd+0xd0/0xd0 [ 2684.851700][T14521] ? apparmor_file_permission+0x25/0x30 [ 2684.857251][T14521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2684.863502][T14521] ? security_file_permission+0x8f/0x380 [ 2684.863520][T14521] generic_splice_sendpage+0x3c/0x50 [ 2684.863539][T14521] ? splice_from_pipe+0x170/0x170 [ 2684.879440][T14521] do_splice+0x708/0x1410 [ 2684.883862][T14521] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2684.888985][T14521] ? __fget_light+0x1a9/0x230 [ 2684.893681][T14521] __x64_sys_splice+0x2c6/0x330 [ 2684.898559][T14521] do_syscall_64+0xfa/0x760 [ 2684.903076][T14521] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2684.903089][T14521] RIP: 0033:0x459f49 [ 2684.903107][T14521] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2684.932470][T14521] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2684.940888][T14521] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2684.948864][T14521] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2684.956841][T14521] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 23:32:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") socket$xdp(0x2c, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc020662a, &(0x7f00000000c0)={0x4000000, r2, 0x1800}) r3 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x14, r3, 0x101}, 0x14}}, 0x0) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0xc8, r3, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3868}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe00b}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xffffff81}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7fffffff}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xa917}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x32}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3f}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x4080}, 0x800) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc020662a, &(0x7f00000000c0)={0x4000000, r5, 0x1800}) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f00000002c0)=0x7, 0x4) socket$xdp(0x2c, 0x3, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r6, 0x89a0, &(0x7f00000000c0)='bcsf0\x00') ioctl$sock_SIOCBRDELBR(r6, 0x89a1, &(0x7f0000000180)='bcsf0\x00@\x00\x00\x05\x00\x00\x11\x00\x00\x13') r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc020662a, &(0x7f00000000c0)={0x4000000, r8, 0x1800}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000340)={0x0, 0xd9, "585dd92c3be32f840de256a6b3770976b98bd9a377917a9b20edf604a3ec85ce64611f8e541b45bc675c608f56fd5f53f26e3f0ac4f59cd9f2f233c82154715cfe06e65e54ca129a222c2bfb88516613f86814e8326bdbdc6e99d17f5572c9b95e6b30bea58646184147f42a13b13f273d445ffe9dc15666facf5a1a2c800dd592c15aa738f7f0c067df169e2d6f5d2dcba72c7a7292cc3aababdab79e60ddb7928d475ccb1359fd0a38e2d2cb95b2b37fb580f19f50dcd673474594b393daf2bd00f39c87b977d2650b0e32525c7f7b82e6efb36a6e3d7e9d"}, &(0x7f0000000440)=0xe1) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r8, 0x84, 0x18, &(0x7f0000000480)={r9, 0xe017}, 0x8) [ 2684.964820][T14521] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2684.972785][T14521] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:32:37 executing program 3: unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x4e20, 0x7, @loopback, 0x7}, @in6={0xa, 0x4e21, 0x401, @rand_addr="747f81af1093101c46ee0b2646af09ec", 0x1000}, @in6={0xa, 0x4e24, 0x192f, @rand_addr="c67f7e698e380df3fcb564e6c1245284", 0x4}, @in6={0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, [], 0x1f}, 0x7}], 0x70) close(0xffffffffffffffff) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00\x00\x00\x00\x00\x00\x00\x00 ', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}}) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 23:32:37 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0xfffffea6) accept$alg(r5, 0x0, 0x0) r6 = socket$caif_seqpacket(0x25, 0x5, 0x0) vmsplice(r6, &(0x7f0000000600)=[{&(0x7f00000000c0)="b54f1cb5366d88ddd41b491d66c3f941f43ee201cbfbdfc1bde653b1a7178676721680fdd7bc0aa72f00cf802df6087a7b471035ff37d52d73b65ead0d993a405a1d2c9d207f741c433f0ab1819b0845ad4a3afb560b7ceff5b33b14e2d823b036b5abefcc18c378903ff260e2f5733e9c8caa2dcef95644f2287c7aa564", 0x7e}, {&(0x7f0000000300)="ec2b568c602d3001c73f8cb43796f27d6f11bcc8b87434f0418fd6904d1608a262941bbf68f26a5ca983067967808acdd281ac2941c8d35685ce901da4cd59f02719a61e3cc02e6a7b4bf40389d3fd41fc6d7db8b0f170520478f13b4ec61b28b57ef4f3fb3e6f0238744cbec5787ceb803ec5a1614cc47ef8291e10e6ca691af8446b8d2cece82ecfe63b87f512b0d7d240eba223a9ac61c030c7dfb806dcfa5948166c3317d523b089a46aa649bb065e8ca1d3cdc965722d7b45028ad8acfe7a25e158b425e555", 0xc8}, {&(0x7f0000000480)="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", 0xfa}, {&(0x7f0000000240)="c31cadb037c41864ef421df2472fbcb355ef821924", 0x15}, {&(0x7f0000000580)="d68a1d35f0e673a22a4865b18ac6d2e0c01f513828e6ad2d619f9ce198370120169ff8c3c9ff7674df2190114f06b01d5c25439f3c9abf0b4369d11b3da254c5b2e6b3b800f2ef7d", 0x48}, {&(0x7f0000000280)=',', 0x1}, {&(0x7f0000000400)="2554fdb7d24387", 0x7}], 0x7, 0x8) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2685.348623][T14538] IPVS: ftp: loaded support on port[0] = 21 23:32:37 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x40000000) 23:32:37 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)='\r', 0x1}], 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r3, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc020662a, &(0x7f00000000c0)={0x4000000, r6, 0x1800}) r7 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r7, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000300)={{{@in, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000400)=0xe8) sendmsg$nl_route_sched(r5, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@gettclass={0x28, 0x2a, 0x8, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {0xffe0, 0x1}, {0xfff3}, {0x8, 0xd3dbe601623c6575}}, ["", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000}, 0x110) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r9, 0x1ff, 0x30}, &(0x7f0000000240)=0xc) r10 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r10, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x66, &(0x7f0000000040)={r11}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000280)={r11, 0x1, 0x5}, 0x8) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r12 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r13 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r13, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r12, 0x0, 0x80000001, 0x0) 23:32:37 executing program 2 (fault-call:10 fault-nth:37): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2685.671369][T14558] FAULT_INJECTION: forcing a failure. [ 2685.671369][T14558] name failslab, interval 1, probability 0, space 0, times 0 [ 2685.691384][T14558] CPU: 1 PID: 14558 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2685.699308][T14558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2685.709362][T14558] Call Trace: [ 2685.712655][T14558] dump_stack+0x172/0x1f0 [ 2685.717006][T14558] should_fail.cold+0xa/0x15 [ 2685.721615][T14558] ? fault_create_debugfs_attr+0x180/0x180 [ 2685.727436][T14558] ? ___might_sleep+0x163/0x2c0 [ 2685.727456][T14558] __should_failslab+0x121/0x190 [ 2685.727479][T14558] should_failslab+0x9/0x14 [ 2685.727491][T14558] __kmalloc+0x2e0/0x770 [ 2685.727505][T14558] ? __local_bh_enable_ip+0x15a/0x270 [ 2685.727517][T14558] ? lock_sock_nested+0xe2/0x120 [ 2685.727535][T14558] ? __local_bh_enable_ip+0x15a/0x270 [ 2685.737298][T14558] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2685.737312][T14558] ? lock_sock_nested+0x9a/0x120 [ 2685.737323][T14558] ? sock_kmalloc+0xc6/0x120 [ 2685.737339][T14558] sock_kmalloc+0xc6/0x120 [ 2685.737358][T14558] hash_alloc_result.part.0+0x95/0x110 [ 2685.737372][T14558] hash_sendpage+0x7a7/0x9d0 [ 2685.737393][T14558] hash_sendpage_nokey+0x94/0xa0 [ 2685.737410][T14558] kernel_sendpage+0x92/0xf0 [ 2685.737421][T14558] ? hash_check_key.isra.0+0x230/0x230 [ 2685.737437][T14558] sock_sendpage+0x8b/0xc0 [ 2685.737457][T14558] pipe_to_sendpage+0x296/0x360 [ 2685.737478][T14558] ? kernel_sendpage+0xf0/0xf0 [ 2685.737494][T14558] ? direct_splice_actor+0x190/0x190 [ 2685.737509][T14558] ? __put_page+0xa7/0xe0 [ 2685.737525][T14558] ? anon_pipe_buf_release+0x1c6/0x270 [ 2685.737545][T14558] __splice_from_pipe+0x397/0x7d0 [ 2685.737561][T14558] ? direct_splice_actor+0x190/0x190 [ 2685.737585][T14558] ? direct_splice_actor+0x190/0x190 [ 2685.737600][T14558] splice_from_pipe+0x108/0x170 [ 2685.737617][T14558] ? splice_shrink_spd+0xd0/0xd0 [ 2685.737638][T14558] ? apparmor_file_permission+0x25/0x30 [ 2685.737656][T14558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2685.737673][T14558] ? security_file_permission+0x8f/0x380 [ 2685.737691][T14558] generic_splice_sendpage+0x3c/0x50 [ 2685.737712][T14558] ? splice_from_pipe+0x170/0x170 [ 2685.746418][T14558] do_splice+0x708/0x1410 [ 2685.746442][T14558] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2685.746457][T14558] ? __fget_light+0x1a9/0x230 [ 2685.746476][T14558] __x64_sys_splice+0x2c6/0x330 [ 2685.756745][T14558] do_syscall_64+0xfa/0x760 [ 2685.756765][T14558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2685.756776][T14558] RIP: 0033:0x459f49 [ 2685.756792][T14558] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2685.756799][T14558] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2685.756815][T14558] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2685.756822][T14558] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2685.756831][T14558] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2685.756839][T14558] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2685.756852][T14558] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2686.001594][T14538] IPVS: ftp: loaded support on port[0] = 21 23:32:45 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x0, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) r2 = getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000680)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) r4 = getgid() r5 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r5, 0x8927, &(0x7f0000000080)={'ip_vti0:\x00', @ifru_flags}) r6 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)=0x0) bind$llc(r6, &(0x7f0000000180)={0x1a, 0x10f, 0x1f, 0xfc, 0x0, 0x0, @random="48d9e6aa3026"}, 0x10) ioctl$int_in(r6, 0x100000000005452, &(0x7f0000000080)=0x9) connect$llc(r6, &(0x7f0000000100)={0x1a, 0x0, 0x84, 0xff, 0x0, 0xff, @link_local}, 0xd) sendmmsg(r6, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r6, &(0x7f00000005c0), 0x2d4, 0x20, 0x0) r8 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f0000000000)) r9 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r9, 0x8904, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r10}, 0xc) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r11, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0083d0", @ANYRES16=r12, @ANYBLOB="21002000000000000000022406eb612ebe9e8540"], 0x1c}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYRES32=r6, @ANYPTR=&(0x7f0000000500)=ANY=[@ANYRES64=r6, @ANYRES16=r7, @ANYRESHEX=r8, @ANYRESDEC, @ANYRESDEC=r7, @ANYRES64=r12, @ANYRESOCT, @ANYRESDEC=r7], @ANYRESDEC=r10, @ANYRESHEX=r7, @ANYRES32], &(0x7f0000000100)=0x5) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in=@loopback, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f0000000580)=0xe8) r14 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r14, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$inet6_opts(r14, 0x29, 0x3b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000400130000000000010005020000000000000000000009000000000000040100efff"], 0x28) sendmmsg(r14, &(0x7f00000092c0), 0x400000000000064, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r16 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) getsockopt$inet_sctp6_SCTP_MAX_BURST(r16, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) splice(r15, 0x0, r16, 0x0, 0x100000000ffe0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r16, 0x0, 0x14, &(0x7f0000000080)=':cpuset#+vboxnet0^,\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) r19 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r19, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b38e47bf070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000001940)={0x0, 0x0, 0x0}, 0x0) sendmmsg$unix(r20, &(0x7f0000002140)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x8000}, {&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001680), 0x0, &(0x7f00000019c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r22}}}], 0x40, 0x4040}, {&(0x7f0000001a00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001c80)=[{&(0x7f0000001a80)="74b2333c0879e92e6a9f6fce1e1457d06e2f6b2715fd3d8085c97571bb8664ad1ec668fdb56e3229725116380fbbcfafe5897bc66f76edb46fbc1b66bb267b50cf06e72443681eb8e3281c6b21e5a00f7e7f4e4ee4839fdb30d462d16b19d571d38448cbd65e333c1f5b4b6c555fc6", 0x6f}, {&(0x7f0000001c00)="6060bd2c333b69e29e012cde11fc8b1d528c98e25e09a377b5e73ba936ce0187bcf14aa920037a65d0da3a002eb684ba6986bc965ff551993259186700e88405e12e9ad28336bfc147aecab28eedd7e198576c81", 0x54}], 0x2, &(0x7f0000002080)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000bd000000000000000110000002010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r19, @ANYRES32=r21, @ANYRES32=r21, @ANYRES32=r19, @ANYRES32=r20, @ANYRES32=r21, @ANYBLOB="2c000000000000000100000001000040", @ANYRES32=r19, @ANYRES32=r21, @ANYRES32=r21, @ANYRES32=r19, @ANYRES32, @ANYRES32=r19, @ANYRES32=r21, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x20000000}], 0x3, 0x40000) setsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000280)={r17, r18, r22}, 0xc) r23 = accept$inet(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, @empty}, &(0x7f0000000880)=0x10) r24 = socket$l2tp(0x18, 0x1, 0x1) r25 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r25, &(0x7f0000002780), 0x400004d, 0x0) r26 = socket$rds(0x15, 0x5, 0x0) r27 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r27, &(0x7f0000002780), 0x400004d, 0x0) ioctl$sock_SIOCGPGRP(r27, 0x8904, &(0x7f00000008c0)=0x0) r29 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r29, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$inet6_opts(r29, 0x29, 0x3b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000400130000000000010005020000000000000000000009000000000000040100efff"], 0x28) sendmmsg(r29, &(0x7f00000092c0), 0x400000000000064, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r31 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) getsockopt$inet_sctp6_SCTP_MAX_BURST(r31, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) splice(r30, 0x0, r31, 0x0, 0x100000000ffe0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r31, 0x0, 0x14, &(0x7f0000000080)=':cpuset#+vboxnet0^,\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) r34 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r34, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b38e47bf070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r36, 0x1, 0x11, &(0x7f0000001940)={0x0, 0x0, 0x0}, 0x0) sendmmsg$unix(r35, &(0x7f0000002140)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x8000}, {&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001680), 0x0, &(0x7f00000019c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r37}}}], 0x40, 0x4040}, {&(0x7f0000001a00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001c80)=[{&(0x7f0000001a80)="74b2333c0879e92e6a9f6fce1e1457d06e2f6b2715fd3d8085c97571bb8664ad1ec668fdb56e3229725116380fbbcfafe5897bc66f76edb46fbc1b66bb267b50cf06e72443681eb8e3281c6b21e5a00f7e7f4e4ee4839fdb30d462d16b19d571d38448cbd65e333c1f5b4b6c555fc6", 0x6f}, {&(0x7f0000001c00)="6060bd2c333b69e29e012cde11fc8b1d528c98e25e09a377b5e73ba936ce0187bcf14aa920037a65d0da3a002eb684ba6986bc965ff551993259186700e88405e12e9ad28336bfc147aecab28eedd7e198576c81", 0x54}], 0x2, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1c8ced6b08e300800000000200010000c68c7f09b2a9a9d1", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000bd000000000000000110000002010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r34, @ANYRES32=r36, @ANYRES32=r36, @ANYRES32=r34, @ANYRES32=r35, @ANYRES32=r36, @ANYBLOB="2c000000000000000100000001000040", @ANYRES32=r34, @ANYRES32=r36, @ANYRES32=r36, @ANYRES32=r34, @ANYRES32, @ANYRES32=r34, @ANYRES32=r36, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x20000000}], 0x3, 0x40000) setsockopt$sock_cred(r29, 0x1, 0x11, &(0x7f0000000280)={r32, r33, r37}, 0xc) r38 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r38, &(0x7f0000002780), 0x400004d, 0x0) r39 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r39, &(0x7f0000002780), 0x400004d, 0x0) r40 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r40, &(0x7f0000002780), 0x400004d, 0x0) r41 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r41, &(0x7f0000002780), 0x400004d, 0x0) r42 = accept$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000940)=0x14) sendmsg$unix(r1, &(0x7f0000000a80)={&(0x7f0000000080)=@abs={0x3, 0x0, 0x4e21}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000100)="a7888c4d88ca895ea63bd88ea1208a32b6b7ffd6cf8563663d19f50fa1c577d93cfe7fa635f2502ed8cdc67c5ca92da843f1feb95e971d02c6d895e1fff49294bb72b26dac7e2dcdec5990b9eda4019748ced890e74cd09b6abbcedd0cbf3a27f448b7c9706191a752663280b8d656b3", 0x70}, {&(0x7f0000000180)="d8ac15901d572f6882f88cea647a5965ec1c022fb5fd59ac10d83ec47665eabdaf7ed59fdd1eb1e4edb87af73be1171516db", 0x32}, {&(0x7f00000001c0)="0e5bcf069f442fe70c18e26ef89d43a30c22689b52759f5288a83d18feb0c3584bc3504f1103aee47c0d29147a0ced9b811294566fee195834f6eca4acb347b733fc16bff496cb4cacc72948242cf86c37e3278c2cd0b826d107f0971761a4e1f258c6a8dad39aca472caf35c4e2ac7dc3d3", 0x72}, {&(0x7f0000000240)="00e7d3b8c6a50d36bed384b5a9599790250d3526c3cd73c138db8d450eaeaf601240397384fff50b9fffce721462e861305e5bc18479788b7bfb39a44e783318f956f19d5c344924fab7802bf739beaf9bd04db102a1d43c85ddd9c815ade34a666f238eb5426153a000ccb7a3de1de7c96f1bf4eeca0ec87ef88c76574501aa879c47ec651e0821d344f464682db4219687fced87781aa66f", 0x99}, {&(0x7f0000000340)="40ebe3dadc06635df18d61efa8aed6b4296957a679bc4e5c75370dfd1db86ba83fd841", 0x23}, {&(0x7f0000000400)="45f57898b36bafc9c09fbf785bd5ed58a79041eae95a119a08dc86805459ad5eb75b209151a5f28d0c77e3ee3e5b45bc68495ffadbf9d2d16baa029873d77dd676d024b4d6648c8a6834acff81107b023d652fd391cd18b1fe00693a028f0d00ef6e67fe30fd2a88079f6e1cc119fdbb30764b2af3409de65e07e97e74e1f0a006e34ed2014215d9a1747ddc1953a22c0da89d3204cf8760f49a2107da8427740c4c31a9d6c68cb4b6a68e910a8d780fb2148c6ea0f870a2c6a54d85dd12795e2a8ea65b768cf54ce5e5061033a5ab1fe515c4f60655f16eafaf33453a745bbd7c44a550e87b381677ca55c0a4ba31900c1b8fca39767f", 0xf7}], 0x6, &(0x7f0000000980)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r10, r13, r22}}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, r0, r23, r24, r25, 0xffffffffffffffff, r0, r26]}}, @cred={{0x1c, 0x1, 0x2, {r28, r33, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r38]}}, @rights={{0x28, 0x1, 0x1, [r39, r40, r0, r41, r42, r0]}}], 0xd0, 0x80}, 0x8000) sendmmsg$inet6(r0, &(0x7f0000000600)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x80000001, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000300)={0xa, 