tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)="25288a17ffdb3d33238e181216cf52a4423f2952252bd67c240e7253d2362edbeb9cd9be7e44bdadf43b5150d3ba188b092f26eade0cc24b576716c90e7bfb95fb1a70b0c13cd1dbf6a5bdc6a7ce", 0x4e}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{&(0x7f0000002100)="8ccaa8ad8c350e466d8b8d12cf0733bf08baa7eb71abaafd2b46ac5af4e6e99985e8934e4b84885307d4986e64e78a7d421bb6caff1d43a82bf33332b08d729eb10fd73989592986007ab1d9e38ddbbf8028669c60527851f67029a7a4ebb65e04a28d187fb90ab40e50f9b3dbb9f935ddbcc860f7e7068878867441bb17c40a5f78eb6fbb517776cbe10b645719162cda14f218ea474d76714c87d282b5eed3a7031d1dc9fe3213a2aa909fd8e3154a60d5b58fdfc565151240d88242023565e21f540e2a8c89b437408c94cbec8627e0defb244cae48697190a7f21d706c4f2cc550a1264b77dcadfde20eec6b38ed2efae6559ae069237673cfe6156ae43c2a6f5ce6d06922d7f80d314e399e39cf19302902bf022ccdb0be49398c28e7f5dc306f68acf3f4240dc95652e2ab96323a658e7822e7efbc2bb81b8e7e8bbb7b4854e5f87b40cfc86012215d91819ff0309e854888128580478d5451591fa39cee23e16fc51f5254baa86435eb0d1b00a44d640eba63ef7b57881eef1d5a44c4e2f6b0049889c383dca628408613e8de38e1b2064ac5f07504d704e74a939abf655d7c4bcb0574d5f3f04de8b5173a717c78fa611908aaf7c46141e958bc549b3e75e997d296034d04c2a58e864cb11605bd35528037d89996afd418ee5b165d279a12c93a371eed254bfb68b9d751fa7ed834b2f71f1c8100feb09d9a1fcd32658ab61da29ddbdaa9537392f22827d7bbbc75dafd31ce2d35b1ec82fba2ffd20d90879cf9d8a0035c16d18b7ff075a18232ff52c9be92760b86bba8191f185447b40ac9247fb693d3409eb00255a596eff4518179b50c763e09b656bd5f352bbbd84b127d9758f30cd49f24588ddeab56950e521b6f1c7d9b6703591bd5a7a1e9379cb09242b7f64ff0f683d7a7d886e098c0af22dc31ee760fd8d8cdf8b29aee0f1a3c60734bf1efb6b0e77425531be8ccfadd9e43576b461d97f2d46c763f140991791a23bcb848bd151da352f2315706d5e07fd81e7bd4780360a54b56118ef02df0a4f7aea47ba2132b310588f07119b3fc1088ad8f3aac1d7d1da7abf9fe9bf6fdb12a33bf2c919e8980b06a2e071a1995e308b3ed1b81d5b595278e09f60fcb9f6687e5066dc246b86e81c9dfb009b4d34a424211940409eefceb3fa167d2d3259d409a4074ee95a814520d474f2e0aa5aa8da22c07a226b31be692d0054cdb21ea9b8c05836f58eff4f62f4f5ce5db0a14aa6408b1560e2b4c4082bbdcc5feba450f942947f2b9e605b208e10677b0bf9781fee2af6b7e740e932320dac5903ceff1a59201986c6a5a6de9e2387357a34ee6f4927e44070a0717c2413ec93cbffcf1981113ab5383ffef6c1b8d78184bdd0a9f134166ad3278e717d428080b6e69435cfa22fdb98a738e2a8ff241f777b6956db27b7f895dbfccc4ed4dee657e02855ea17f8795d39458192772f8fc10055c22f7216d7bf745d54ba8a3f0b2eb2be756b7afc0105c02473d93c72b624bd63f217cb542da351384dff07ac2d2ef0a692f675c8f6cc2c64de6be7a9b85cb44bac29b3e248b2fc8e18472d1054cad4285684b7f7b3518dc43be4d8d7b26d952b8c9c1b770f15392f3c93cdfe382d4e3b4aec11f83e18d1cc2e105eddb18c779d8869fb0029ad3061e0750961041d43e4d15d1234d1b80cab42912152c4609f1fc68e39bb7