0x4e24, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=[@pktinfo={{0x24, 0x29, 0x43, {@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}}}], 0x28}}], 0x2, 0x0) 23:32:45 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x7f000000) 23:32:45 executing program 2 (fault-call:10 fault-nth:38): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:45 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000040)={r5}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000240)={r5, 0x30, &(0x7f0000000100)=[@in={0x2, 0x4e22, @local}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e23, @multicast2}]}, &(0x7f0000000280)=0x10) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r6, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:45 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_TIME_STAMP(r4, 0x0, 0x3, &(0x7f00000000c0)=0x3, 0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x270, &(0x7f0000000240)=[{&(0x7f0000000100)="756521bf6d59", 0x1f9}]}, 0xa6601db7a41f1736) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000280), &(0x7f00000002c0)=0x4) [ 2693.143062][T14589] FAULT_INJECTION: forcing a failure. [ 2693.143062][T14589] name failslab, interval 1, probability 0, space 0, times 0 [ 2693.156281][T14589] CPU: 0 PID: 14589 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2693.164167][T14589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2693.174229][T14589] Call Trace: [ 2693.177534][T14589] dump_stack+0x172/0x1f0 [ 2693.181883][T14589] should_fail.cold+0xa/0x15 [ 2693.186490][T14589] ? fault_create_debugfs_attr+0x180/0x180 [ 2693.192312][T14589] ? ___might_sleep+0x163/0x2c0 [ 2693.197180][T14589] __should_failslab+0x121/0x190 [ 2693.202226][T14589] should_failslab+0x9/0x14 [ 2693.206734][T14589] __kmalloc+0x2e0/0x770 [ 2693.210987][T14589] ? __local_bh_enable_ip+0x15a/0x270 [ 2693.216367][T14589] ? lock_sock_nested+0xe2/0x120 [ 2693.221307][T14589] ? __local_bh_enable_ip+0x15a/0x270 [ 2693.226690][T14589] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2693.231977][T14589] ? lock_sock_nested+0x9a/0x120 [ 2693.236918][T14589] ? sock_kmalloc+0xc6/0x120 [ 2693.241516][T14589] sock_kmalloc+0xc6/0x120 [ 2693.246392][T14589] hash_alloc_result.part.0+0x95/0x110 [ 2693.251871][T14589] hash_sendpage+0x7a7/0x9d0 [ 2693.256489][T14589] hash_sendpage_nokey+0x94/0xa0 [ 2693.261528][T14589] kernel_sendpage+0x92/0xf0 [ 2693.266127][T14589] ? hash_check_key.isra.0+0x230/0x230 [ 2693.271599][T14589] sock_sendpage+0x8b/0xc0 [ 2693.276031][T14589] pipe_to_sendpage+0x296/0x360 [ 2693.280894][T14589] ? kernel_sendpage+0xf0/0xf0 [ 2693.285668][T14589] ? direct_splice_actor+0x190/0x190 [ 2693.290964][T14589] ? __put_page+0xa7/0xe0 [ 2693.295309][T14589] ? anon_pipe_buf_release+0x1c6/0x270 [ 2693.300782][T14589] __splice_from_pipe+0x397/0x7d0 [ 2693.305908][T14589] ? direct_splice_actor+0x190/0x190 [ 2693.311216][T14589] ? direct_splice_actor+0x190/0x190 [ 2693.316511][T14589] splice_from_pipe+0x108/0x170 [ 2693.321380][T14589] ? splice_shrink_spd+0xd0/0xd0 [ 2693.326328][T14589] ? apparmor_file_permission+0x25/0x30 [ 2693.331897][T14589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2693.338137][T14589] ? security_file_permission+0x8f/0x380 [ 2693.343778][T14589] generic_splice_sendpage+0x3c/0x50 [ 2693.349067][T14589] ? splice_from_pipe+0x170/0x170 [ 2693.354096][T14589] do_splice+0x708/0x1410 [ 2693.358449][T14589] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2693.363565][T14589] ? __fget_light+0x1a9/0x230 [ 2693.368251][T14589] __x64_sys_splice+0x2c6/0x330 [ 2693.373134][T14589] do_syscall_64+0xfa/0x760 [ 2693.377651][T14589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2693.383548][T14589] RIP: 0033:0x459f49 [ 2693.387446][T14589] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2693.407048][T14589] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2693.415453][T14589] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2693.423473][T14589] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2693.431475][T14589] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2693.439528][T14589] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2693.447515][T14589] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:32:46 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x8dffffff) 23:32:46 executing program 2 (fault-call:10 fault-nth:39): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:46 executing program 0: getpeername(0xffffffffffffffff, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f00000002c0)=0x80) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r2}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000300)={r2, 0x5}, 0x8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0xffffffffffffff3f}], 0x1}, 0x0) recvmmsg(r8, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$inet_udp_encap(r8, 0x11, 0x64, &(0x7f0000000100)=0x7, 0x4) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r4, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r3, 0x0, r6, 0x0, 0x80000001, 0x0) r9 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r9, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r9, 0x6, 0x2, &(0x7f00000000c0)=@ccm_128={{0x304}, "58c60090dbc190d8", "42efe0e5af38ee82e52aa522fddc460d", "e24bd419", 'E\x00'}, 0x28) 23:32:46 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000000c0)=0x4, 0x4) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000240)={'raw\x00', 0x4, [{}, {}, {}, {}]}, 0x68) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 23:32:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x2011, r0, 0x0) mmap(&(0x7f0000196000/0x4000)=nil, 0xc07000, 0xffffffffefffffff, 0x8032, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc020662a, &(0x7f00000000c0)={0x4000000, r2, 0x1800}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f0000000140)=0xe8) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r4, &(0x7f0000002780), 0x400004d, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200400}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="ce99f54b92ec703b2489c80000001e0003042cef6e00fee156036e29be778d000b00", @ANYRES32=r3, @ANYBLOB="62232205593647f6d8669f047476edae50eaf7203f41b95bc41cc995ad48551c9ae2646d93b187e0de5e7a29b7f1538d87febdee3ca704391691c88f58005600be787da745cb405a72c21aefed793861092271ff1d43fd03b1008d5276b3d35c5ada2cd93cf442f810e2706d974b174a11dbb1ddbb16e4668eb1bcec0dfab09e2f050cb972068fda23698ecba22d9a3d937b00000c006d00060000000000000008007300", @ANYRES32=r5], 0xc8}, 0x1, 0x0, 0x0, 0x1010}, 0x41040) [ 2694.104203][T14613] FAULT_INJECTION: forcing a failure. [ 2694.104203][T14613] name failslab, interval 1, probability 0, space 0, times 0 [ 2694.131124][T14613] CPU: 1 PID: 14613 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2694.139068][T14613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2694.149117][T14613] Call Trace: [ 2694.149138][T14613] dump_stack+0x172/0x1f0 [ 2694.149158][T14613] should_fail.cold+0xa/0x15 [ 2694.149176][T14613] ? fault_create_debugfs_attr+0x180/0x180 [ 2694.149196][T14613] ? ___might_sleep+0x163/0x2c0 [ 2694.171986][T14613] __should_failslab+0x121/0x190 [ 2694.172006][T14613] should_failslab+0x9/0x14 [ 2694.172019][T14613] __kmalloc+0x2e0/0x770 [ 2694.172035][T14613] ? __local_bh_enable_ip+0x15a/0x270 [ 2694.172047][T14613] ? lock_sock_nested+0xe2/0x120 [ 2694.172064][T14613] ? __local_bh_enable_ip+0x15a/0x270 [ 2694.201345][T14613] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2694.206640][T14613] ? lock_sock_nested+0x9a/0x120 [ 2694.211581][T14613] ? sock_kmalloc+0xc6/0x120 [ 2694.216177][T14613] sock_kmalloc+0xc6/0x120 [ 2694.220604][T14613] hash_alloc_result.part.0+0x95/0x110 [ 2694.226071][T14613] hash_sendpage+0x7a7/0x9d0 [ 2694.230679][T14613] hash_sendpage_nokey+0x94/0xa0 [ 2694.235633][T14613] kernel_sendpage+0x92/0xf0 [ 2694.240233][T14613] ? hash_check_key.isra.0+0x230/0x230 [ 2694.245702][T14613] sock_sendpage+0x8b/0xc0 [ 2694.250128][T14613] pipe_to_sendpage+0x296/0x360 [ 2694.254988][T14613] ? kernel_sendpage+0xf0/0xf0 [ 2694.259775][T14613] ? direct_splice_actor+0x190/0x190 [ 2694.265072][T14613] ? __put_page+0xa7/0xe0 [ 2694.269426][T14613] ? anon_pipe_buf_release+0x1c6/0x270 [ 2694.274903][T14613] __splice_from_pipe+0x397/0x7d0 [ 2694.279941][T14613] ? direct_splice_actor+0x190/0x190 [ 2694.285246][T14613] ? direct_splice_actor+0x190/0x190 [ 2694.290551][T14613] splice_from_pipe+0x108/0x170 [ 2694.295422][T14613] ? splice_shrink_spd+0xd0/0xd0 [ 2694.300381][T14613] ? apparmor_file_permission+0x25/0x30 [ 2694.305946][T14613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2694.312199][T14613] ? security_file_permission+0x8f/0x380 [ 2694.317846][T14613] generic_splice_sendpage+0x3c/0x50 [ 2694.323157][T14613] ? splice_from_pipe+0x170/0x170 [ 2694.328363][T14613] do_splice+0x708/0x1410 [ 2694.332708][T14613] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2694.337844][T14613] ? __fget_light+0x1a9/0x230 [ 2694.342527][T14613] __x64_sys_splice+0x2c6/0x330 [ 2694.347393][T14613] do_syscall_64+0xfa/0x760 [ 2694.351913][T14613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2694.357806][T14613] RIP: 0033:0x459f49 [ 2694.361716][T14613] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2694.381852][T14613] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2694.390276][T14613] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 23:32:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x2011, r0, 0x0) mmap(&(0x7f0000196000/0x4000)=nil, 0xc07000, 0xffffffffefffffff, 0x8032, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc020662a, &(0x7f00000000c0)={0x4000000, r2, 0x1800}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000040)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f0000000140)=0xe8) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r4, &(0x7f0000002780), 0x400004d, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200400}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="ce99f54b92ec703b2489c80000001e0003042cef6e00fee156036e29be778d000b00", @ANYRES32=r3, @ANYBLOB="62232205593647f6d8669f047476edae50eaf7203f41b95bc41cc995ad48551c9ae2646d93b187e0de5e7a29b7f1538d87febdee3ca704391691c88f58005600be787da745cb405a72c21aefed793861092271ff1d43fd03b1008d5276b3d35c5ada2cd93cf442f810e2706d974b174a11dbb1ddbb16e4668eb1bcec0dfab09e2f050cb972068fda23698ecba22d9a3d937b00000c006d00060000000000000008007300", @ANYRES32=r5], 0xc8}, 0x1, 0x0, 0x0, 0x1010}, 0x41040) [ 2694.398256][T14613] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2694.406238][T14613] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2694.414218][T14613] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2694.422197][T14613] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:32:52 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x0, 0x0) r5 = socket$inet(0x10, 0x0, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00'], 0x1) write$binfmt_script(r1, &(0x7f0000000400)={'#! ', './file0'}, 0xfffffeda) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000003}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x80000000, 0x4) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x114, 0x0, 0x80, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3289}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfe}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1f}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7fff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x80000000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffff147}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x80}, 0x8004) 23:32:52 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc020662a, &(0x7f00000000c0)={0x4000000, r5, 0x1800}) epoll_pwait(r5, &(0x7f00000000c0)=[{}, {}, {}], 0x3, 0x3, &(0x7f0000000100), 0x8) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r6, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:52 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xf0ffffff) 23:32:52 executing program 2 (fault-call:10 fault-nth:40): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:52 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r6, &(0x7f00000003c0)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r6, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000705375aa3950000008000000000", @ANYRES32=r8, @ANYBLOB="00000000ffffffff00000000090001006866736300000000fbff020000000000"], 0x38}}, 0x0) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000300)={@mcast2, r8}, 0x14) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f00000000c0)={'TPROXY\x00'}, &(0x7f0000000100)=0x1e) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f0000000240)=""/89, &(0x7f00000002c0)=0x59) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2699.589861][T14650] FAULT_INJECTION: forcing a failure. [ 2699.589861][T14650] name failslab, interval 1, probability 0, space 0, times 0 [ 2699.603426][T14650] CPU: 0 PID: 14650 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2699.611345][T14650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2699.621414][T14650] Call Trace: [ 2699.624740][T14650] dump_stack+0x172/0x1f0 [ 2699.629183][T14650] should_fail.cold+0xa/0x15 [ 2699.633804][T14650] ? fault_create_debugfs_attr+0x180/0x180 [ 2699.639720][T14650] ? ___might_sleep+0x163/0x2c0 [ 2699.644592][T14650] __should_failslab+0x121/0x190 [ 2699.649549][T14650] should_failslab+0x9/0x14 [ 2699.654058][T14650] __kmalloc+0x2e0/0x770 [ 2699.658309][T14650] ? __local_bh_enable_ip+0x15a/0x270 [ 2699.663687][T14650] ? lock_sock_nested+0xe2/0x120 [ 2699.668637][T14650] ? __local_bh_enable_ip+0x15a/0x270 [ 2699.674018][T14650] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2699.679316][T14650] ? lock_sock_nested+0x9a/0x120 [ 2699.684265][T14650] ? sock_kmalloc+0xc6/0x120 [ 2699.688872][T14650] sock_kmalloc+0xc6/0x120 [ 2699.693317][T14650] hash_alloc_result.part.0+0x95/0x110 [ 2699.698795][T14650] hash_sendpage+0x7a7/0x9d0 [ 2699.703415][T14650] hash_sendpage_nokey+0x94/0xa0 [ 2699.708372][T14650] kernel_sendpage+0x92/0xf0 [ 2699.712970][T14650] ? hash_check_key.isra.0+0x230/0x230 [ 2699.718440][T14650] sock_sendpage+0x8b/0xc0 [ 2699.722967][T14650] pipe_to_sendpage+0x296/0x360 [ 2699.727832][T14650] ? kernel_sendpage+0xf0/0xf0 [ 2699.732609][T14650] ? direct_splice_actor+0x190/0x190 [ 2699.737905][T14650] ? __put_page+0xa7/0xe0 [ 2699.742242][T14650] ? anon_pipe_buf_release+0x1c6/0x270 [ 2699.747710][T14650] __splice_from_pipe+0x397/0x7d0 [ 2699.752744][T14650] ? direct_splice_actor+0x190/0x190 [ 2699.758049][T14650] ? direct_splice_actor+0x190/0x190 [ 2699.763339][T14650] splice_from_pipe+0x108/0x170 [ 2699.768201][T14650] ? splice_shrink_spd+0xd0/0xd0 [ 2699.773150][T14650] ? apparmor_file_permission+0x25/0x30 [ 2699.778705][T14650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2699.784959][T14650] ? security_file_permission+0x8f/0x380 [ 2699.790610][T14650] generic_splice_sendpage+0x3c/0x50 [ 2699.795906][T14650] ? splice_from_pipe+0x170/0x170 [ 2699.800939][T14650] do_splice+0x708/0x1410 [ 2699.805289][T14650] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2699.810404][T14650] ? __fget_light+0x1a9/0x230 [ 2699.815086][T14650] __x64_sys_splice+0x2c6/0x330 [ 2699.819949][T14650] do_syscall_64+0xfa/0x760 [ 2699.824460][T14650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2699.830352][T14650] RIP: 0033:0x459f49 [ 2699.834252][T14650] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2699.854290][T14650] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2699.862704][T14650] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2699.870772][T14650] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2699.878758][T14650] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 23:32:52 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") shutdown(r0, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x100000000000012) r2 = accept(r1, &(0x7f0000001240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f00000012c0)=0x80) accept4$nfc_llcp(r2, &(0x7f0000001300), &(0x7f0000001380)=0x60, 0x0) clock_gettime(0x0, &(0x7f00000011c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000013c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/230, 0xe6}, {&(0x7f0000000340)=""/184, 0xb8}, {&(0x7f0000000000)=""/47, 0x2f}, {&(0x7f0000000400)=""/131, 0x83}], 0x4, &(0x7f0000000280)=""/40, 0x28}, 0x3}, {{&(0x7f00000004c0)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000540)=""/219, 0xdb}], 0x1}, 0xc56c}, {{&(0x7f0000000640)=@tipc, 0x80, &(0x7f0000000700)=[{&(0x7f00000006c0)=""/22, 0x16}], 0x1, &(0x7f0000000740)=""/76, 0x4c}, 0x2}, {{&(0x7f00000007c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000840)=""/131, 0x83}], 0x1, &(0x7f0000000940)=""/178, 0xb2}}, {{&(0x7f0000000a00)=@can, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000a80)=""/236, 0xec}, {&(0x7f0000000b80)=""/208, 0xd0}], 0x2, &(0x7f0000000cc0)=""/44, 0x2c}, 0x8}, {{&(0x7f0000000d00)=@hci, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000d80)=""/182, 0xb6}, {&(0x7f0000000e40)=""/232, 0xe8}, {&(0x7f0000000f40)=""/35, 0x23}], 0x3, &(0x7f0000000fc0)=""/115, 0x73}, 0x1}], 0x400000000000065, 0x0, &(0x7f0000001200)={r3, r4+10000000}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000140)=[@in={0x2, 0x4e23, @loopback=0xac1414e0}]}, &(0x7f0000000080)=0x10) [ 2699.886744][T14650] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2699.894728][T14650] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:32:52 executing program 3: r0 = socket$kcm(0x10, 0x3, 0x0) r1 = socket(0x8, 0x4, 0xff) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="2e0000004e0081627e0100c2c5f35abb235382d4b78b11593789a95d2431bd19b48407e4050cecdb4cb9040725de", 0x2e}], 0x1}, 0x0) 23:32:52 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00f1") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:52 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) sendto(r0, &(0x7f00000002c0)="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", 0x1000, 0xf4661b2580dc88dd, &(0x7f00000012c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc020662a, &(0x7f00000000c0)={0x4000000, r2, 0x1800}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) 23:32:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) getpid() ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc020662a, &(0x7f00000000c0)={0x4000000, r3, 0x1800}) r4 = accept4$alg(r3, 0x0, 0x0, 0x100800) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f00000000c0)='teF>\x0e+u]\xa4\xf4~i\xd6\x99\t\x9e', 0x10) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000140)={0x1}, 0x2ce) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080), 0x4) close(r1) 23:32:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) socketpair$tipc(0x1e, 0x652c646f5ffa0be7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f00000001c0)={'nlmon0\x00', 0x3f}) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="e3"], 0x1}}, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCINQ(r5, 0x541b, &(0x7f00000000c0)) socket$inet(0x10, 0x3, 0x0) bind$inet(r2, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x90) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000180)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r6, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) shutdown(r2, 0x0) ioctl$FS_IOC_RESVSP(r7, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xae15, 0xd8a}) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000080)=0x9) write$cgroup_pid(r7, &(0x7f0000000000), 0xfffffea6) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 23:32:58 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x0, 0x0) r5 = socket$inet(0x10, 0x0, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:58 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xffffff8d) 23:32:58 executing program 2 (fault-call:10 fault-nth:41): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:58 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_dccp(0x2, 0x6, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r0, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, &(0x7f00000000c0)=[0x3], 0x2) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r4, &(0x7f0000002780), 0x400004d, 0x0) r5 = epoll_create(0x84) splice(r5, 0x0, r2, 0x0, 0xfffffffffffffffc, 0x4) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r6, &(0x7f0000002780), 0x400004d, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r6, 0x6, 0x2, &(0x7f0000000100)={0xfffd, 0x0, 0x6, 0x3}, 0x6) 23:32:58 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) bind$isdn_base(0xffffffffffffffff, &(0x7f00000000c0)={0x22, 0x40, 0x7, 0x7, 0x3}, 0x6) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5d}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e22, 0x7, @remote, 0x3}, @in={0x2, 0x4e22, @loopback}], 0x78) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r5, &(0x7f00000003c0)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r5, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x2d, &(0x7f0000000300)={0x1, {{0xa, 0x4e24, 0x401, @rand_addr="e94494c79a46f679b7f9d372c9ebd6cb", 0x4}}}, 0x88) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000705000000000000008000000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff00000000090001006866736300000000fbff020000000000"], 0x38}}, 0x0) bind$bt_hci(r1, &(0x7f0000000100)={0x1f, r7, 0x3}, 0xc) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:58 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b00f1") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2706.044565][T14707] FAULT_INJECTION: forcing a failure. [ 2706.044565][T14707] name failslab, interval 1, probability 0, space 0, times 0 [ 2706.057684][T14707] CPU: 1 PID: 14707 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2706.065580][T14707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2706.075642][T14707] Call Trace: [ 2706.078956][T14707] dump_stack+0x172/0x1f0 [ 2706.083300][T14707] should_fail.cold+0xa/0x15 [ 2706.087900][T14707] ? fault_create_debugfs_attr+0x180/0x180 [ 2706.093721][T14707] ? ___might_sleep+0x163/0x2c0 [ 2706.098587][T14707] __should_failslab+0x121/0x190 [ 2706.103533][T14707] should_failslab+0x9/0x14 [ 2706.108049][T14707] __kmalloc+0x2e0/0x770 [ 2706.112297][T14707] ? __local_bh_enable_ip+0x15a/0x270 [ 2706.117673][T14707] ? lock_sock_nested+0xe2/0x120 [ 2706.122613][T14707] ? __local_bh_enable_ip+0x15a/0x270 [ 2706.127995][T14707] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2706.133284][T14707] ? lock_sock_nested+0x9a/0x120 [ 2706.138225][T14707] ? sock_kmalloc+0xc6/0x120 [ 2706.142821][T14707] sock_kmalloc+0xc6/0x120 [ 2706.147250][T14707] hash_alloc_result.part.0+0x95/0x110 [ 2706.152714][T14707] hash_sendpage+0x7a7/0x9d0 [ 2706.157318][T14707] hash_sendpage_nokey+0x94/0xa0 [ 2706.162263][T14707] kernel_sendpage+0x92/0xf0 [ 2706.166857][T14707] ? hash_check_key.isra.0+0x230/0x230 [ 2706.172323][T14707] sock_sendpage+0x8b/0xc0 [ 2706.176752][T14707] pipe_to_sendpage+0x296/0x360 [ 2706.181613][T14707] ? kernel_sendpage+0xf0/0xf0 [ 2706.186391][T14707] ? direct_splice_actor+0x190/0x190 [ 2706.191685][T14707] ? __put_page+0xa7/0xe0 [ 2706.196028][T14707] ? anon_pipe_buf_release+0x1c6/0x270 [ 2706.201495][T14707] __splice_from_pipe+0x397/0x7d0 [ 2706.206530][T14707] ? direct_splice_actor+0x190/0x190 [ 2706.211829][T14707] ? direct_splice_actor+0x190/0x190 [ 2706.217118][T14707] splice_from_pipe+0x108/0x170 [ 2706.221978][T14707] ? splice_shrink_spd+0xd0/0xd0 [ 2706.226926][T14707] ? apparmor_file_permission+0x25/0x30 [ 2706.232477][T14707] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2706.238724][T14707] ? security_file_permission+0x8f/0x380 [ 2706.244366][T14707] generic_splice_sendpage+0x3c/0x50 [ 2706.249654][T14707] ? splice_from_pipe+0x170/0x170 [ 2706.254688][T14707] do_splice+0x708/0x1410 [ 2706.259063][T14707] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2706.264180][T14707] ? __fget_light+0x1a9/0x230 [ 2706.268872][T14707] __x64_sys_splice+0x2c6/0x330 [ 2706.273739][T14707] do_syscall_64+0xfa/0x760 [ 2706.278254][T14707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2706.284138][T14707] RIP: 0033:0x459f49 [ 2706.288034][T14707] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2706.307626][T14707] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2706.316065][T14707] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2706.324033][T14707] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2706.331994][T14707] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 23:32:58 executing program 3: r0 = socket(0x22, 0x2, 0x4) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x716000, 0x4) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000540)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xc5a, @bcast, @rose={'rose', 0x0}, 0x3, [@null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x400, &(0x7f0000000300)="0adc1f123c123f319bd070") r3 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$vsock_dgram(0x28, 0x2, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000040)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$cgroup_ro(r5, &(0x7f0000000280)='io=stat\x00\x02\xdf7e\x88\xa7\xc4\xd94\xf5Se\x14q|\xde\x85\x9e\xae\x92G\xaa\x8ed\xfd\x06\xc5\xaf\x14\xce\xe5\x18\xda\xcd\xf3\x85\xcfw6\xe4\x06O\xea\xf0!\xa6G\xearw\xfc\xa3D\x86\xe5\x13,\x85T\x80\xf3U\xa0\x97M\x9e\x80y\x88\x06\xfdZ0w', 0x0, 0x0) r6 = openat$cgroup_ro(r4, 0x0, 0x7a05, 0x1700) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r6, 0x111, 0x4, 0x0, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r7 = socket(0x42000000015, 0x805, 0x0) getsockopt(r7, 0x114, 0x2713, &(0x7f0000af0fe7)=""/13, &(0x7f0000000000)=0x1a) socket$rxrpc(0x21, 0x2, 0x2) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') connect$ax25(r6, &(0x7f0000000440)={{0x3, @null, 0x5}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) ioctl(0xffffffffffffffff, 0x8912, 0x0) r8 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r7, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)={0x1c, r8, 0x100, 0x70bd27}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x40) ioctl$SIOCSIFMTU(r6, 0x8922, &(0x7f00000000c0)={'veth1_to_bridge\x00'}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000f68000)={@remote, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd, 0x5, 0x0, 0x3ff}, 0x20) syz_emit_ethernet(0xfffffffffffffd0d, &(0x7f0000000040)=ANY=[@ANYBLOB="ff00452000300000000000009078ac2314bbb4d8d1261bac141400030590780000000045ac1414000064a6cb730000000000"], 0x0) unshare(0x4a000000) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x15b) ioctl$sock_SIOCADDDLCI(r2, 0x8980, &(0x7f0000000180)={'nr0\x00', 0x3}) socket$inet6(0xa, 0x0, 0x0) r9 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r9, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x218fe53f1794f59, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r9, 0x84, 0x2, &(0x7f0000000080)={0x0, 0xc, 0x3, 0x7f}, 0x8) r10 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r10, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=@ethtool_test={0x1a, 0x0, 0x0, 0x20000232}}) sendfile(r3, r3, &(0x7f0000000000)=0x2000, 0x100000010a000202) [ 2706.340132][T14707] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2706.348101][T14707] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2706.508994][T14712] IPVS: ftp: loaded support on port[0] = 21 23:32:59 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000240)="ae4cdda9cf96e2a5d02f3ed68b008b43f3beca29015624195b32957bb9af68c45201ef17129a23cc5a45dd7db47e9573290d2d09688f50d596b37cbe55a2a7f6428bbca3e91c10e569c62d553a368eea1f97f470d0bb3e65a9642e1155de8dfd94cd2594e1ea8efa52b803d4d9be63c9f1452c419bd588ac3d99a2b6d64dcd112e3f289ca23337f28b52", 0x8a}, {&(0x7f0000000300)="b668245c55c414385ff96708fbd54a0711c6a9f5672414cbfc43597603b3851dbe2d482a89fdb9f621030b65b216239332ffe67012b03e51537a05b82acbf33c1cfb8fd7a4f78cfff6ce6d2a72fe4caab25df9b0a26db0c45916c17bf58e48e1f42c50f369d77b11a161edda3d0273dafdea337048bea3fea51135da4f6af6c7ceb445bf5200ba6eec5349747919395ca3f3a52c873a1925ca5a615a13d94d9920f93bb7be5130c11b99753e1ce9b2c5aaf0e57ad9f5f8779861b131d315993da008ddbc73229cc48be3af3858f172c714", 0xd1}, {&(0x7f00000000c0)="67cf3e6f42eb38de45245b7b4eac79afbdbaa25b9ac6fda99b6c469d281fdf4fa1eac0609b9866ced7adbb92616a02caee42152441b5538db3e9eeca96b4143ffe778a278a980506d34e6fe5c38cc3752ebaf0e8", 0x54}, {&(0x7f0000000400)="729ab46641cac6c92e0e329b4a5687956eaddf2b7a999b", 0x30}, {&(0x7f0000000480)="258b10c795f10778ccafd8f39ab618123ba53285574f315bbfa5b8547a0d3dff8c47668f27689444c5a3112e04958d9ca5af07ee6f24a73113ff2acf305e6836d63966a4be190ad8d218b64c708f29c2c0a23303866bb41b62a5fa527744f1ac52d5d0148de784e1da476c", 0x6b}, {&(0x7f0000000500)="0a24efeffb2493812f0c64769b140ea516fc14dd7d177e4da7295f1ea5742bb72a991df232a631b3df762e7d73525878b11e91d194945c476a73c0de0ae412ff7a9ed5cd3c7f672142871820c5329b48ec7dab524fb1712e1a4b96025e3957ad8d87912b3135261e1aba0923255981d4ac346f474566ef416934e5a34d73c021919ac39cdb775ea0cf766e8d24a494b80e5b4fcd71d202c52e1064b57948abc9fe8208c7bf48ba2043ff759e664018f70cdd2674042ced604b06a6c7b67ffe707461145744a9e89e6b47cae3623f762f1e8b559bd00afad5d7be54a63229b5a1701975288de0aa7643", 0xe9}, {&(0x7f0000000600)="34b2dc4834214fc0990271b1deb268", 0xf}], 0x7}, 0x20000000) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:59 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xfffffff0) 23:32:59 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r5, &(0x7f0000000000), 0xfffffea6) accept4$alg(r5, 0x0, 0x0, 0x80000) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:32:59 executing program 2 (fault-call:10 fault-nth:42): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2706.980741][T14731] FAULT_INJECTION: forcing a failure. [ 2706.980741][T14731] name failslab, interval 1, probability 0, space 0, times 0 [ 2706.993623][T14731] CPU: 1 PID: 14731 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2707.001521][T14731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2707.011581][T14731] Call Trace: [ 2707.014880][T14731] dump_stack+0x172/0x1f0 [ 2707.019221][T14731] should_fail.cold+0xa/0x15 [ 2707.023853][T14731] ? fault_create_debugfs_attr+0x180/0x180 [ 2707.029672][T14731] ? ___might_sleep+0x163/0x2c0 [ 2707.034532][T14731] __should_failslab+0x121/0x190 [ 2707.039480][T14731] should_failslab+0x9/0x14 [ 2707.043986][T14731] __kmalloc+0x2e0/0x770 [ 2707.048231][T14731] ? __local_bh_enable_ip+0x15a/0x270 [ 2707.053608][T14731] ? lock_sock_nested+0xe2/0x120 [ 2707.058548][T14731] ? __local_bh_enable_ip+0x15a/0x270 [ 2707.063925][T14731] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2707.069223][T14731] ? lock_sock_nested+0x9a/0x120 [ 2707.074166][T14731] ? sock_kmalloc+0xc6/0x120 [ 2707.078853][T14731] sock_kmalloc+0xc6/0x120 [ 2707.083281][T14731] hash_alloc_result.part.0+0x95/0x110 [ 2707.088747][T14731] hash_sendpage+0x7a7/0x9d0 [ 2707.093347][T14731] hash_sendpage_nokey+0x94/0xa0 [ 2707.098296][T14731] kernel_sendpage+0x92/0xf0 [ 2707.102891][T14731] ? hash_check_key.isra.0+0x230/0x230 [ 2707.108355][T14731] sock_sendpage+0x8b/0xc0 [ 2707.112780][T14731] pipe_to_sendpage+0x296/0x360 [ 2707.117636][T14731] ? kernel_sendpage+0xf0/0xf0 [ 2707.122405][T14731] ? direct_splice_actor+0x190/0x190 [ 2707.127696][T14731] ? __put_page+0xa7/0xe0 [ 2707.132031][T14731] ? anon_pipe_buf_release+0x1c6/0x270 [ 2707.137504][T14731] __splice_from_pipe+0x397/0x7d0 [ 2707.142533][T14731] ? direct_splice_actor+0x190/0x190 [ 2707.147835][T14731] ? direct_splice_actor+0x190/0x190 [ 2707.153125][T14731] splice_from_pipe+0x108/0x170 [ 2707.157984][T14731] ? splice_shrink_spd+0xd0/0xd0 [ 2707.162930][T14731] ? apparmor_file_permission+0x25/0x30 [ 2707.168486][T14731] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2707.174734][T14731] ? security_file_permission+0x8f/0x380 [ 2707.180372][T14731] generic_splice_sendpage+0x3c/0x50 [ 2707.185669][T14731] ? splice_from_pipe+0x170/0x170 [ 2707.190696][T14731] do_splice+0x708/0x1410 [ 2707.195040][T14731] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2707.200153][T14731] ? __fget_light+0x1a9/0x230 [ 2707.204838][T14731] __x64_sys_splice+0x2c6/0x330 [ 2707.209704][T14731] do_syscall_64+0xfa/0x760 [ 2707.214205][T14731] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2707.220076][T14731] RIP: 0033:0x459f49 [ 2707.223947][T14731] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2707.243550][T14731] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2707.251967][T14731] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2707.259945][T14731] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2707.267922][T14731] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2707.275904][T14731] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2707.283869][T14731] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:32:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = accept$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, &(0x7f0000000140)=0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180)={0x3f, 0x81, 0x9, 0xbd, 0x1, 0x3f, 0x8, 0x40, 0x40, 0x0, 0x4}, 0xb) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r5, 0x0, 0xa, 0x0, 0x0) r6 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x14, r6, 0x101}, 0x14}}, 0x0) sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200880}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r6, 0x408, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfff8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x30}}, 0x4000) sendto$inet(r5, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r7 = socket(0x40000000015, 0x5, 0x0) ioctl(r7, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 23:33:05 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x0, 0x0) r5 = socket$inet(0x10, 0x0, 0x0) sendmsg(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:05 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) setsockopt$RXRPC_SECURITY_KEY(0xffffffffffffffff, 0x110, 0x1, &(0x7f00000000c0)='hash\x00', 0x5) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:05 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) 23:33:05 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x100000000000000) 23:33:05 executing program 2 (fault-call:10 fault-nth:43): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f00000000c0)=0x5, 0x4) socketpair(0xa, 0x3, 0x81, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="eefffffff47d3e05d3442919f88a99bb8a388a6c603ca980c09f256b5bb970ccc0b7ffc1cd81755bf0a15c937af19a1952c2c1eb71c54f5db23441038d8806b1cf90441ef43eedd6e4191142dcb6c9d356258bf2e8ca9f54756ba52dd30e421c0fda65a7983478523129c7a02467cf6f9250c2c55678cdc47a63a777da2577c151c300"/145, @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3}, &(0x7f0000000140)=0x8) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r4, &(0x7f0000002780), 0x400004d, 0x0) getsockname(r4, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000000200)=0x80) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f0000000240), &(0x7f0000000280)=0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={r3, 0x1ff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={r6, 0x3}, 0x8) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) [ 2713.133673][T14763] FAULT_INJECTION: forcing a failure. [ 2713.133673][T14763] name failslab, interval 1, probability 0, space 0, times 0 [ 2713.159806][T14763] CPU: 1 PID: 14763 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2713.167736][T14763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2713.177797][T14763] Call Trace: [ 2713.181105][T14763] dump_stack+0x172/0x1f0 [ 2713.185449][T14763] should_fail.cold+0xa/0x15 [ 2713.190045][T14763] ? fault_create_debugfs_attr+0x180/0x180 [ 2713.195866][T14763] ? ___might_sleep+0x163/0x2c0 [ 2713.200731][T14763] __should_failslab+0x121/0x190 [ 2713.205677][T14763] should_failslab+0x9/0x14 [ 2713.210185][T14763] __kmalloc+0x2e0/0x770 [ 2713.214434][T14763] ? __local_bh_enable_ip+0x15a/0x270 [ 2713.219813][T14763] ? lock_sock_nested+0xe2/0x120 [ 2713.224753][T14763] ? __local_bh_enable_ip+0x15a/0x270 [ 2713.230131][T14763] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2713.235423][T14763] ? lock_sock_nested+0x9a/0x120 [ 2713.240365][T14763] ? sock_kmalloc+0xc6/0x120 [ 2713.244972][T14763] sock_kmalloc+0xc6/0x120 [ 2713.249489][T14763] hash_alloc_result.part.0+0x95/0x110 [ 2713.254957][T14763] hash_sendpage+0x7a7/0x9d0 [ 2713.259564][T14763] hash_sendpage_nokey+0x94/0xa0 [ 2713.264508][T14763] kernel_sendpage+0x92/0xf0 [ 2713.269103][T14763] ? hash_check_key.isra.0+0x230/0x230 [ 2713.274574][T14763] sock_sendpage+0x8b/0xc0 [ 2713.279004][T14763] pipe_to_sendpage+0x296/0x360 [ 2713.283863][T14763] ? kernel_sendpage+0xf0/0xf0 [ 2713.288641][T14763] ? direct_splice_actor+0x190/0x190 [ 2713.293933][T14763] ? __put_page+0xa7/0xe0 [ 2713.298269][T14763] ? anon_pipe_buf_release+0x1c6/0x270 [ 2713.303740][T14763] __splice_from_pipe+0x397/0x7d0 [ 2713.308774][T14763] ? direct_splice_actor+0x190/0x190 [ 2713.314076][T14763] ? direct_splice_actor+0x190/0x190 [ 2713.319372][T14763] splice_from_pipe+0x108/0x170 [ 2713.324224][T14763] ? splice_shrink_spd+0xd0/0xd0 [ 2713.329167][T14763] ? apparmor_file_permission+0x25/0x30 [ 2713.334742][T14763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2713.340980][T14763] ? security_file_permission+0x8f/0x380 [ 2713.346611][T14763] generic_splice_sendpage+0x3c/0x50 [ 2713.351878][T14763] ? splice_from_pipe+0x170/0x170 [ 2713.356884][T14763] do_splice+0x708/0x1410 [ 2713.361199][T14763] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2713.366295][T14763] ? __fget_light+0x1a9/0x230 [ 2713.370969][T14763] __x64_sys_splice+0x2c6/0x330 [ 2713.375835][T14763] do_syscall_64+0xfa/0x760 [ 2713.380346][T14763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2713.386238][T14763] RIP: 0033:0x459f49 [ 2713.390130][T14763] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2713.409737][T14763] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2713.418159][T14763] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2713.426145][T14763] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2713.434132][T14763] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2713.442119][T14763] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2713.450107][T14763] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:33:06 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x1000) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) r5 = socket$bt_rfcomm(0x1f, 0x1, 0x3) r6 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r6, 0x8927, &(0x7f0000000080)={'ip_vti0:\x00', @ifru_flags}) r7 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f0000000000)=0x0) bind$llc(r7, &(0x7f0000000180)={0x1a, 0x10f, 0x1f, 0xfc, 0x0, 0x0, @random="48d9e6aa3026"}, 0x10) ioctl$int_in(r7, 0x100000000005452, &(0x7f0000000080)=0x9) connect$llc(r7, &(0x7f0000000100)={0x1a, 0x0, 0x84, 0xff, 0x0, 0xff, @link_local}, 0xd) sendmmsg(r7, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) recvmmsg(r7, &(0x7f00000005c0), 0x2d4, 0x20, 0x0) r9 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r9, 0x8904, &(0x7f0000000000)) r10 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r10, 0x8904, &(0x7f0000000000)=0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={r11}, 0xc) r12 = socket$nl_generic(0x10, 0x3, 0x10) r13 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r12, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c0083d0", @ANYRES16=r13, @ANYBLOB="21002000000000000000022406eb612ebe9e8540"], 0x1c}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYRES32=r7, @ANYPTR=&(0x7f0000000500)=ANY=[@ANYRES64=r7, @ANYRES16=r8, @ANYRESHEX=r9, @ANYRESDEC, @ANYRESDEC=r8, @ANYRES64=r13, @ANYRESOCT, @ANYRESDEC=r8], @ANYRESDEC=r11, @ANYRESHEX=r8, @ANYRES32], &(0x7f0000000100)=0x5) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x80000) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r14, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r14, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r14, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xffffffffffffffc3) r16 = getgid() setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0, r16}, 0xc) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000001800)={r8, r15, r16}, 0xc) r17 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r18 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r17, 0xc020662a, &(0x7f00000000c0)={0x4000000, r18, 0x1800}) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x6, &(0x7f0000000300)=ANY=[@ANYBLOB="bf160000000000001675fa31adad434b1e26f09f5f31b7070000010000004870000000000000bc700000000000009500090000000000"], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x3}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r19, 0x41f, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r20}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r17, 0x0, 0x16, &(0x7f00000000c0)='\'wlan1vmnet1vmnet0-\\!\x00', r20}, 0x30) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:06 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x295471bb24a2ad2) 23:33:06 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0xfffffd56) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r5, &(0x7f0000002780), 0x400004d, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000280)={r5}) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r7, &(0x7f00000003c0)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r7, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000705000000000000008000000000", @ANYRES32=r9, @ANYBLOB="00000000ffffffff00000000090001006866736300000000fbff020000000000"], 0x38}}, 0x0) setsockopt$packet_drop_memb(r6, 0x107, 0x2, &(0x7f00000002c0)={r9, 0x1, 0x6, @dev={[], 0x10}}, 0x10) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) getpeername$netrom(r2, &(0x7f00000000c0)={{0x3, @netrom}, [@bcast, @remote, @bcast, @netrom, @netrom, @default, @bcast, @netrom]}, &(0x7f0000000240)=0x48) 23:33:06 executing program 2 (fault-call:10 fault-nth:44): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:06 executing program 3: r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x4e20, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}}, 0x0, 0x7f, 0x0, "efd06e06e7d22ba6843eeecc2c79769df1d19701400e8a2b5ed90095a68607790fae1e808c9589d5636f52ea2ec5052209521bd259bf881f16365cf8402b7de188e285ad60308c48bbd0556268fb2758"}, 0xd8) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0xfffc, @broadcast}, 0x378491b4) sendmsg$rds(r1, &(0x7f0000001c80)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000340), 0x48, 0x4008004}, 0x0) 23:33:06 executing program 3: r0 = socket(0x10, 0x800000000080002, 0x10) r1 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES64=r1], 0x1}, 0x1, 0x0, 0x0, 0x4004}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r2, 0x1000008914, &(0x7f0000000180)="0800b5055e0bcfe87b00714dfee0ece7ccc573dac60afb5ce6a0b618102ab52aed9fe17ee8a1971ad2c3476c0fa9e91d6c80105068fe2087ab7cda166ca46fade0ecb561ad96b16d1dfd112a5892a05a6de80f4bd51c6bcd4ab1a9ecfd21d07c8d68bbf36c89178fa5019338b6b77b0355cb94a397c66cc8b3854b0c70ac42966a5e75") sendmmsg$alg(r0, &(0x7f0000000140), 0x49249249249266b, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc020662a, &(0x7f00000000c0)={0x4000000, r4, 0x1800}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc020662a, &(0x7f00000000c0)={0x4000000, r6, 0x1800}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0xff22}, &(0x7f00000000c0)=0x8) socketpair(0x9, 0x4, 0x81, &(0x7f0000000380)) bind$netlink(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfd, 0x224020}, 0x21a11be1696338b9) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r8, &(0x7f0000002780), 0x400004d, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r8, 0xc0046686, &(0x7f00000002c0)={0x5, 0xa3, "0372e64f3ce095fbb6c5c727681ea7dd4accb17de34a014e56887b9a2c4a5c72c1f442d94011c9ae94fec1e3bcb3a95a40945532977a752cfd7d4e727378fbb64b02c3728575989dbfc9525fe6e4cf8a0046f44f776037bb98ee5316f25793d6e7ed0959b5d2e1928e1dfe5240604561f3016561924eaabb8f1b03b5116aa986927b48900caac969edb4354ce9b719bc609e66a033b9bf6a9346657e1d571a28a6d12e"}) getsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000100)={r7, 0x4, 0x8}, &(0x7f0000000240)=0x10) [ 2714.014045][T14784] FAULT_INJECTION: forcing a failure. [ 2714.014045][T14784] name failslab, interval 1, probability 0, space 0, times 0 [ 2714.061370][T14784] CPU: 0 PID: 14784 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2714.069301][T14784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2714.079359][T14784] Call Trace: [ 2714.082659][T14784] dump_stack+0x172/0x1f0 [ 2714.087010][T14784] should_fail.cold+0xa/0x15 [ 2714.091633][T14784] ? fault_create_debugfs_attr+0x180/0x180 [ 2714.097455][T14784] ? ___might_sleep+0x163/0x2c0 [ 2714.102321][T14784] __should_failslab+0x121/0x190 [ 2714.107264][T14784] should_failslab+0x9/0x14 [ 2714.111767][T14784] __kmalloc+0x2e0/0x770 [ 2714.116128][T14784] ? __local_bh_enable_ip+0x15a/0x270 [ 2714.121501][T14784] ? lock_sock_nested+0xe2/0x120 [ 2714.126443][T14784] ? __local_bh_enable_ip+0x15a/0x270 [ 2714.131828][T14784] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2714.137118][T14784] ? lock_sock_nested+0x9a/0x120 [ 2714.142061][T14784] ? sock_kmalloc+0xc6/0x120 [ 2714.146662][T14784] sock_kmalloc+0xc6/0x120 [ 2714.151090][T14784] hash_alloc_result.part.0+0x95/0x110 [ 2714.156558][T14784] hash_sendpage+0x7a7/0x9d0 [ 2714.161166][T14784] hash_sendpage_nokey+0x94/0xa0 [ 2714.166116][T14784] kernel_sendpage+0x92/0xf0 [ 2714.170715][T14784] ? hash_check_key.isra.0+0x230/0x230 [ 2714.176189][T14784] sock_sendpage+0x8b/0xc0 [ 2714.180618][T14784] pipe_to_sendpage+0x296/0x360 [ 2714.185477][T14784] ? kernel_sendpage+0xf0/0xf0 [ 2714.190251][T14784] ? direct_splice_actor+0x190/0x190 [ 2714.195556][T14784] ? __put_page+0xa7/0xe0 [ 2714.199921][T14784] ? anon_pipe_buf_release+0x1c6/0x270 [ 2714.205391][T14784] __splice_from_pipe+0x397/0x7d0 [ 2714.210422][T14784] ? direct_splice_actor+0x190/0x190 [ 2714.215815][T14784] ? direct_splice_actor+0x190/0x190 [ 2714.221112][T14784] splice_from_pipe+0x108/0x170 [ 2714.225981][T14784] ? splice_shrink_spd+0xd0/0xd0 [ 2714.230940][T14784] ? apparmor_file_permission+0x25/0x30 [ 2714.236498][T14784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2714.242812][T14784] ? security_file_permission+0x8f/0x380 [ 2714.248462][T14784] generic_splice_sendpage+0x3c/0x50 [ 2714.253760][T14784] ? splice_from_pipe+0x170/0x170 [ 2714.258905][T14784] do_splice+0x708/0x1410 [ 2714.263257][T14784] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2714.268382][T14784] ? __fget_light+0x1a9/0x230 [ 2714.273065][T14784] __x64_sys_splice+0x2c6/0x330 [ 2714.277926][T14784] do_syscall_64+0xfa/0x760 [ 2714.282443][T14784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2714.288341][T14784] RIP: 0033:0x459f49 [ 2714.292239][T14784] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2714.311924][T14784] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2714.311940][T14784] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2714.311947][T14784] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2714.311955][T14784] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2714.311970][T14784] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2714.328331][T14784] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:33:11 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x0, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xffd8, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="200000001e00ba57aea115125bb7ad2a1851a16d012000000000000000000a0000004a094b065f6c14fc308cde56df84f500cc9aada5737477af9c658bd8310d9005b24d82b0cdfa9bdb1c97de39634e21a6169813ea40d2a7d8f754d00ee000df235ef0f7a6aaf0fb6b66d5bab8bbefa2"], 0x1c}}, 0x0) r2 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r2, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f00000000c0)={{0x89, @broadcast, 0x4e23, 0x0, 'lblcr\x00', 0x31, 0x0, 0x2a}, {@multicast2, 0x4e24, 0x11006, 0x8, 0x30000000, 0x4}}, 0x44) sendmmsg$alg(r1, &(0x7f0000000140), 0x348, 0x0) 23:33:11 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x6c1826d346ef860) 23:33:11 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc020662a, &(0x7f00000000c0)={0x4000000, r4, 0x1800}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc020662a, &(0x7f00000000c0)={0x4000000, r6, 0x1800}) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000580)=0x83, 0x5e67) recvmmsg(r2, &(0x7f0000002d40)=[{{&(0x7f00000005c0)=@xdp, 0x80, &(0x7f0000000700)=[{&(0x7f0000000640)=""/172, 0xac}], 0x1, &(0x7f0000000740)=""/44, 0x2c}, 0x1ff}, {{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001800)=[{&(0x7f0000000800)=""/4096, 0x1000}], 0x1}, 0x7}, {{0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000001840)=""/246, 0xf6}, {&(0x7f0000001940)=""/20, 0x14}, {&(0x7f0000001980)=""/5, 0x5}], 0x3, &(0x7f0000001a00)=""/188, 0xbc}, 0xfffffff8}, {{&(0x7f0000001ac0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001b40)=""/130, 0x82}, {&(0x7f0000001c00)=""/204, 0xcc}], 0x2, &(0x7f0000001d40)=""/4096, 0x1000}, 0x7}], 0x4, 0x2002, &(0x7f0000002e40)) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r8, 0x84, 0x66, &(0x7f0000000040)={r9}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f0000002e80)={r9, 0x2}, 0x8) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) sendmsg$alg(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000240)="a7ebe3719bd8d601be57156a25cb52be3b761b6af2f8acb632d78246bc5d89df86a0076170bf273fba871319ec6ee754bb466aadbe286b43cfa8a68ad7f3b641db186c09d502704cd04a85d0df671d9c615ae89abd079030aa460f01de186576eeb23815982af23e5e0a8d553ab9cc21f8cc60ae4695fb945019b38ba99cc5c31e41e73b62253ae91978539f0a1fddfe865feb909a22ce6129051cd6b50a6e3381b881785c0a4d6cebf907710a5f4b3e99a1c3979dde1aeb12a3bd6053525295900c14203c7d97b48d3a7be23acebf20585231c7129e8a", 0xd7}, {&(0x7f0000000340)="a6d22e7fd45c808b8e4d56855085acf58c25411edf39ccf6c1378ce686aecb07a465f3c187cb33d135ff9cc2d89397c6f3682852ca8fd55ea7af87cc7d549c79958621c2b051f63cd72c443658a3fd5cbfc959fd23d18c628e9338dba2338c97726ed39826136d3f487132dde6d24961262c58603057c348c0a0abcf9d6dd79bcef45ff74b70d5d141cdb5b67258b5e461180fc5a0fa3fedece1ac304a54d85f3c6d794e6708240e7ca52278fc486094d1e7d79f328ebb0533f14e302451f4d61bf6e4880ed55060fd469a2fb1172834", 0xd0}, {&(0x7f0000000480)="b11299a583211af451c0746739d270c065a3e473b6e3f21b4b44a6fc21e21079e7e0a6b3ae0535012692d0d3b40d26ec5ab8288872383eefc134410ae371a2fc38848465b7d402278ab67f658e5d6426e0eed21db6a2625dc68f1caaeb9d", 0x5e}], 0x3, 0x0, 0x0, 0x20040}, 0x800) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) connect$netrom(r0, &(0x7f00000000c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null]}, 0x48) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r10, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000001, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r11, &(0x7f0000000000), 0xfffffea6) setsockopt$XDP_RX_RING(r11, 0x11b, 0x2, &(0x7f0000002ec0)=0x8000, 0x4) 23:33:11 executing program 2 (fault-call:10 fault-nth:45): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:11 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r0, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r3, 0x0, r2, 0x0, 0x101, 0x8) 23:33:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000180)=0x7fffffff, 0x4) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x2fffffebf}, 0xc) unshare(0x60000000) [ 2719.483874][T14832] IPVS: ftp: loaded support on port[0] = 21 [ 2719.515523][T14827] FAULT_INJECTION: forcing a failure. [ 2719.515523][T14827] name failslab, interval 1, probability 0, space 0, times 0 [ 2719.529205][T14827] CPU: 0 PID: 14827 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2719.537131][T14827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2719.537139][T14827] Call Trace: [ 2719.537162][T14827] dump_stack+0x172/0x1f0 [ 2719.537184][T14827] should_fail.cold+0xa/0x15 [ 2719.537203][T14827] ? fault_create_debugfs_attr+0x180/0x180 [ 2719.537221][T14827] ? ___might_sleep+0x163/0x2c0 [ 2719.537239][T14827] __should_failslab+0x121/0x190 [ 2719.537256][T14827] should_failslab+0x9/0x14 [ 2719.537267][T14827] __kmalloc+0x2e0/0x770 [ 2719.537280][T14827] ? __local_bh_enable_ip+0x15a/0x270 [ 2719.537299][T14827] ? lock_sock_nested+0xe2/0x120 [ 2719.550616][T14827] ? __local_bh_enable_ip+0x15a/0x270 [ 2719.550633][T14827] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2719.550645][T14827] ? lock_sock_nested+0x9a/0x120 [ 2719.550661][T14827] ? sock_kmalloc+0xc6/0x120 [ 2719.559545][T14827] sock_kmalloc+0xc6/0x120 [ 2719.559564][T14827] hash_alloc_result.part.0+0x95/0x110 [ 2719.559581][T14827] hash_sendpage+0x7a7/0x9d0 [ 2719.570221][T14827] hash_sendpage_nokey+0x94/0xa0 [ 2719.570240][T14827] kernel_sendpage+0x92/0xf0 [ 2719.570258][T14827] ? hash_check_key.isra.0+0x230/0x230 [ 2719.579666][T14827] sock_sendpage+0x8b/0xc0 [ 2719.579687][T14827] pipe_to_sendpage+0x296/0x360 [ 2719.579705][T14827] ? kernel_sendpage+0xf0/0xf0 [ 2719.589274][T14827] ? direct_splice_actor+0x190/0x190 [ 2719.589290][T14827] ? __put_page+0xa7/0xe0 [ 2719.589306][T14827] ? anon_pipe_buf_release+0x1c6/0x270 [ 2719.589325][T14827] __splice_from_pipe+0x397/0x7d0 [ 2719.589344][T14827] ? direct_splice_actor+0x190/0x190 [ 2719.599615][T14827] ? direct_splice_actor+0x190/0x190 [ 2719.599635][T14827] splice_from_pipe+0x108/0x170 [ 2719.609822][T14827] ? splice_shrink_spd+0xd0/0xd0 [ 2719.609849][T14827] ? apparmor_file_permission+0x25/0x30 [ 2719.618808][T14827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2719.618826][T14827] ? security_file_permission+0x8f/0x380 [ 2719.618846][T14827] generic_splice_sendpage+0x3c/0x50 [ 2719.618859][T14827] ? splice_from_pipe+0x170/0x170 [ 2719.618877][T14827] do_splice+0x708/0x1410 [ 2719.628895][T14827] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2719.628912][T14827] ? __fget_light+0x1a9/0x230 [ 2719.638413][T14827] __x64_sys_splice+0x2c6/0x330 [ 2719.638438][T14827] do_syscall_64+0xfa/0x760 [ 2719.638460][T14827] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2719.638474][T14827] RIP: 0033:0x459f49 [ 2719.648432][T14827] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2719.648440][T14827] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2719.648453][T14827] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2719.648466][T14827] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2719.658046][T14827] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2719.658055][T14827] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2719.658063][T14827] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:33:12 executing program 3: r0 = socket(0x10, 0x3, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000000)={0x1, 0xfffffffe}, 0x10) write(r0, &(0x7f0000000080)="200000001a00010000000066835f7f081c140000000000000000000004001300", 0x20) [ 2719.854014][T14836] IPVS: ftp: loaded support on port[0] = 21 23:33:12 executing program 3: r0 = accept(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f00000001c0)=0x80) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r1, &(0x7f0000002780), 0x400004d, 0x0) ioctl$sock_ifreq(r1, 0x894a, &(0x7f0000000000)={'ip6erspan0\x00', @ifru_ivalue=0x20}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r2, &(0x7f0000002780), 0x400004d, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r3, &(0x7f0000000000), 0xfffffea6) getsockname$packet(r3, &(0x7f0000003d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003d40)=0x14) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r5, &(0x7f00000003c0)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r5, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000705000000000000008000000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff00000000090001006866736300000000fbff020000000000"], 0x38}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004300)=[{{&(0x7f0000000040)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000a40)="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", 0x1000}, {&(0x7f0000000200)="f88592ceeca673e94298a4f336db1f6622e843f1b0efb32ae52d5087fbca06e63965131f548e176b75f6aac9e4a17e7262fb281892e70e2371a0d9e2311367b7d9d3a8c2da568e4b7a48c40cf4eb095cffb89ffb954b7d315f28e9959554d7158029b5984ca1ae78a74e21fd374ef8b622e09e5a665f02c9cee9ebcf76", 0x7d}, {&(0x7f0000000080)="a05d7c696aecc821fbcaac720ba0dc", 0xf}, {&(0x7f0000000280)}, {&(0x7f0000001a40)="b070aef38bcee4c81450a76c6bb393a7649a321d1002be42a90d2f4b18716a77ad6b38abadd9fdd06d573fc4502c856b805ec3dd62892704bb3744252d33d15112b1258638aacc4086aac15f7672a631a93d55f7f805431076e6f426660b2a4dff199657a4f2f3ceb873d53d8e06ca497cc72b1d2782192b12c44577b76c28cee94663714e96129d8c514f79103e81332a6889d448dfc856c5af84337bfd2ef2612520049bb3f1d7f2cf5ee5e73699e2eb099a3ad2b83d6a53e25fc08b2fffad960d6a9878e9b79f1bc39360b0c82fbb5d95ed570bd352f5832c861ec717628c2541dbd74e206ceb0b4643e7ae488246b18ac8776d6e7d32c8beeb175954eb677bd4b17ed977808bbe01a7a4887fe49b0c97c11c651801211f4d774a9cbad5b72145f8162feb41daee2e91e1d027dddc1a64e7aa0200daf65243718061181579c023312f115869cc54ef32e16c7a6b4fa6c300b7e5c484f2233a946fcf54892819c0d9c84aa32b09f5654d836a001f7d4ee92e92a506664b4f8d67d739d332c4dfee9e444976d3e869cc078d4035b5c6aa3677469ae7651bc037525677d48b9f22ff90f9ba43267ba4cb17ddac7fdd9908094181ceb8b9249dfbe1d21f52a0d58693c00f834fed38c9d1dbe452591ba5218050023c6b1f92bf82e57ca4a2781e6f887b1aa893ce1cfb6966eb32e66bf0a391b6d28217050e697da83f10c7da6954d4fb6950509f91998098bfc01c2e42f5c74efa43e56b6b941a006043841530193ef7e906faae55f834cea1ff3407766599ed46382d2290d2a451727f2b8d3ddfe432d196d27617e962e3cffccb820141e21ffbdc83640aa8608491c7b7ec1bc054b78b86ca8d9942caa7002363fceec34bdde9cb09e6d51724b065f4d477cce98694db6ca3d7d4a38f51b704bf3eb322a2cc00cd707a8e1faef235c01287c778cfbcb0f06627ecc68296c8c91d0634dd77f789fefe549c6198f17de9d7ccddb29e61e574c186729773386fd8ea9b1c9db2b0e8919c7afffc0e4892517b2805ec84f19e984e09ace40ffcf5bb25d6a387f85dc3fa70e994cc7f9de1e960d9cd16c495528573eef8ddc8629076a9a9c572ef0fcd218ebaf374f94123eebfc9c450605fc6e4fa85872f287ab128724073c5069502bc58f031827f5395b862c12cb741703c67a4182dd6168cffba01713fc7a85ba03f14043fd6d4793d23e832fdd5f360f8725c0f220b50040d11ac52f8b382711da487ebace6ba1544baf81a1d34bb620dd50ce3d404a906818cd2b19130d03197dc46992a171510b2cf1938ffd753d2dd59373dcf7e528f5eaf2c622d8a7887a27475594b265af2661c53451ff5b740412c2a084901ae1b5c7d08541bc6e13106ecdb0dd6fffe4b72420bae7a0b3bf6fa5e6485e4cc049b89c80641d23b63ca8c86fd69cae4366673ca46c5f8a317f2170720eb8e60e45d4961c7fae1d75745630b3f988cf3be9a82e2167e2f5932fe931d0fc684c44fde947d0a65ea45a0639c32048d450914a51f53a191affb40203d968b75eb9be86b857c235364bd6e13f2536cb381ab7f569dc7946bc613c211acf0dfa69ec06e933a59512b28c524eea3dddec8a33d0cb0479226dc6b36aa6b781852dde4e0b55b1479c26e7fb722019a3af89cb679551b85ac1a0f907663a1c869535e838cfbe40d7d521b7ae1f64fae61bd41e62f02e357159c48228242030d6d010f9c16ce5a15c91941096bd3a10b4a13001f6eb2140f30f5d53da15bbc9daac4afb06550b64f3181bfd01dd83cc36ad8f3a592be3a5c9b4fcdb9a2f814bbf2adea2f4c7afe2f90d07ba3709aa0f1165bbc4d26526146212ea5ac80383dba2591b12fff2b2e736c7e331ce1091b9030980ec2930de1300fa510526f363efbea3bb07154060a6044294518a859041aae8020426b38ca55e655f1692953c19966426490490e10cc467159ddb52390333aaad31a98019182fa22167b8925ebd29e6365f7ccb8bdd8b9d299a271ccad28d008835f64334a13773aef26c0275e683f522673cd0655d5871d59d638d203e1dc6e923457063807f5b050f06e42eec20a70e04d36330ff4036894fba5f45fa79559adf6562b12150de33676c4cee076182ee804c97433a1e2e187060ed3f399e443eec7c5750386696a809624efb595fba8a871f7211cea89fd7d5832299b88304cf9118a3fe11b82d6f0705ab0dccd1c1ea5bdfc42aedf4f75496b8db13f29953268b02e4a9e707f1bf83e57d70479f4b57cdbc72e97a93651784bb539c3c4f9540694a7ba7ad4a70a22e8309b700b3a9a0e8026c9812b1ce036c8c06fb6ccd8fece574fe490f3e2c5a0b310b4b6ad42002f976976960f8d5f0d5b1becc11dd62ba96f0c71d7117a4b8195e2920a43b346f41e48cfb9c737ca9fad94d41ab1d5f2d4d1f323a31c6af2e36d994a7ef3c1820c52a2eb40915821d815155ce5cca0d3141e59e67aa21ae0d4cba5106c78f9723d8eabb1408bd77c63ed98c6681b6eb5e46159e4fadfbcf171fd6aaf9b5dec42c77ac3a98281d884e5628c739e16533c8ed773db783286d120ff9b3537098a3fe810dfe554aa34c3e05b43fbbc27e11c3e13701052ded425b3ebc74a4fe9ed45e3cd01e599cff23eec1616939b6e52e85b0e99018b32f9040b1a44c9f4b572e384530fa6e90ba422ae9383d08d8767f7e735d28810a259c28db701fe29db5e8a2ecd837d58fd7115e182bd2b44e64551c3c2a54ba7a5b49db17c925ae7ab59879cfd7516d21c3bbf632aeee7adb8c4d388605612249f1c2833c800556d81f339831ddf03efea8dc4d09990297db89e949ca554346e3bb46f9c613a002f843005cae0d617bf3474b482469752393d807dd2a2c2f5c4b7c5c6a22415f72fa86d9428b167aeba82fd15c8aacf6e9177cb7e761f80fbb17831287453a47b35a9873389c40a83cf7c9a1accc6f4fbddcc6237353e3bf1fa618d6b3aa42a2372d455c9200788a3b234c05b2bc1bebbe3332ddb0ca943056b033a72d51006cc299616fa59522fb6eb1430765d3d44e05225026cf40e92f0c26ce2959208435f9ea9a50db5e37881675f18a32d1a684027bf0ec63a5d1821eed7186a543959c1a5399cc12c8bf13cf5ddf72de867b6551fe1ff601c44b8f0eb79275ea893c55ff3e853d354ae29d83e418053f1f437b7224680c291d30270f6d2b02e77e14e47d7bfb9cd2c051cea43fb9ac1cab84efc1e06afd974d652ae29397ff64965d8a196ec83759b1a717cbdfb82657437f830a9049b41661bd50bcb2574e18361f44e6152fad8d1180ac18d0a990a3e8ab08a47d57c9b52e3aa8525ea5c6fe672d66173d73fa0c6e1f07c7cd2ddf058d26b933ee0893a2a7aec83836e26325896715a18d075f456cf53c68644871fd56283a4e37cd3a5d1cd2ea8e971e55176f8737ce9dc65ea7cd4f3e69bf630c2f1d50400867fc6e42125f4ca603b84cb8ef565b72a1505f1943c42b2f1e01605806bcdf52ff821f7d0c68c7c6feee203472d31ab0b92c583b32ceba2fb909cd5f12b6452e65bdf3a082736397b98030d0af2f2619380d0af8f14515a6d67e792b0340d932d1c117d90d151c390f7984c3e5c1335a7788d4cd7eaec25cb64f9e320374c865a5bc00bd5f12d961bda24b62d748d66b19d3e1f5f461ec4f559e9457b138b720700e6967d264c78fd4179366c798ae00e78db467c29fa6ab9999fdeb57dc50f9ef454114289d7b533429980146ec99a3bac75b2ec9229a7058083efdd280402d2e34eec13d7cb043eb86cfc7379ddb94d6ab05c69dc50fe25848cb2176af450484b149a29b7c5ee4828626a661bf977d4dc48e7eca9c9a6ff2097b08c4cb049eb58f1119ad741aeb52b53eb158638f68b46f37b4a007c7891a06440408c0d84d10dfeba92451cad0fdd252ede358a03fc8c68951e81a89e99933b312873331a21a1460b0ca8353f3286d23ccb0af5b2cdc9de3d08810e46a1882481b4f5b23217a7d8aa9190dad79ff3c3a176e5963f6ead2e14baffc96cd89c2d15aa652bafac325fcff261b61596a5876126c95a6232c0ce129c99119074980344eeba75a9e6be51501ccfd723a33990e8438e1f5cfc2269ef2cb30594b1b6a70db70d9e729fd7eedccdc19df5cc79610650d1766655ccbc20051e99590ed8c2ab862404258ec9060240146176e881f37225eecc672887ebdb7c1a3342c02619ba3dd2ae38585d177361d92c4c142552f046fea6c819604c47e1ed9dc8f23c4a284e992b1b735eecc54878a965ea77f1da39b408f66036f87a8e852bb8a43f9f1604e3351182c27089ba124b08da1e5ec9278d2b5d2f2693da484e5a2620488b53a798ff25abefc1af0395fd7d34838b6cafe6a0bdc4dc2b8bd67c32d6683bc8b4ccdb387d9a4ee8373bf0384404dca938089dc7be2f7de1efe344bc237d7e373895335c887f433e5ee4ed5ca1870ce442a002f01d22740a283a09f4a3889c1cb02090147ab7bd2e3ee15a4a206ed56cd5814573500fddf64d22ec86934eb6bedd1adc447d663b6239465197969a880e2f241104139d690f832b3a7e1b108860a8f0eafe6b5b7d992d6453cf678459a62e29066ce9e5cd1003068b8031cc98142f184a0178ac684d601fadf2dc805f39bea22b52788623bb56a19976ceea772909452d05514175d12132537474e106a90631fe5a09eecba95d3284b84a2871ceeb16d8d616b521382db289fc0f527434a1dae08f8b6c9e6a0caf800d8e1d98c3cbf9bc6a72cbc396bed0f32a42b38d6aa7ea57de340902e306b8e48ed2d83f0ed1ac3bb7e8607588ed971984eeaa4fba03438be52a525e8046dff233fe2aac8e9937533407c4fa1e9bb815e194964b3d9295b6d08227e5d2e83dabc622bd9ceb163badf420826fade9afd8021d39d617e5a6753e763e354effd358e10b2e9eccfde999bbebd1efba2c52035e2254a070a4361047fa8dc46dc5e169e7811d2c665e3bc7790cc1d3aaddc5a4804dab2e9f65018fb056456888527eb80600b4430abfe2a751e1418d26fb6a030f5f50dde94ff712952dd92d504d3c6696349afac1e6d8df37b267053f0b365fd0cd6f7b6115eabda1ef770269191b4f52ef4c9d9c823b05fc02ea5863b28458e6f8050f73fd7f01b3cba8c33d2544fcabce8152a36f8b1f6960f77a8c9e1803ec68f03709355fd899e70ef350d03cf140a43636a2629c43b19119140d84dbdd706781b5193d7fd810f9e4f086f418ebeb49cf5f000a6dce346bd00f1c0ed976f0caff66d5f3b4026b239d635e912d6bfc7f9b710fac1803febdb97c9432ed30fa691813e16cffdab6dd5fdc17f43547a6e7be715090344b8afeb8bb034e202b8a55578a02e8a3af1789eab721ccca4c37ce036a0cba41460c1791a8a2cfa4154fa188c3722ed1e7baef4b51105136e91f1fe7b086da3af57df0aa725ab4a00cce1b8d4129eaed45c91c8077094597b7919d6684ab7a5feb364d58c46288c70d2cd24e855b3fae8d7d8326a5ae044bfb27d06f2f18b92a8552f44079e57079b8708cd52a58d46de529572ca1d7bf22d14e15dabf231f0e36ef4f084621025a390092186bd77c432bce1d2f8320bc04e96c8d00458112f9ea4adbbc7bae57e7422d9fd63906ea624b023d6eb316d5f26848c80a0d38812f6bebcc992650f5aab259a6ce56745238fe2d501c3ac27425202e2416a6ac18bf34e27bd77e78d00a16db3d32fc04e64704cdb2e48aa440fae64e47f242a03d9598cf99f997a1d0a4cc6970a51a4fb22f80", 0x1000}, {&(0x7f00000002c0)="e0a7752786217e4054c05cc88cd28cde057d6355950c74c05854bceb81f00bb517383c1d878deb47f4a064b267518af02a55cfe917043ccc05e9ad0910417bb6e016e141cd0ee01558453ee700", 0x4d}, {&(0x7f0000002a40)="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", 0x1000}], 0x7}}, {{&(0x7f00000003c0)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000003c00)=[{&(0x7f0000000400)="03417e492d1642186cf04a838fcd07accb7a649eedcc9d13943706515d2abd1d694f0e261c03e99f8eab6c122c910d3a208c953f2ea63ac46121f9c76df52dfd8e9caa2b3fdf9993c390079f6c0c8330f0a570814903022177f0221e620f66d005311f3b01378f2186b6b357a09de86ee6251b787faa49c743a526e69ba66152c07f77f6b56a7482addbc668a30a6e12654e57fb51e11c", 0x97}, {&(0x7f00000004c0)="f27d530639b3f17f86531045d11d5b922c92e0465e05095a7f8d0ae2", 0x1c}, {&(0x7f0000000500)="c0e5156b05e3e6f128cf448abb5b321afb6fb5f1f5e906d58d2fae18ac4317798f72bdd29a89385b6938fe916fcbb274f1ea04d7ce575903d9bd8a8824b67e3ed65737aaf4e909aa5a740bb689ad226c4be5c54e29177ed3fd277b873ce091e4d8e2df2f6ff3d7a8dd7b15e5fab6d2bab73cd4dba1d54c07a1481b8e96240a058e8add2cf3475f99ea3fbdfdc5f1f2cdd3cad7d5fcff5d62dc06eab238b0f09228204abef31e691b5334db463148b758c413b1d0c1b5ff8f706dccd63d", 0xbd}, {&(0x7f00000005c0)="b64f5834e75585fb62c9433c891e0169f22f5da69fc43eae3d36a5c2fa34190fa098a91ad2cb92c095dcac5e450c3132e2b5341e0ad2d8ad465074098a13475691b25e40b6f73a7223e9db9ff47a3a206c81a0bfd13bde55420289ede18557ea6fabca7accf75ab4", 0x68}, {&(0x7f0000003a40)="6cc529edf3ea5142f0b4b50a0b453874e10c858cf88e86eb10f637b6819072a498ebb37e28e93e7900a1d5aa7de3dced1a22e9f271b85882dae3250842bea65e56a08b6650f38bd4ca24de946b4a949f8c35", 0x52}, {&(0x7f0000003ac0)="f62a12a54ec520e222c220ff9ee047bf5e53d57748b7fc3d974348b256b257e32171bc6f5d93039fe1263300f4501ce1ddabaf18c5a0e9e37ff221a8e345ddef5e1571db8ddf1e4e9e9689d0c0ddc380d4c87be94221761291a2", 0x5a}, {&(0x7f0000003b40)="4e802362b99c53d49c52db586975845b8df7a9174005b59d03bb38311726b0616784225400184484dad70acc8152ab98ab99fd09e853fc2825dd5f8e9c6986e9bcbedf47521c462024fb5ecd38b7f461643332b1d84fd4e8df5da90cb5c733896fa60ae667a4482967a68a919848b9b32ae11e24216632", 0x77}, {&(0x7f0000003bc0)="10001e7c87a3c8703f0effa97ee488c6d24d2767a8755404eee16e4a78c4eafa95716cbe0a99b804f6c3b15d6f545d3afea349260f57e8e92644fa01e0fda8c8", 0x40}], 0x8}}, {{0x0, 0x0, &(0x7f0000003cc0)=[{&(0x7f0000003c80)="1f1e1795feca60526157b1a3fad160791fa2c9e6c0e586dc6600c65cae", 0x1d}], 0x1, &(0x7f0000003d80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x1f}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @dev={0xac, 0x14, 0x14, 0xe}, @broadcast}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x87}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x6, @multicast1}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0xb8}}, {{&(0x7f0000003e40)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000041c0)=[{&(0x7f0000003e80)="2244845e899625222076e78a68fe3cc6dc8bc78af372b773b4b4d3dcdd748a4f1e9cb511867de40e8988a9d66dbb238604b0971c8bf87c02be4cf5f1c685a8d7b15f5674ef66e22cc1203bc8556d65353afb2cfe78fdc500fb694a6e2d5bf2779da148b45d88e4db8165f5fc93fe21a3bcffe78ed7f23b5979863395ca4e5b611c35380f28716190da3216f607c10aa2c66ba4986fb098c3", 0x98}, {&(0x7f0000003f40)="7e48859a437cf6cfcaf15292426483b55776040e26d4794c827df066fc8535b69ffdc3c24eadac2afd8ce6f01ce6dee07880d7bbd12d3b6d52ff73e1d4eee1a1fa79d2300b45e214d5fd68c1fd3a38524d8f5c8db7668c02cb77550c342367b2bb7900d7087f2acfa55beb44adfab9e20f4709f896081d97a2ab1e01ea26fb94269da3dcf76a56ca36", 0x89}, {&(0x7f0000004000)="34e3876c9f6543dff36a1ed70b4ecb77e77cb4c8550a20abd2f70677a5717040c6efe761699382", 0x27}, {&(0x7f0000004040)="d26e40ec29aefdd26053acbf2973015e778e08a9ae6a6f8e27b3434806e66e2a14eaa79974cd708d46d4c2ee6f2bd0dc6589b57fb75ff1416b9888757ed7a4e64a346820c7556de46d12d0131281586e7436d52bace600b046c755e7640066bde78e32b38ab1c89fbfbeac4d14fdc89343b7551ef9f085cb350c9dbe", 0x7c}, {&(0x7f00000040c0)="c40ffa6caa8d6b1b8c47820cc5578fb735ae5d033144df48da7666feaf29e1b933b85e25d8b6f4f7bcd98327926a369adee27a4a8323e69e7e192926faf2ab4d8743d5a039acee8748cf48ac9f4d2ff2e14e5955ecced8dec6854a42ebdca935039661b866e1ca1a989f991cda516554b4fa2656247f6e857a888aa4c1bcc3b8b18892c52f31d6b202bcbe2c94d61a5abd0031f7d7124ccf74baeabcabfcef4f8c2502817b60221e24610391b7d255050ae02670247e8356f9361c427e12f53081738114adfcb91e3d365c5e0d1e568904", 0xd1}], 0x5, &(0x7f0000004240)=[@ip_retopts={{0x5c, 0x0, 0x7, {[@cipso={0x86, 0x4b, 0x3f, [{0x5, 0x11, "f0ace169fbb4f5b1d9db9d07059beb"}, {0x2, 0xb, "52aa6eb8bac87ad18f"}, {0x2, 0xd, "d7ec19c5d107fc1e22de0b"}, {0x6, 0xe, "cff95623d947cdb3ca087d6f"}, {0x6, 0xb, "b002834f786bf9597a"}, {0x0, 0x3, '&'}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @broadcast, @remote}}}, @ip_retopts={{0x14, 0x0, 0x7, {[@generic={0x94, 0x4, "52c3"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}], 0xb0}}], 0x4, 0x20040000) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000004400)=ANY=[@ANYBLOB="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"/976], 0x1}}, 0x0) r8 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r8, &(0x7f0000000180), 0x49249249249252d, 0x0) 23:33:12 executing program 2 (fault-call:10 fault-nth:46): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2, 0x40, @mcast2}, 0x1c) r3 = socket$inet_tcp(0x2, 0x1, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000080)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000140)={'lo\x00\x00\xe7\xff\x03\x00', 0xfd}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cubic\x00', 0x6) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000000), 0xffffff6a) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x89e2, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000003c0), 0x0, 0x0) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x89e2, &(0x7f0000000140)) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd72, 0x4000800, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, r0, 0x0) 23:33:12 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r4, &(0x7f0000000000), 0xfffffea6) connect$ax25(r4, &(0x7f00000000c0)={{0x3, @null}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2720.374641][T14856] device lo left promiscuous mode [ 2720.576330][T14864] FAULT_INJECTION: forcing a failure. [ 2720.576330][T14864] name failslab, interval 1, probability 0, space 0, times 0 [ 2720.627777][T14864] CPU: 0 PID: 14864 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2720.635706][T14864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2720.645764][T14864] Call Trace: [ 2720.649059][T14864] dump_stack+0x172/0x1f0 [ 2720.653396][T14864] should_fail.cold+0xa/0x15 [ 2720.658002][T14864] ? fault_create_debugfs_attr+0x180/0x180 [ 2720.663818][T14864] ? ___might_sleep+0x163/0x2c0 [ 2720.668678][T14864] __should_failslab+0x121/0x190 [ 2720.673620][T14864] should_failslab+0x9/0x14 [ 2720.678124][T14864] __kmalloc+0x2e0/0x770 [ 2720.682459][T14864] ? __local_bh_enable_ip+0x15a/0x270 [ 2720.687821][T14864] ? lock_sock_nested+0xe2/0x120 [ 2720.687837][T14864] ? __local_bh_enable_ip+0x15a/0x270 [ 2720.687852][T14864] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2720.687864][T14864] ? lock_sock_nested+0x9a/0x120 [ 2720.687875][T14864] ? sock_kmalloc+0xc6/0x120 [ 2720.687892][T14864] sock_kmalloc+0xc6/0x120 [ 2720.687913][T14864] hash_alloc_result.part.0+0x95/0x110 [ 2720.687929][T14864] hash_sendpage+0x7a7/0x9d0 [ 2720.703469][T14864] hash_sendpage_nokey+0x94/0xa0 [ 2720.732288][T14864] kernel_sendpage+0x92/0xf0 [ 2720.736891][T14864] ? hash_check_key.isra.0+0x230/0x230 [ 2720.742362][T14864] sock_sendpage+0x8b/0xc0 [ 2720.746795][T14864] pipe_to_sendpage+0x296/0x360 [ 2720.751655][T14864] ? kernel_sendpage+0xf0/0xf0 [ 2720.756433][T14864] ? direct_splice_actor+0x190/0x190 [ 2720.761724][T14864] ? __put_page+0xa7/0xe0 [ 2720.766067][T14864] ? anon_pipe_buf_release+0x1c6/0x270 [ 2720.771538][T14864] __splice_from_pipe+0x397/0x7d0 [ 2720.776608][T14864] ? direct_splice_actor+0x190/0x190 [ 2720.781917][T14864] ? direct_splice_actor+0x190/0x190 [ 2720.787208][T14864] splice_from_pipe+0x108/0x170 [ 2720.792067][T14864] ? splice_shrink_spd+0xd0/0xd0 [ 2720.797017][T14864] ? apparmor_file_permission+0x25/0x30 [ 2720.802566][T14864] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2720.808811][T14864] ? security_file_permission+0x8f/0x380 [ 2720.814450][T14864] generic_splice_sendpage+0x3c/0x50 [ 2720.819732][T14864] ? splice_from_pipe+0x170/0x170 [ 2720.824740][T14864] do_splice+0x708/0x1410 [ 2720.829060][T14864] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2720.834152][T14864] ? __fget_light+0x1a9/0x230 [ 2720.838827][T14864] __x64_sys_splice+0x2c6/0x330 [ 2720.843689][T14864] do_syscall_64+0xfa/0x760 [ 2720.848182][T14864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2720.854056][T14864] RIP: 0033:0x459f49 [ 2720.857944][T14864] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2720.877565][T14864] RSP: 002b:00007f28eb52fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2720.885979][T14864] RAX: ffffffffffffffda RBX: 00007f28eb52fc90 RCX: 0000000000459f49 [ 2720.894032][T14864] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2720.902026][T14864] RBP: 000000000075c070 R08: 0000000080000001 R09: 0000000000000000 [ 2720.910036][T14864] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5306d4 [ 2720.917994][T14864] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:33:19 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x0, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:19 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1, 0x0, 0x84}, 0x10000010) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$inet6_opts(r6, 0x29, 0x3b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000400130000000000010005020000000000000000000009000000000000040100efff"], 0x28) sendmmsg(r6, &(0x7f00000092c0), 0x400000000000064, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) getsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) splice(r7, 0x0, r8, 0x0, 0x100000000ffe0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r8, 0x0, 0x14, &(0x7f0000000080)=':cpuset#+vboxnet0^,\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b38e47bf070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000001940)={0x0, 0x0, 0x0}, 0x0) sendmmsg$unix(r12, &(0x7f0000002140)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x8000}, {&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001680), 0x0, &(0x7f00000019c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r14}}}], 0x40, 0x4040}, {&(0x7f0000001a00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001c80)=[{&(0x7f0000001a80)="74b2333c0879e92e6a9f6fce1e1457d06e2f6b2715fd3d8085c97571bb8664ad1ec668fdb56e3229725116380fbbcfafe5897bc66f76edb46fbc1b66bb267b50cf06e72443681eb8e3281c6b21e5a00f7e7f4e4ee4839fdb30d462d16b19d571d38448cbd65e333c1f5b4b6c555fc6", 0x6f}, {&(0x7f0000001c00)="6060bd2c333b69e29e012cde11fc8b1d528c98e25e09a377b5e73ba936ce0187bcf14aa920037a65d0da3a002eb684ba6986bc965ff551993259186700e88405e12e9ad28336bfc147aecab28eedd7e198576c81", 0x54}], 0x2, &(0x7f0000002080)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000bd000000000000000110000002010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r11, @ANYRES32=r13, @ANYRES32=r13, @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB="2c000000000000000100000001000040", @ANYRES32=r11, @ANYRES32=r13, @ANYRES32=r13, @ANYRES32=r11, @ANYRES32, @ANYRES32=r11, @ANYRES32=r13, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x20000000}], 0x3, 0x40000) setsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000280)={r9, r10, r14}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast2, @in6=@ipv4={[], [], @remote}, 0x4e22, 0x858, 0x4e20, 0x6, 0xa, 0x80, 0x80, 0x5e, 0x0, r10}, {0xdd1, 0x80000001, 0x0, 0x1, 0xfffffffffffffe3c, 0x50f69513, 0x100000001, 0x8001}, {0x0, 0x1000, 0x7, 0xffffffffffffff7f}, 0x0, 0x6e6bbc, 0x1, 0x0, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x1a}, 0x4d3, 0x32}, 0xa, @in=@rand_addr=0x8b, 0x3500, 0x2, 0x0, 0x9, 0x9, 0x2, 0x2}}, 0xe8) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:19 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xf00000000000000) 23:33:19 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x3) getsockopt$bt_BT_SECURITY(r0, 0x12, 0x3, &(0x7f0000000000), 0x6d7f7a662f227213) 23:33:19 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc020662a, &(0x7f00000000c0)={0x4000000, r4, 0x1800}) bind$alg(r4, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256\x00'}, 0x58) r5 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r6, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) 23:33:19 executing program 2 (fault-call:10 fault-nth:47): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:19 executing program 3: setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) unshare(0x40000000) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000000), 0xb) getpid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) r0 = socket(0x200040000000015, 0x805, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stau\x00<#\xfbW*\x1f\x02\x94\xe6\xf3\x1dS\xd1\xe5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x93n,e+:G\x1bJ\x7f\xa2\xf6\xe04\x8c\x04\xe5\xf0\xdfK\x1d\xee\xc8;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\x00\x00a.\xfd\x1d\xf5\x86\xa7\xec]\xe8\x04\x00\x00\x00\x9c f\x11\x9ay0U\x10\xae\x0es\x96\xd0\xbf\xa0f\xfb4\xbbB\xc6b\xaa\xbc\x82\x99\xff\xf9\xe1\x82.\xd2\xac\xb1\xa5\xa0\xdf.\xaaO\x03\xa1\xa0j\xaf4\xc4Y\x94\xe3\x90\xfe\x04(dl\x90\x8fCqwc2\xc4\x951\x1e\x8e\xb6|s\xfb\x06+w^\x98N>sr\xcal\x18\x9c\xed\x1dC\x8a4\b\xcc\v\x1e@\xe4x5', 0x2761, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000040)={0x0, 0x7ffffffc}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stau\x00<#\xfbW*\x1f\x02\x94\xe6\xf3\x1dS\xd1\xe5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x93n,e+:G\x1bJ\x7f\xa2\xf6\xe04\x8c\x04\xe5\xf0\xdfK\x1d\xee\xc8;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\x00\x00a.\xfd\x1d\xf5\x86\xa7\xec]\xe8\x04\x00\x00\x00\x9c f\x11\x9ay0U\x10\xae\x0es\x96\xd0\xbf\xa0f\xfb4\xbbB\xc6b\xaa\xbc\x82\x99\xff\xf9\xe1\x82.\xd2\xac\xb1\xa5\xa0\xdf.\xaaO\x03\xa1\xa0j\xaf4\xc4Y\x94\xe3\x90\xfe\x04(dl\x90\x8fCqwc2\xc4\x951\x1e\x8e\xb6|s\xfb\x06+w^\x98N>sr\xcal\x18\x9c\xed\x1dC\x8a4\b\xcc\v\x1e@\xe4x5', 0x2761, 0x0) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000040)={0x0, 0x7ffffffc}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stau\x00<#\xfbW*\x1f\x02\x94\xe6\xf3\x1dS\xd1\xe5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x93n,e+:G\x1bJ\x7f\xa2\xf6\xe04\x8c\x04\xe5\xf0\xdfK\x1d\xee\xc8;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\x00\x00a.\xfd\x1d\xf5\x86\xa7\xec]\xe8\x04\x00\x00\x00\x9c f\x11\x9ay0U\x10\xae\x0es\x96\xd0\xbf\xa0f\xfb4\xbbB\xc6b\xaa\xbc\x82\x99\xff\xf9\xe1\x82.\xd2\xac\xb1\xa5\xa0\xdf.\xaaO\x03\xa1\xa0j\xaf4\xc4Y\x94\xe3\x90\xfe\x04(dl\x90\x8fCqwc2\xc4\x951\x1e\x8e\xb6|s\xfb\x06+w^\x98N>sr\xcal\x18\x9c\xed\x1dC\x8a4\b\xcc\v\x1e@\xe4x5', 0x2761, 0x0) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000040)={0x0, 0x7ffffffc}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stau\x00<#\xfbW*\x1f\x02\x94\xe6\xf3\x1dS\xd1\xe5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x93n,e+:G\x1bJ\x7f\xa2\xf6\xe04\x8c\x04\xe5\xf0\xdfK\x1d\xee\xc8;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\x00\x00a.\xfd\x1d\xf5\x86\xa7\xec]\xe8\x04\x00\x00\x00\x9c f\x11\x9ay0U\x10\xae\x0es\x96\xd0\xbf\xa0f\xfb4\xbbB\xc6b\xaa\xbc\x82\x99\xff\xf9\xe1\x82.\xd2\xac\xb1\xa5\xa0\xdf.\xaaO\x03\xa1\xa0j\xaf4\xc4Y\x94\xe3\x90\xfe\x04(dl\x90\x8fCqwc2\xc4\x951\x1e\x8e\xb6|s\xfb\x06+w^\x98N>sr\xcal\x18\x9c\xed\x1dC\x8a4\b\xcc\v\x1e@\xe4x5', 0x2761, 0x0) ioctl$FITRIM(r5, 0xc0185879, &(0x7f0000000040)={0x0, 0x7ffffffc}) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stau\x00<#\xfbW*\x1f\x02\x94\xe6\xf3\x1dS\xd1\xe5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x93n,e+:G\x1bJ\x7f\xa2\xf6\xe04\x8c\x04\xe5\xf0\xdfK\x1d\xee\xc8;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\x00\x00a.\xfd\x1d\xf5\x86\xa7\xec]\xe8\x04\x00\x00\x00\x9c f\x11\x9ay0U\x10\xae\x0es\x96\xd0\xbf\xa0f\xfb4\xbbB\xc6b\xaa\xbc\x82\x99\xff\xf9\xe1\x82.\xd2\xac\xb1\xa5\xa0\xdf.\xaaO\x03\xa1\xa0j\xaf4\xc4Y\x94\xe3\x90\xfe\x04(dl\x90\x8fCqwc2\xc4\x951\x1e\x8e\xb6|s\xfb\x06+w^\x98N>sr\xcal\x18\x9c\xed\x1dC\x8a4\b\xcc\v\x1e@\xe4x5', 0x2761, 0x0) ioctl$FITRIM(r6, 0xc0185879, &(0x7f0000000040)={0x0, 0x7ffffffc}) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stau\x00<#\xfbW*\x1f\x02\x94\xe6\xf3\x1dS\xd1\xe5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x93n,e+:G\x1bJ\x7f\xa2\xf6\xe04\x8c\x04\xe5\xf0\xdfK\x1d\xee\xc8;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\x00\x00a.\xfd\x1d\xf5\x86\xa7\xec]\xe8\x04\x00\x00\x00\x9c f\x11\x9ay0U\x10\xae\x0es\x96\xd0\xbf\xa0f\xfb4\xbbB\xc6b\xaa\xbc\x82\x99\xff\xf9\xe1\x82.\xd2\xac\xb1\xa5\xa0\xdf.\xaaO\x03\xa1\xa0j\xaf4\xc4Y\x94\xe3\x90\xfe\x04(dl\x90\x8fCqwc2\xc4\x951\x1e\x8e\xb6|s\xfb\x06+w^\x98N>sr\xcal\x18\x9c\xed\x1dC\x8a4\b\xcc\v\x1e@\xe4x5', 0x2761, 0x0) ioctl$FITRIM(r7, 0xc0185879, &(0x7f0000000040)={0x0, 0x7ffffffc}) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stau\x00<#\xfbW*\x1f\x02\x94\xe6\xf3\x1dS\xd1\xe5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x93n,e+:G\x1bJ\x7f\xa2\xf6\xe04\x8c\x04\xe5\xf0\xdfK\x1d\xee\xc8;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\x00\x00a.\xfd\x1d\xf5\x86\xa7\xec]\xe8\x04\x00\x00\x00\x9c f\x11\x9ay0U\x10\xae\x0es\x96\xd0\xbf\xa0f\xfb4\xbbB\xc6b\xaa\xbc\x82\x99\xff\xf9\xe1\x82.\xd2\xac\xb1\xa5\xa0\xdf.\xaaO\x03\xa1\xa0j\xaf4\xc4Y\x94\xe3\x90\xfe\x04(dl\x90\x8fCqwc2\xc4\x951\x1e\x8e\xb6|s\xfb\x06+w^\x98N>sr\xcal\x18\x9c\xed\x1dC\x8a4\b\xcc\v\x1e@\xe4x5', 0x2761, 0x0) ioctl$FITRIM(r8, 0xc0185879, &(0x7f0000000040)={0x0, 0x7ffffffc}) r9 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r9}, 0x2c) r10 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r10}, 0x2c) r11 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r11}, 0x2c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000600)={'ip6gretap0\x00', &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYPTR64=&(0x7f0000000400)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[], @ANYRES32=0x0, @ANYRES64, @ANYRES64, @ANYRESHEX=r10, @ANYRES16, @ANYBLOB="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", @ANYRESDEC=r9], @ANYRES64=r1, @ANYRES32, @ANYRESDEC=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r2, @ANYRESDEC=r11, @ANYRES64=0x0]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x0, @remote}, @in6={0xa, 0x0, 0x0, @local}], 0x2c) r12 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) getsockopt(r0, 0x114, 0x271b, &(0x7f0000000040)=""/13, &(0x7f000033bffc)=0xae8) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) r14 = socket$inet_udp(0x2, 0x2, 0x0) close(r14) splice(r13, 0x0, r14, 0x0, 0x20000000000401, 0x0) r15 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r15, 0x84, 0x6e, &(0x7f0000000200)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}], 0x367) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r15, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r15, 0x84, 0x66, &(0x7f0000000040)={r16}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r12, 0x84, 0x73, &(0x7f0000000080)={r16, 0x57, 0x0, 0x4, 0x3ff}, &(0x7f0000000140)=0x18) r17 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r17, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=@ethtool_test={0x1a, 0x0, 0x0, 0x182}}) [ 2726.630347][T14888] IPVS: ftp: loaded support on port[0] = 21 [ 2726.707764][T14885] FAULT_INJECTION: forcing a failure. [ 2726.707764][T14885] name failslab, interval 1, probability 0, space 0, times 0 [ 2726.730285][T14885] CPU: 0 PID: 14885 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2726.738290][T14885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2726.738297][T14885] Call Trace: [ 2726.738324][T14885] dump_stack+0x172/0x1f0 [ 2726.738346][T14885] should_fail.cold+0xa/0x15 [ 2726.738364][T14885] ? fault_create_debugfs_attr+0x180/0x180 [ 2726.738385][T14885] ? ___might_sleep+0x163/0x2c0 [ 2726.738405][T14885] __should_failslab+0x121/0x190 [ 2726.738423][T14885] should_failslab+0x9/0x14 [ 2726.738436][T14885] __kmalloc+0x2e0/0x770 [ 2726.738450][T14885] ? __local_bh_enable_ip+0x15a/0x270 [ 2726.738465][T14885] ? lock_sock_nested+0xe2/0x120 [ 2726.738478][T14885] ? __local_bh_enable_ip+0x15a/0x270 [ 2726.738494][T14885] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2726.738506][T14885] ? lock_sock_nested+0x9a/0x120 [ 2726.738523][T14885] ? sock_kmalloc+0xc6/0x120 [ 2726.780783][T14885] sock_kmalloc+0xc6/0x120 [ 2726.780816][T14885] hash_alloc_result.part.0+0x95/0x110 [ 2726.795315][T14885] hash_sendpage+0x7a7/0x9d0 [ 2726.795336][T14885] hash_sendpage_nokey+0x94/0xa0 [ 2726.795356][T14885] kernel_sendpage+0x92/0xf0 [ 2726.795367][T14885] ? hash_check_key.isra.0+0x230/0x230 [ 2726.795387][T14885] sock_sendpage+0x8b/0xc0 [ 2726.806014][T14885] pipe_to_sendpage+0x296/0x360 23:33:19 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f00000006c0)={r5, 0x29}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000380)={r5, 0x14, "48b8e154bc55d5fc9e9c3e0e1451f2d54c4aa90f"}, &(0x7f00000003c0)=0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000500)={r6, 0x7c, &(0x7f0000000480)=[@in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e24, 0x3, @local, 0x5}, @in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000540)=0x10) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000580)={r7, 0xfff, 0x0, 0x7, 0x400, 0x5}, &(0x7f0000000680)=0x14) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r9, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r10 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r10, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r10, 0x84, 0x2, &(0x7f0000000780), &(0x7f00000007c0)=0x8) write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000000240)={0x3, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @random}, {}]}) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r11, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r12, 0x1, 0x0, 0x0, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0xffff}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r12, 0x200, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8804}, 0x8004) r13 = accept4$x25(r3, &(0x7f0000000700)={0x9, @remote}, &(0x7f0000000740)=0x12, 0x800) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r13, 0x6612) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2726.825335][T14885] ? kernel_sendpage+0xf0/0xf0 [ 2726.825355][T14885] ? direct_splice_actor+0x190/0x190 [ 2726.825370][T14885] ? __put_page+0xa7/0xe0 [ 2726.825388][T14885] ? anon_pipe_buf_release+0x1c6/0x270 [ 2726.844897][T14885] __splice_from_pipe+0x397/0x7d0 [ 2726.844914][T14885] ? direct_splice_actor+0x190/0x190 [ 2726.844937][T14885] ? direct_splice_actor+0x190/0x190 [ 2726.844955][T14885] splice_from_pipe+0x108/0x170 [ 2726.854188][T14885] ? splice_shrink_spd+0xd0/0xd0 [ 2726.854210][T14885] ? apparmor_file_permission+0x25/0x30 [ 2726.868525][T14885] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2726.868543][T14885] ? security_file_permission+0x8f/0x380 [ 2726.868563][T14885] generic_splice_sendpage+0x3c/0x50 [ 2726.899493][T14885] ? splice_from_pipe+0x170/0x170 [ 2726.899512][T14885] do_splice+0x708/0x1410 [ 2726.899537][T14885] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2726.899554][T14885] ? __fget_light+0x1a9/0x230 [ 2726.916927][T14885] __x64_sys_splice+0x2c6/0x330 [ 2726.916950][T14885] do_syscall_64+0xfa/0x760 [ 2726.931551][T14885] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2726.931563][T14885] RIP: 0033:0x459f49 [ 2726.931577][T14885] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2726.931589][T14885] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2726.946165][T14885] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2726.946174][T14885] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2726.946182][T14885] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2726.946191][T14885] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2726.946200][T14885] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2727.124173][T14888] IPVS: ftp: loaded support on port[0] = 21 23:33:19 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x3f00000000000000) 23:33:19 executing program 3: setsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) unshare(0x40000000) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000000), 0xb) getpid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) socket(0x0, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f00000000c0)=0x3, 0x4) r0 = socket(0x200040000000015, 0x805, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stau\x00<#\xfbW*\x1f\x02\x94\xe6\xf3\x1dS\xd1\xe5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x93n,e+:G\x1bJ\x7f\xa2\xf6\xe04\x8c\x04\xe5\xf0\xdfK\x1d\xee\xc8;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\x00\x00a.\xfd\x1d\xf5\x86\xa7\xec]\xe8\x04\x00\x00\x00\x9c f\x11\x9ay0U\x10\xae\x0es\x96\xd0\xbf\xa0f\xfb4\xbbB\xc6b\xaa\xbc\x82\x99\xff\xf9\xe1\x82.\xd2\xac\xb1\xa5\xa0\xdf.\xaaO\x03\xa1\xa0j\xaf4\xc4Y\x94\xe3\x90\xfe\x04(dl\x90\x8fCqwc2\xc4\x951\x1e\x8e\xb6|s\xfb\x06+w^\x98N>sr\xcal\x18\x9c\xed\x1dC\x8a4\b\xcc\v\x1e@\xe4x5', 0x2761, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000040)={0x0, 0x7ffffffc}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stau\x00<#\xfbW*\x1f\x02\x94\xe6\xf3\x1dS\xd1\xe5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x93n,e+:G\x1bJ\x7f\xa2\xf6\xe04\x8c\x04\xe5\xf0\xdfK\x1d\xee\xc8;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\x00\x00a.\xfd\x1d\xf5\x86\xa7\xec]\xe8\x04\x00\x00\x00\x9c f\x11\x9ay0U\x10\xae\x0es\x96\xd0\xbf\xa0f\xfb4\xbbB\xc6b\xaa\xbc\x82\x99\xff\xf9\xe1\x82.\xd2\xac\xb1\xa5\xa0\xdf.\xaaO\x03\xa1\xa0j\xaf4\xc4Y\x94\xe3\x90\xfe\x04(dl\x90\x8fCqwc2\xc4\x951\x1e\x8e\xb6|s\xfb\x06+w^\x98N>sr\xcal\x18\x9c\xed\x1dC\x8a4\b\xcc\v\x1e@\xe4x5', 0x2761, 0x0) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000040)={0x0, 0x7ffffffc}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stau\x00<#\xfbW*\x1f\x02\x94\xe6\xf3\x1dS\xd1\xe5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x93n,e+:G\x1bJ\x7f\xa2\xf6\xe04\x8c\x04\xe5\xf0\xdfK\x1d\xee\xc8;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\x00\x00a.\xfd\x1d\xf5\x86\xa7\xec]\xe8\x04\x00\x00\x00\x9c f\x11\x9ay0U\x10\xae\x0es\x96\xd0\xbf\xa0f\xfb4\xbbB\xc6b\xaa\xbc\x82\x99\xff\xf9\xe1\x82.\xd2\xac\xb1\xa5\xa0\xdf.\xaaO\x03\xa1\xa0j\xaf4\xc4Y\x94\xe3\x90\xfe\x04(dl\x90\x8fCqwc2\xc4\x951\x1e\x8e\xb6|s\xfb\x06+w^\x98N>sr\xcal\x18\x9c\xed\x1dC\x8a4\b\xcc\v\x1e@\xe4x5', 0x2761, 0x0) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000040)={0x0, 0x7ffffffc}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stau\x00<#\xfbW*\x1f\x02\x94\xe6\xf3\x1dS\xd1\xe5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x93n,e+:G\x1bJ\x7f\xa2\xf6\xe04\x8c\x04\xe5\xf0\xdfK\x1d\xee\xc8;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\x00\x00a.\xfd\x1d\xf5\x86\xa7\xec]\xe8\x04\x00\x00\x00\x9c f\x11\x9ay0U\x10\xae\x0es\x96\xd0\xbf\xa0f\xfb4\xbbB\xc6b\xaa\xbc\x82\x99\xff\xf9\xe1\x82.\xd2\xac\xb1\xa5\xa0\xdf.\xaaO\x03\xa1\xa0j\xaf4\xc4Y\x94\xe3\x90\xfe\x04(dl\x90\x8fCqwc2\xc4\x951\x1e\x8e\xb6|s\xfb\x06+w^\x98N>sr\xcal\x18\x9c\xed\x1dC\x8a4\b\xcc\v\x1e@\xe4x5', 0x2761, 0x0) ioctl$FITRIM(r5, 0xc0185879, &(0x7f0000000040)={0x0, 0x7ffffffc}) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stau\x00<#\xfbW*\x1f\x02\x94\xe6\xf3\x1dS\xd1\xe5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x93n,e+:G\x1bJ\x7f\xa2\xf6\xe04\x8c\x04\xe5\xf0\xdfK\x1d\xee\xc8;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\x00\x00a.\xfd\x1d\xf5\x86\xa7\xec]\xe8\x04\x00\x00\x00\x9c f\x11\x9ay0U\x10\xae\x0es\x96\xd0\xbf\xa0f\xfb4\xbbB\xc6b\xaa\xbc\x82\x99\xff\xf9\xe1\x82.\xd2\xac\xb1\xa5\xa0\xdf.\xaaO\x03\xa1\xa0j\xaf4\xc4Y\x94\xe3\x90\xfe\x04(dl\x90\x8fCqwc2\xc4\x951\x1e\x8e\xb6|s\xfb\x06+w^\x98N>sr\xcal\x18\x9c\xed\x1dC\x8a4\b\xcc\v\x1e@\xe4x5', 0x2761, 0x0) ioctl$FITRIM(r6, 0xc0185879, &(0x7f0000000040)={0x0, 0x7ffffffc}) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stau\x00<#\xfbW*\x1f\x02\x94\xe6\xf3\x1dS\xd1\xe5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x93n,e+:G\x1bJ\x7f\xa2\xf6\xe04\x8c\x04\xe5\xf0\xdfK\x1d\xee\xc8;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\x00\x00a.\xfd\x1d\xf5\x86\xa7\xec]\xe8\x04\x00\x00\x00\x9c f\x11\x9ay0U\x10\xae\x0es\x96\xd0\xbf\xa0f\xfb4\xbbB\xc6b\xaa\xbc\x82\x99\xff\xf9\xe1\x82.\xd2\xac\xb1\xa5\xa0\xdf.\xaaO\x03\xa1\xa0j\xaf4\xc4Y\x94\xe3\x90\xfe\x04(dl\x90\x8fCqwc2\xc4\x951\x1e\x8e\xb6|s\xfb\x06+w^\x98N>sr\xcal\x18\x9c\xed\x1dC\x8a4\b\xcc\v\x1e@\xe4x5', 0x2761, 0x0) ioctl$FITRIM(r7, 0xc0185879, &(0x7f0000000040)={0x0, 0x7ffffffc}) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/group.stau\x00<#\xfbW*\x1f\x02\x94\xe6\xf3\x1dS\xd1\xe5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x93n,e+:G\x1bJ\x7f\xa2\xf6\xe04\x8c\x04\xe5\xf0\xdfK\x1d\xee\xc8;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00\x00\x00a.\xfd\x1d\xf5\x86\xa7\xec]\xe8\x04\x00\x00\x00\x9c f\x11\x9ay0U\x10\xae\x0es\x96\xd0\xbf\xa0f\xfb4\xbbB\xc6b\xaa\xbc\x82\x99\xff\xf9\xe1\x82.\xd2\xac\xb1\xa5\xa0\xdf.\xaaO\x03\xa1\xa0j\xaf4\xc4Y\x94\xe3\x90\xfe\x04(dl\x90\x8fCqwc2\xc4\x951\x1e\x8e\xb6|s\xfb\x06+w^\x98N>sr\xcal\x18\x9c\xed\x1dC\x8a4\b\xcc\v\x1e@\xe4x5', 0x2761, 0x0) ioctl$FITRIM(r8, 0xc0185879, &(0x7f0000000040)={0x0, 0x7ffffffc}) r9 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r9}, 0x2c) r10 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r10}, 0x2c) r11 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r11}, 0x2c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000600)={'ip6gretap0\x00', &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYPTR64=&(0x7f0000000400)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[], @ANYRES32=0x0, @ANYRES64, @ANYRES64, @ANYRESHEX=r10, @ANYRES16, @ANYBLOB="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", @ANYRESDEC=r9], @ANYRES64=r1, @ANYRES32, @ANYRESDEC=0x0, @ANYRESOCT=0x0, @ANYRESDEC=r2, @ANYRESDEC=r11, @ANYRES64=0x0]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x0, @remote}, @in6={0xa, 0x0, 0x0, @local}], 0x2c) r12 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, 0x0, 0x0) getsockopt(r0, 0x114, 0x271b, &(0x7f0000000040)=""/13, &(0x7f000033bffc)=0xae8) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) r14 = socket$inet_udp(0x2, 0x2, 0x0) close(r14) splice(r13, 0x0, r14, 0x0, 0x20000000000401, 0x0) r15 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r15, 0x84, 0x6e, &(0x7f0000000200)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}], 0x367) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r15, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r15, 0x84, 0x66, &(0x7f0000000040)={r16}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r12, 0x84, 0x73, &(0x7f0000000080)={r16, 0x57, 0x0, 0x4, 0x3ff}, &(0x7f0000000140)=0x18) r17 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r17, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=@ethtool_test={0x1a, 0x0, 0x0, 0x182}}) 23:33:19 executing program 5: pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000340)=[{&(0x7f0000000100)="c279735078e6efe473782414d5caeca3f1e1e582f6bd0e7276a4c338e44cf73f4ca41af720b43c6d342e2498ce3d84"}, {&(0x7f0000000240)="74d338c8a3ebb46077f7e01a3a52dea2a8241394f3d9cabd04bfc961b3864f8e652a68b8195700d471e2824c98fa517b456bca40a78ac8c2674334ffe89ec4a1eb9501ca20b0029002c38eff4bb29d83d8bf7e201b"}, {&(0x7f00000002c0)="2c781ccfdc5d3079da4e132247d72c7b3bfb5c3682a2f0ddc79d879e9ae88149c120184e7cb9edc4b894ab597f5e5b186556062edb6a20896723982c6c1ffbb7c9c6cfcdd7cbfe792132dd"}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5421, &(0x7f0000000600)=0x7) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r5, &(0x7f0000002780), 0x400004d, 0x0) close(r5) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) socket$rxrpc(0x21, 0x2, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc020662a, &(0x7f00000000c0)={0x4000000, r7, 0x1800}) setsockopt$XDP_RX_RING(r7, 0x11b, 0x2, &(0x7f00000000c0)=0xa001, 0x4) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r7, 0x6, 0x14, &(0x7f0000000540)=0x3, 0x4) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc020662a, &(0x7f00000000c0)={0x4000000, r10, 0x1800}) r11 = syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='NET_DM\x00') r12 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000580)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) openat$cgroup_int(r12, &(0x7f0000000640)='cpuset.mem_exclusive\x00', 0x2, 0x0) sendmsg$NET_DM_CMD_START(r9, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x14, r11, 0x4, 0x70bd27, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x104346c5d1e64d61}, 0x20034811) ioctl(r8, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0xfffffffffffffffd, 0x0) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) 23:33:19 executing program 2 (fault-call:10 fault-nth:48): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2727.398603][T14907] IPVS: ftp: loaded support on port[0] = 21 [ 2727.730166][T14916] FAULT_INJECTION: forcing a failure. [ 2727.730166][T14916] name failslab, interval 1, probability 0, space 0, times 0 [ 2727.761540][T14916] CPU: 0 PID: 14916 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2727.769460][T14916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2727.779517][T14916] Call Trace: [ 2727.782824][T14916] dump_stack+0x172/0x1f0 [ 2727.787167][T14916] should_fail.cold+0xa/0x15 [ 2727.791767][T14916] ? fault_create_debugfs_attr+0x180/0x180 [ 2727.797583][T14916] ? ___might_sleep+0x163/0x2c0 [ 2727.802444][T14916] __should_failslab+0x121/0x190 [ 2727.807390][T14916] should_failslab+0x9/0x14 [ 2727.811920][T14916] __kmalloc+0x2e0/0x770 [ 2727.816167][T14916] ? __local_bh_enable_ip+0x15a/0x270 [ 2727.821543][T14916] ? lock_sock_nested+0xe2/0x120 [ 2727.826484][T14916] ? __local_bh_enable_ip+0x15a/0x270 [ 2727.831867][T14916] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2727.837155][T14916] ? lock_sock_nested+0x9a/0x120 [ 2727.842088][T14916] ? sock_kmalloc+0xc6/0x120 [ 2727.846681][T14916] sock_kmalloc+0xc6/0x120 [ 2727.851108][T14916] hash_alloc_result.part.0+0x95/0x110 [ 2727.856566][T14916] hash_sendpage+0x7a7/0x9d0 [ 2727.861166][T14916] hash_sendpage_nokey+0x94/0xa0 [ 2727.866108][T14916] kernel_sendpage+0x92/0xf0 [ 2727.870699][T14916] ? hash_check_key.isra.0+0x230/0x230 [ 2727.876169][T14916] sock_sendpage+0x8b/0xc0 [ 2727.880603][T14916] pipe_to_sendpage+0x296/0x360 [ 2727.885460][T14916] ? kernel_sendpage+0xf0/0xf0 [ 2727.890237][T14916] ? direct_splice_actor+0x190/0x190 [ 2727.895520][T14916] ? __put_page+0xa7/0xe0 [ 2727.899842][T14916] ? anon_pipe_buf_release+0x1c6/0x270 [ 2727.905296][T14916] __splice_from_pipe+0x397/0x7d0 [ 2727.910375][T14916] ? direct_splice_actor+0x190/0x190 [ 2727.915644][T14916] ? direct_splice_actor+0x190/0x190 [ 2727.920908][T14916] splice_from_pipe+0x108/0x170 [ 2727.925740][T14916] ? splice_shrink_spd+0xd0/0xd0 [ 2727.930663][T14916] ? apparmor_file_permission+0x25/0x30 [ 2727.936190][T14916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2727.942425][T14916] ? security_file_permission+0x8f/0x380 [ 2727.948062][T14916] generic_splice_sendpage+0x3c/0x50 [ 2727.953328][T14916] ? splice_from_pipe+0x170/0x170 [ 2727.958357][T14916] do_splice+0x708/0x1410 [ 2727.962678][T14916] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2727.967768][T14916] ? __fget_light+0x1a9/0x230 [ 2727.972426][T14916] __x64_sys_splice+0x2c6/0x330 [ 2727.977267][T14916] do_syscall_64+0xfa/0x760 [ 2727.981766][T14916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2727.987696][T14916] RIP: 0033:0x459f49 [ 2727.991569][T14916] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2728.011157][T14916] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2728.019551][T14916] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2728.027503][T14916] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2728.035468][T14916] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2728.043429][T14916] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2728.051437][T14916] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:33:27 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x0, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:27 executing program 3: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1, 0x0, 0x84}, 0x10000010) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r5, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r5, 0x0) r6 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) setsockopt$inet6_opts(r6, 0x29, 0x3b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000400130000000000010005020000000000000000000009000000000000040100efff"], 0x28) sendmmsg(r6, &(0x7f00000092c0), 0x400000000000064, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) getsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000080)=0x4) splice(r7, 0x0, r8, 0x0, 0x100000000ffe0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r8, 0x0, 0x14, &(0x7f0000000080)=':cpuset#+vboxnet0^,\x00'}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast2, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000240)=0xe8) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b38e47bf070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000001940)={0x0, 0x0, 0x0}, 0x0) sendmmsg$unix(r12, &(0x7f0000002140)=[{&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x8000}, {&(0x7f0000001600)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001680), 0x0, &(0x7f00000019c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r14}}}], 0x40, 0x4040}, {&(0x7f0000001a00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001c80)=[{&(0x7f0000001a80)="74b2333c0879e92e6a9f6fce1e1457d06e2f6b2715fd3d8085c97571bb8664ad1ec668fdb56e3229725116380fbbcfafe5897bc66f76edb46fbc1b66bb267b50cf06e72443681eb8e3281c6b21e5a00f7e7f4e4ee4839fdb30d462d16b19d571d38448cbd65e333c1f5b4b6c555fc6", 0x6f}, {&(0x7f0000001c00)="6060bd2c333b69e29e012cde11fc8b1d528c98e25e09a377b5e73ba936ce0187bcf14aa920037a65d0da3a002eb684ba6986bc965ff551993259186700e88405e12e9ad28336bfc147aecab28eedd7e198576c81", 0x54}], 0x2, &(0x7f0000002080)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000bd000000000000000110000002010000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r11, @ANYRES32=r13, @ANYRES32=r13, @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB="2c000000000000000100000001000040", @ANYRES32=r11, @ANYRES32=r13, @ANYRES32=r13, @ANYRES32=r11, @ANYRES32, @ANYRES32=r11, @ANYRES32=r13, @ANYBLOB='\x00\x00\x00\x00'], 0x98, 0x20000000}], 0x3, 0x40000) setsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000280)={r9, r10, r14}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast2, @in6=@ipv4={[], [], @remote}, 0x4e22, 0x858, 0x4e20, 0x6, 0xa, 0x80, 0x80, 0x5e, 0x0, r10}, {0xdd1, 0x80000001, 0x0, 0x1, 0xfffffffffffffe3c, 0x50f69513, 0x100000001, 0x8001}, {0x0, 0x1000, 0x7, 0xffffffffffffff7f}, 0x0, 0x6e6bbc, 0x1, 0x0, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x1a}, 0x4d3, 0x32}, 0xa, @in=@rand_addr=0x8b, 0x3500, 0x2, 0x0, 0x9, 0x9, 0x2, 0x2}}, 0xe8) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:27 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = socket$tipc(0x1e, 0x2, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_EDITDEST(r4, 0x0, 0x489, &(0x7f0000000240)={{0x3b, @local, 0x4e20, 0x3, 'dh\x00', 0x19, 0x8, 0x7a}, {@multicast1, 0x4e23, 0x3, 0x200, 0x2c1}}, 0x44) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f00000000c0)=0x3, 0x4) r5 = accept4(r2, 0x0, 0x0, 0x800) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r6, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r5, 0x0, 0x80000001, 0x0) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f00000002c0)={@null=' \x00', 0x7, 'tunl0\x00'}) 23:33:27 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x4000000000000000) 23:33:27 executing program 2 (fault-call:10 fault-nth:49): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:27 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) readv(r3, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/157, 0x9d}, {&(0x7f0000000300)=""/202, 0xca}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/159, 0x9f}], 0x4) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2735.115960][T14941] IPVS: set_ctl: invalid protocol: 59 172.20.20.170:20000 23:33:27 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0x103, 0x1}, 0x20) sendmsg$inet6(r0, &(0x7f0000000180)={&(0x7f0000000100)={0xa, 0x4e22, 0x80000, @local}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=[@dstopts_2292={{0x18}}, @dstopts={{0x18}}], 0x30}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = accept4$inet6(r1, &(0x7f00000003c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000400)=0x1c, 0x80400) r3 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r4}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000440)={r4, 0x8, 0x1, 0x0, 0x0, 0xa527}, &(0x7f0000000480)=0x14) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000004c0)={0x8d2, 0x1, 0x0, 0x3, r5}, &(0x7f0000000500)=0x10) [ 2735.328243][T14944] FAULT_INJECTION: forcing a failure. [ 2735.328243][T14944] name failslab, interval 1, probability 0, space 0, times 0 [ 2735.352746][T14944] CPU: 1 PID: 14944 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2735.360671][T14944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2735.370735][T14944] Call Trace: [ 2735.374045][T14944] dump_stack+0x172/0x1f0 [ 2735.378388][T14944] should_fail.cold+0xa/0x15 [ 2735.382999][T14944] ? fault_create_debugfs_attr+0x180/0x180 [ 2735.388827][T14944] ? ___might_sleep+0x163/0x2c0 [ 2735.393694][T14944] __should_failslab+0x121/0x190 [ 2735.398645][T14944] should_failslab+0x9/0x14 [ 2735.403162][T14944] __kmalloc+0x2e0/0x770 [ 2735.407415][T14944] ? __local_bh_enable_ip+0x15a/0x270 [ 2735.412794][T14944] ? lock_sock_nested+0xe2/0x120 [ 2735.417741][T14944] ? __local_bh_enable_ip+0x15a/0x270 [ 2735.423124][T14944] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2735.428424][T14944] ? lock_sock_nested+0x9a/0x120 [ 2735.433370][T14944] ? sock_kmalloc+0xc6/0x120 [ 2735.437978][T14944] sock_kmalloc+0xc6/0x120 [ 2735.442443][T14944] hash_alloc_result.part.0+0x95/0x110 [ 2735.447911][T14944] hash_sendpage+0x7a7/0x9d0 [ 2735.452539][T14944] hash_sendpage_nokey+0x94/0xa0 [ 2735.457584][T14944] kernel_sendpage+0x92/0xf0 [ 2735.462254][T14944] ? hash_check_key.isra.0+0x230/0x230 [ 2735.467731][T14944] sock_sendpage+0x8b/0xc0 [ 2735.472171][T14944] pipe_to_sendpage+0x296/0x360 [ 2735.477034][T14944] ? kernel_sendpage+0xf0/0xf0 [ 2735.482328][T14944] ? direct_splice_actor+0x190/0x190 [ 2735.487618][T14944] ? __put_page+0xa7/0xe0 [ 2735.491953][T14944] ? anon_pipe_buf_release+0x1c6/0x270 [ 2735.497425][T14944] __splice_from_pipe+0x397/0x7d0 [ 2735.502462][T14944] ? direct_splice_actor+0x190/0x190 [ 2735.507763][T14944] ? direct_splice_actor+0x190/0x190 [ 2735.513056][T14944] splice_from_pipe+0x108/0x170 [ 2735.517922][T14944] ? splice_shrink_spd+0xd0/0xd0 [ 2735.522872][T14944] ? apparmor_file_permission+0x25/0x30 [ 2735.528435][T14944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2735.534712][T14944] ? security_file_permission+0x8f/0x380 [ 2735.540366][T14944] generic_splice_sendpage+0x3c/0x50 [ 2735.545682][T14944] ? splice_from_pipe+0x170/0x170 [ 2735.550718][T14944] do_splice+0x708/0x1410 [ 2735.555066][T14944] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2735.560355][T14944] ? __fget_light+0x1a9/0x230 [ 2735.565040][T14944] __x64_sys_splice+0x2c6/0x330 [ 2735.569903][T14944] do_syscall_64+0xfa/0x760 [ 2735.574433][T14944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2735.580329][T14944] RIP: 0033:0x459f49 [ 2735.584224][T14944] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2735.603830][T14944] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2735.612255][T14944] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2735.620239][T14944] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2735.628220][T14944] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2735.636202][T14944] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2735.644180][T14944] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:33:28 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc020662a, &(0x7f00000000c0)={0x4000000, r6, 0x1800}) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x66, &(0x7f0000000040)={r8}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0xf, &(0x7f0000000240)={r8, @in6={{0xa, 0x4e24, 0xfffffffd, @ipv4={[], [], @rand_addr=0xce1}, 0x7}}, 0x4, 0x3, 0x1ffe000, 0x101, 0x6c}, &(0x7f00000000c0)=0x98) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:28 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x60f86e346d82c106) 23:33:28 executing program 2 (fault-call:10 fault-nth:50): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2735.897896][T14945] IPVS: set_ctl: invalid protocol: 59 172.20.20.170:20000 23:33:28 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r3, &(0x7f00000003c0)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockname$packet(r3, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000705000000000000008000000000", @ANYRES32=r5, @ANYBLOB="00000000ffffffff00000000090001006866736300000000fbff020000000000"], 0x38}}, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={@empty, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, @loopback, 0xb4dd, 0x1, 0x4, 0x400, 0x5, 0x200, r5}) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r6 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r6, 0x0, 0x80000001, 0x0) [ 2736.094706][T14966] FAULT_INJECTION: forcing a failure. [ 2736.094706][T14966] name failslab, interval 1, probability 0, space 0, times 0 [ 2736.115651][T14966] CPU: 1 PID: 14966 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2736.123574][T14966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2736.134587][T14966] Call Trace: [ 2736.137886][T14966] dump_stack+0x172/0x1f0 [ 2736.142236][T14966] should_fail.cold+0xa/0x15 [ 2736.146843][T14966] ? fault_create_debugfs_attr+0x180/0x180 [ 2736.152664][T14966] ? ___might_sleep+0x163/0x2c0 [ 2736.157538][T14966] __should_failslab+0x121/0x190 [ 2736.162488][T14966] should_failslab+0x9/0x14 [ 2736.167001][T14966] __kmalloc+0x2e0/0x770 [ 2736.171252][T14966] ? __local_bh_enable_ip+0x15a/0x270 [ 2736.176640][T14966] ? lock_sock_nested+0xe2/0x120 [ 2736.181585][T14966] ? __local_bh_enable_ip+0x15a/0x270 [ 2736.186968][T14966] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2736.192256][T14966] ? lock_sock_nested+0x9a/0x120 [ 2736.197202][T14966] ? sock_kmalloc+0xc6/0x120 [ 2736.201814][T14966] sock_kmalloc+0xc6/0x120 [ 2736.206255][T14966] hash_alloc_result.part.0+0x95/0x110 [ 2736.211725][T14966] hash_sendpage+0x7a7/0x9d0 [ 2736.216332][T14966] hash_sendpage_nokey+0x94/0xa0 [ 2736.221283][T14966] kernel_sendpage+0x92/0xf0 [ 2736.225872][T14966] ? hash_check_key.isra.0+0x230/0x230 [ 2736.225891][T14966] sock_sendpage+0x8b/0xc0 [ 2736.225910][T14966] pipe_to_sendpage+0x296/0x360 [ 2736.225923][T14966] ? kernel_sendpage+0xf0/0xf0 [ 2736.225940][T14966] ? direct_splice_actor+0x190/0x190 [ 2736.225956][T14966] ? __put_page+0xa7/0xe0 [ 2736.225975][T14966] ? anon_pipe_buf_release+0x1c6/0x270 [ 2736.235821][T14966] __splice_from_pipe+0x397/0x7d0 [ 2736.235839][T14966] ? direct_splice_actor+0x190/0x190 [ 2736.235864][T14966] ? direct_splice_actor+0x190/0x190 [ 2736.235881][T14966] splice_from_pipe+0x108/0x170 [ 2736.235899][T14966] ? splice_shrink_spd+0xd0/0xd0 [ 2736.235920][T14966] ? apparmor_file_permission+0x25/0x30 [ 2736.235936][T14966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2736.235952][T14966] ? security_file_permission+0x8f/0x380 [ 2736.235969][T14966] generic_splice_sendpage+0x3c/0x50 [ 2736.235984][T14966] ? splice_from_pipe+0x170/0x170 [ 2736.235998][T14966] do_splice+0x708/0x1410 [ 2736.236025][T14966] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2736.323092][T14966] ? __fget_light+0x1a9/0x230 [ 2736.327786][T14966] __x64_sys_splice+0x2c6/0x330 [ 2736.332661][T14966] do_syscall_64+0xfa/0x760 [ 2736.337179][T14966] entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:33:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000000)=0x800, 0x4) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xfffffe, 0x8012, r2, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f00000003c0)="ab553fec84248c32c9f46c07c5572327533c51301672b3908c7c0993b11e9257acc346c46baaa6076e879c70c1e1c52089b9fa2a17de92f96356da6b60dc3166025dd6d1851c18", 0x47) r5 = accept$alg(r4, 0x0, 0x0) sendmsg$alg(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x25e, &(0x7f0000000180), 0x18, 0x1}, 0x0) splice(r5, 0x0, r3, 0x0, 0x10000, 0x0) r6 = socket$inet6_sctp(0xa, 0x0, 0x84) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYBLOB="05001502", @ANYRES32=0x0], &(0x7f000095dffc)=0xfffffffffffffff4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x66, &(0x7f0000000040)={r8}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f0000000080)={r8, 0x4, 0xfffffffffffffffd, 0x3, 0x7, 0xcf}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000000)={r8, 0x0, 0x14e7132}, 0x10) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0xc, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0xc}, {0xd}, {0xe, 0x2}]}, @func={0x3, 0x0, 0x0, 0xc, 0x3}, @ptr={0xc}, @restrict={0x8, 0x0, 0x0, 0xb, 0x5}, @enum={0x3, 0x2, 0x0, 0x6, 0x4, [{0xc, 0xfffffffe}, {0x0, 0x9}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x2e, 0x0, 0x51, 0x30, 0x60]}}, &(0x7f00000004c0)=""/243, 0x88, 0xf3}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='io.stat\x00', 0x2761, 0x0) r10 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) write(r10, &(0x7f0000000380)="76fbf326faf4c5a032122f50465c0df727cfcd90bea39e389b86cbc42efcf142df38cda9ad77581a1ff9a5fa4188ad350850a6a36520fb29d3d1047d39a1c2619ac09338066aeca14a116634fdefd32c03a3eb5741e1b12b68c2c8ece00667b35fa85debb27b0050918e8f64f2b8066d9bf0e0b17e91caea4248fe8f8e61e969086162293ce8bab8508b489a95c3c13406434d48635c159385b740ca576f0d24210376fe02f72c51d947c066f43deffde579ddb806ee", 0xb6) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001600)={r10, 0x10, &(0x7f0000001640)={&(0x7f0000000440)=""/4096, 0x1000}}, 0x49) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={r9, 0x10, &(0x7f0000000440)={&(0x7f0000000600)=""/222, 0xde}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r3, 0x10, &(0x7f0000000040)={&(0x7f0000000140)=""/148, 0x94}}, 0x10) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000100)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000300)=@gcm_256={{0x304}, "d9dc7fc0ba0af532", "ce9cca46fdeec3557ddd8e27fdd6b1b699c9a86553f1f7acaf441d27a3e6e2c6", "695de11a", "eecd446eafb86624"}, 0x38) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) [ 2736.343070][T14966] RIP: 0033:0x459f49 [ 2736.346962][T14966] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2736.366595][T14966] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2736.375032][T14966] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2736.383007][T14966] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2736.390999][T14966] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 [ 2736.398981][T14966] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2736.406955][T14966] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2736.417673][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:33:36 executing program 4: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) socket(0x0, 0x5, 0x0) r4 = socket$inet(0x10, 0x0, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r4, &(0x7f0000002540), 0x1, 0x0, 0x0) r5 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r5, 0x0, 0x0) recvmmsg(r5, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r6 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0000000000000000e50c1be3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea966cf055d90f15a36a15aa543cb844bb8b14bb772509", 0x4c}], 0x1}, 0x10) recvmmsg(r6, &(0x7f0000002540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000240)={0x0, 0xffffffffffffff05, "17d0d427559cd923d2779ceccd1a44bf00009ed823b22a0eb96bca9380d05d1abb987b7c"}, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000400), &(0x7f0000000480)=0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) getpeername$inet6(0xffffffffffffffff, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:36 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x7f00000000000000) 23:33:36 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x316, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r4, &(0x7f0000002780), 0x400004d, 0x0) write(r4, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffffffffffe73) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r6, 0x3}, &(0x7f0000000100)=0x8) 23:33:36 executing program 2 (fault-call:10 fault-nth:51): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:36 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00&\x86\x17x+y\xa5\xa8\x1e\xea/=\x9f\xdf\xa1y\xd0\x13\xe6T$\xb1\xfd2\xd76\xc0\xc3\xb2{\xbf\xb2\x14\xf6\x8a\xc8\x9c\x89\xa0b\x10\"\xe40\x93#\\\xcd\xb0aP,\xff\x9f\f\x89\xb9\xa9\xe2\xd6\t\"\f\xde\x00oO:\xba\x14\xdc\xe7H=\xb6\xfb\x96%\xc1\x95\xb4\xad\x98\x870\x92\xb0en{\xea\xdc\xa9+\xbb\xd7\x01\x03d\xb9\x92L\xaf\xe8\t\x80R*1\x12\x10\x9a\x01\xb2\xa2lLN\xde\xd6\xed\xa5\x06\xc5\xad\x8fs \'\v\xc3\x10#\x9f\x90\xe3Q\xc7\xf3;l\xe8{\x19\xc33v\xc35\xde^T&\xee\xd1\x90L\x87\xcb\xc8.\x1c\xae?\xf5\xd9\x9d\x98\"g\xf3\xa7gVv<\x92\t\xe0\xd5\xc8\xca\xda\xe4N\xc9p\x82\x1f=6\x1e\x92\xb9\xd6!.\xb0\xa5\xfcp\n\xd4J\x05n\x101oC\xb6', 0x275a, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='\\\xa5\x02#I\xd8\xe3!7c\xf3\xccg\xc8\x97M taZ\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc020662a, &(0x7f00000000c0)={0x4000000, r5, 0x1800}) r6 = accept4$tipc(r4, &(0x7f00000000c0)=@name, &(0x7f0000000100)=0x10, 0x80000) sendmsg(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0), 0x10000000000001bb}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r7, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2744.400738][T14994] FAULT_INJECTION: forcing a failure. [ 2744.400738][T14994] name failslab, interval 1, probability 0, space 0, times 0 [ 2744.430173][T14994] CPU: 0 PID: 14994 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2744.438107][T14994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2744.448167][T14994] Call Trace: [ 2744.451466][T14994] dump_stack+0x172/0x1f0 [ 2744.455809][T14994] should_fail.cold+0xa/0x15 [ 2744.460407][T14994] ? fault_create_debugfs_attr+0x180/0x180 [ 2744.466221][T14994] ? ___might_sleep+0x163/0x2c0 [ 2744.471083][T14994] __should_failslab+0x121/0x190 [ 2744.476027][T14994] should_failslab+0x9/0x14 [ 2744.480533][T14994] __kmalloc+0x2e0/0x770 [ 2744.484780][T14994] ? preempt_schedule+0x4b/0x60 [ 2744.489646][T14994] ? ___preempt_schedule+0x16/0x20 [ 2744.495193][T14994] ? sock_kmalloc+0xc6/0x120 [ 2744.499788][T14994] sock_kmalloc+0xc6/0x120 [ 2744.504210][T14994] hash_alloc_result.part.0+0x95/0x110 [ 2744.509674][T14994] hash_sendpage+0x7a7/0x9d0 [ 2744.514273][T14994] hash_sendpage_nokey+0x94/0xa0 [ 2744.519226][T14994] kernel_sendpage+0x92/0xf0 [ 2744.523820][T14994] ? hash_check_key.isra.0+0x230/0x230 [ 2744.529289][T14994] sock_sendpage+0x8b/0xc0 [ 2744.533716][T14994] pipe_to_sendpage+0x296/0x360 [ 2744.540490][T14994] ? kernel_sendpage+0xf0/0xf0 [ 2744.545268][T14994] ? direct_splice_actor+0x190/0x190 [ 2744.550818][T14994] ? __put_page+0xa7/0xe0 [ 2744.555148][T14994] ? anon_pipe_buf_release+0x1c6/0x270 [ 2744.560618][T14994] __splice_from_pipe+0x397/0x7d0 [ 2744.565653][T14994] ? direct_splice_actor+0x190/0x190 [ 2744.570953][T14994] ? direct_splice_actor+0x190/0x190 [ 2744.576243][T14994] splice_from_pipe+0x108/0x170 [ 2744.581102][T14994] ? splice_shrink_spd+0xd0/0xd0 [ 2744.586051][T14994] ? apparmor_file_permission+0x25/0x30 [ 2744.591604][T14994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2744.597850][T14994] ? security_file_permission+0x8f/0x380 [ 2744.603491][T14994] generic_splice_sendpage+0x3c/0x50 [ 2744.608779][T14994] ? splice_from_pipe+0x170/0x170 [ 2744.613807][T14994] do_splice+0x708/0x1410 [ 2744.618153][T14994] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2744.623269][T14994] ? __fget_light+0x1a9/0x230 [ 2744.627977][T14994] __x64_sys_splice+0x2c6/0x330 [ 2744.632839][T14994] do_syscall_64+0xfa/0x760 [ 2744.637356][T14994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2744.643343][T14994] RIP: 0033:0x459f49 [ 2744.647239][T14994] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2744.666846][T14994] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2744.675352][T14994] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2744.683327][T14994] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2744.691305][T14994] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 23:33:37 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x8dffffff00000000) [ 2744.699277][T14994] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2744.707248][T14994] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 23:33:37 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) getsockname$tipc(r0, &(0x7f0000000100)=@id, &(0x7f0000000240)=0x10) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x4, 0x4) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0xfffffffffffffddb) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:37 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc020662a, 0x0) splice(r0, 0x0, r3, 0x0, 0x80000001, 0xd22a4ab21b479502) 23:33:37 executing program 2 (fault-call:10 fault-nth:52): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) 23:33:37 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0x1}], 0x1, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r4, &(0x7f0000002780), 0x400004d, 0x0) sendmsg(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r3, 0x0, 0x80000001, 0x0) [ 2745.253601][T15016] FAULT_INJECTION: forcing a failure. [ 2745.253601][T15016] name failslab, interval 1, probability 0, space 0, times 0 [ 2745.266661][T15016] CPU: 0 PID: 15016 Comm: syz-executor.2 Not tainted 5.4.0-rc3+ #0 [ 2745.274853][T15016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2745.284914][T15016] Call Trace: [ 2745.288219][T15016] dump_stack+0x172/0x1f0 [ 2745.292568][T15016] should_fail.cold+0xa/0x15 [ 2745.297184][T15016] ? fault_create_debugfs_attr+0x180/0x180 [ 2745.303007][T15016] ? ___might_sleep+0x163/0x2c0 [ 2745.307865][T15016] __should_failslab+0x121/0x190 [ 2745.312811][T15016] should_failslab+0x9/0x14 [ 2745.317344][T15016] __kmalloc+0x2e0/0x770 [ 2745.321591][T15016] ? __local_bh_enable_ip+0x15a/0x270 [ 2745.326970][T15016] ? lock_sock_nested+0xe2/0x120 [ 2745.331918][T15016] ? __local_bh_enable_ip+0x15a/0x270 [ 2745.337303][T15016] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2745.342596][T15016] ? lock_sock_nested+0x9a/0x120 [ 2745.347545][T15016] ? sock_kmalloc+0xc6/0x120 [ 2745.352162][T15016] sock_kmalloc+0xc6/0x120 [ 2745.356590][T15016] hash_alloc_result.part.0+0x95/0x110 [ 2745.362057][T15016] hash_sendpage+0x7a7/0x9d0 [ 2745.366664][T15016] hash_sendpage_nokey+0x94/0xa0 [ 2745.371610][T15016] kernel_sendpage+0x92/0xf0 [ 2745.376207][T15016] ? hash_check_key.isra.0+0x230/0x230 [ 2745.381679][T15016] sock_sendpage+0x8b/0xc0 [ 2745.386109][T15016] pipe_to_sendpage+0x296/0x360 [ 2745.390965][T15016] ? kernel_sendpage+0xf0/0xf0 [ 2745.395738][T15016] ? direct_splice_actor+0x190/0x190 [ 2745.401029][T15016] ? __put_page+0xa7/0xe0 [ 2745.405362][T15016] ? anon_pipe_buf_release+0x1c6/0x270 [ 2745.410828][T15016] __splice_from_pipe+0x397/0x7d0 [ 2745.415860][T15016] ? direct_splice_actor+0x190/0x190 [ 2745.421160][T15016] ? direct_splice_actor+0x190/0x190 [ 2745.426448][T15016] splice_from_pipe+0x108/0x170 [ 2745.431305][T15016] ? splice_shrink_spd+0xd0/0xd0 [ 2745.436251][T15016] ? apparmor_file_permission+0x25/0x30 [ 2745.441806][T15016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2745.448056][T15016] ? security_file_permission+0x8f/0x380 [ 2745.453701][T15016] generic_splice_sendpage+0x3c/0x50 [ 2745.458997][T15016] ? splice_from_pipe+0x170/0x170 [ 2745.464030][T15016] do_splice+0x708/0x1410 [ 2745.468381][T15016] ? opipe_prep.part.0+0x2e0/0x2e0 [ 2745.473497][T15016] ? __fget_light+0x1a9/0x230 [ 2745.478185][T15016] __x64_sys_splice+0x2c6/0x330 [ 2745.483064][T15016] do_syscall_64+0xfa/0x760 [ 2745.487585][T15016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2745.493497][T15016] RIP: 0033:0x459f49 [ 2745.497398][T15016] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2745.517054][T15016] RSP: 002b:00007f28eb550c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 2745.525460][T15016] RAX: ffffffffffffffda RBX: 00007f28eb550c90 RCX: 0000000000459f49 [ 2745.533494][T15016] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 2745.541466][T15016] RBP: 000000000075bfc8 R08: 0000000080000001 R09: 0000000000000000 23:33:38 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendmmsg(r2, &(0x7f0000002780), 0x400004d, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="8d", 0xfe23}], 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)='$', 0x1}], 0x1}, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c6e", 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") write(r1, &(0x7f0000000440)="b9c482fc62453df4ee30324e6b2310", 0xfffffe6f) splice(r0, 0x0, r4, 0x0, 0x80000001, 0x0) [ 2745.549427][T15016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f28eb5516d4 [ 2745.557579][T15016] R13: 00000000004c9c8b R14: 00000000004e0af8 R15: 0000000000000008 [ 2899.255215][ T1070] INFO: task syz-executor.3:14969 blocked for more than 143 seconds. [ 2899.263350][ T1070] Not tainted 5.4.0-rc3+ #0 [ 2899.268485][ T1070] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2899.277188][ T1070] syz-executor.3 D28160 14969 27176 0x00000004 [ 2899.283505][ T1070] Call Trace: [ 2899.286854][ T1070] __schedule+0x94f/0x1e70 [ 2899.291292][ T1070] ? __sched_text_start+0x8/0x8 [ 2899.296219][ T1070] ? __kasan_check_read+0x11/0x20 [ 2899.301272][ T1070] ? __lock_acquire+0x16f2/0x4a00 [ 2899.306370][ T1070] schedule+0xd9/0x260 [ 2899.310441][ T1070] schedule_timeout+0x717/0xc50 [ 2899.315358][ T1070] ? __kasan_check_read+0x11/0x20 [ 2899.320378][ T1070] ? usleep_range+0x170/0x170 [ 2899.325103][ T1070] ? mark_held_locks+0xa4/0xf0 [ 2899.329865][ T1070] ? _raw_spin_unlock_irq+0x28/0x90 [ 2899.335098][ T1070] ? wait_for_completion+0x294/0x440 [ 2899.340374][ T1070] ? _raw_spin_unlock_irq+0x28/0x90 [ 2899.345624][ T1070] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2899.350905][ T1070] ? trace_hardirqs_on+0x67/0x240 [ 2899.356063][ T1070] ? __kasan_check_read+0x11/0x20 [ 2899.361101][ T1070] wait_for_completion+0x29c/0x440 [ 2899.366256][ T1070] ? wait_for_completion_interruptible+0x470/0x470 [ 2899.372752][ T1070] ? wake_up_q+0xf0/0xf0 [ 2899.377135][ T1070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2899.383398][ T1070] ? __kasan_check_read+0x11/0x20 [ 2899.388482][ T1070] __flush_work+0x508/0xa60 [ 2899.392984][ T1070] ? finish_task_switch+0x147/0x750 [ 2899.398232][ T1070] ? queue_delayed_work_on+0x210/0x210 [ 2899.403690][ T1070] ? finish_task_switch+0x147/0x750 [ 2899.408922][ T1070] ? init_pwq+0x360/0x360 [ 2899.413254][ T1070] ? __cancel_work_timer+0xc4/0x540 [ 2899.418499][ T1070] ? __cancel_work_timer+0x1e0/0x540 [ 2899.423792][ T1070] ? cancel_delayed_work_sync+0x1b/0x20 [ 2899.429480][ T1070] ? __cancel_work_timer+0x1e0/0x540 [ 2899.434758][ T1070] ? lockdep_hardirqs_on+0x421/0x5e0 [ 2899.440077][ T1070] ? trace_hardirqs_on+0x67/0x240 [ 2899.445142][ T1070] __cancel_work_timer+0x3d9/0x540 [ 2899.450245][ T1070] ? mod_delayed_work_on+0x200/0x200 [ 2899.455587][ T1070] ? trace_hardirqs_on+0x67/0x240 [ 2899.460634][ T1070] ? mark_held_locks+0xf0/0xf0 [ 2899.465436][ T1070] cancel_delayed_work_sync+0x1b/0x20 [ 2899.470803][ T1070] tls_sw_cancel_work_tx+0x68/0x80 [ 2899.475979][ T1070] tls_sk_proto_close+0x4c9/0xb60 [ 2899.480992][ T1070] ? lock_acquire+0x190/0x410 [ 2899.485807][ T1070] ? wait_on_pending_writer+0x420/0x420 [ 2899.491348][ T1070] ? ip_mc_drop_socket+0x211/0x270 [ 2899.496632][ T1070] ? down_write+0xdf/0x150 [ 2899.501047][ T1070] inet_release+0xed/0x200 [ 2899.505530][ T1070] inet6_release+0x53/0x80 [ 2899.510117][ T1070] __sock_release+0xce/0x280 [ 2899.514686][ T1070] sock_close+0x1e/0x30 [ 2899.518880][ T1070] __fput+0x2ff/0x890 [ 2899.522859][ T1070] ? __sock_release+0x280/0x280 [ 2899.527812][ T1070] ____fput+0x16/0x20 [ 2899.531790][ T1070] task_work_run+0x145/0x1c0 [ 2899.536444][ T1070] exit_to_usermode_loop+0x316/0x380 [ 2899.541726][ T1070] do_syscall_64+0x65f/0x760 [ 2899.546390][ T1070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2899.552323][ T1070] RIP: 0033:0x413ae1 [ 2899.556280][ T1070] Code: 39 c2 0f 84 0c 02 00 00 48 85 d2 0f 84 86 02 00 00 48 89 d3 31 d2 48 f7 f3 48 c7 44 24 30 00 00 00 00 48 c7 44 24 38 00 00 00 <00> 48 c7 44 24 40 00 00 00 00 48 c7 44 24 48 00 00 00 00 48 c7 44 [ 2899.575975][ T1070] RSP: 002b:00007ffde0c5d530 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 2899.584386][ T1070] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413ae1 [ 2899.592409][ T1070] RDX: 0000001b2e320000 RSI: 0000000000000000 RDI: 0000000000000003 [ 2899.600477][ T1070] RBP: 0000000000000001 R08: 000000002cddbe33 R09: 000000002cddbe37 [ 2899.608514][ T1070] R10: 00007ffde0c5d610 R11: 0000000000000293 R12: 000000000075c9a0 [ 2899.616524][ T1070] R13: 000000000075c9a0 R14: 0000000000762ac8 R15: 000000000075c07c [ 2899.624490][ T1070] [ 2899.624490][ T1070] Showing all locks held in the system: [ 2899.632444][ T1070] 1 lock held by khungtaskd/1070: [ 2899.637511][ T1070] #0: ffffffff88fab1c0 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 2899.646945][ T1070] 2 locks held by getty/8639: [ 2899.651609][ T1070] #0: ffff8880a1534090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2899.660604][ T1070] #1: ffffc90005f2f2e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2899.670204][ T1070] 2 locks held by getty/8640: [ 2899.674907][ T1070] #0: ffff888097e2c090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2899.683871][ T1070] #1: ffffc90005f252e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2899.693662][ T1070] 2 locks held by getty/8641: [ 2899.698364][ T1070] #0: ffff8880966e0090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2899.707502][ T1070] #1: ffffc90005f112e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2899.717124][ T1070] 2 locks held by getty/8642: [ 2899.721782][ T1070] #0: ffff8880a7ae0090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2899.730781][ T1070] #1: ffffc90005f332e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2899.740583][ T1070] 2 locks held by getty/8643: [ 2899.745299][ T1070] #0: ffff8880a1fdd090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2899.754252][ T1070] #1: ffffc90005f192e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2899.763915][ T1070] 2 locks held by getty/8644: [ 2899.768627][ T1070] #0: ffff88809abbc090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2899.777628][ T1070] #1: ffffc90005f292e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2899.787241][ T1070] 2 locks held by getty/8645: [ 2899.791902][ T1070] #0: ffff88809ac9d090 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2899.800920][ T1070] #1: ffffc90005f012e0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1c10 [ 2899.810554][ T1070] 2 locks held by kworker/0:0/32074: [ 2899.815973][ T1070] #0: ffff8880aa427d28 ((wq_completion)events){+.+.}, at: process_one_work+0x88b/0x1740 [ 2899.825853][ T1070] #1: ffff888072b77dc0 ((work_completion)(&(&sw_ctx_tx->tx_work.work)->work)){+.+.}, at: process_one_work+0x8c1/0x1740 [ 2899.838436][ T1070] 1 lock held by syz-executor.3/14969: [ 2899.843883][ T1070] #0: ffff88805f4e4280 (&sb->s_type->i_mutex_key#12){+.+.}, at: __sock_release+0x89/0x280 [ 2899.853917][ T1070] [ 2899.856317][ T1070] ============================================= [ 2899.856317][ T1070] [ 2899.864719][ T1070] NMI backtrace for cpu 1 [ 2899.869103][ T1070] CPU: 1 PID: 1070 Comm: khungtaskd Not tainted 5.4.0-rc3+ #0 [ 2899.876557][ T1070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2899.886600][ T1070] Call Trace: [ 2899.889875][ T1070] dump_stack+0x172/0x1f0 [ 2899.894188][ T1070] nmi_cpu_backtrace.cold+0x70/0xb2 [ 2899.899369][ T1070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2899.906021][ T1070] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 2899.911642][ T1070] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 2899.917601][ T1070] arch_trigger_cpumask_backtrace+0x14/0x20 [ 2899.923469][ T1070] watchdog+0x9d0/0xef0 [ 2899.927607][ T1070] kthread+0x361/0x430 [ 2899.931650][ T1070] ? reset_hung_task_detector+0x30/0x30 [ 2899.937172][ T1070] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 2899.942871][ T1070] ret_from_fork+0x24/0x30 [ 2899.947429][ T1070] Sending NMI from CPU 1 to CPUs 0: [ 2899.952715][ C0] NMI backtrace for cpu 0 skipped: idling at native_safe_halt+0xe/0x10 [ 2899.953708][ T1070] Kernel panic - not syncing: hung_task: blocked tasks [ 2899.967815][ T1070] CPU: 1 PID: 1070 Comm: khungtaskd Not tainted 5.4.0-rc3+ #0 [ 2899.975262][ T1070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2899.985305][ T1070] Call Trace: [ 2899.988577][ T1070] dump_stack+0x172/0x1f0 [ 2899.992895][ T1070] panic+0x2e3/0x75c [ 2899.996766][ T1070] ? add_taint.cold+0x16/0x16 [ 2900.001420][ T1070] ? lapic_can_unplug_cpu.cold+0x3a/0x3a [ 2900.007031][ T1070] ? ___preempt_schedule+0x16/0x20 [ 2900.012126][ T1070] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 2900.018256][ T1070] ? nmi_trigger_cpumask_backtrace+0x24c/0x28b [ 2900.024384][ T1070] ? nmi_trigger_cpumask_backtrace+0x256/0x28b [ 2900.030525][ T1070] ? nmi_trigger_cpumask_backtrace+0x21b/0x28b [ 2900.036658][ T1070] watchdog+0x9e1/0xef0 [ 2900.040806][ T1070] kthread+0x361/0x430 [ 2900.044874][ T1070] ? reset_hung_task_detector+0x30/0x30 [ 2900.050397][ T1070] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 2900.056104][ T1070] ret_from_fork+0x24/0x30 [ 2900.062367][ T1070] Kernel Offset: disabled [ 2900.066703][ T1070] Rebooting in 86400 seconds..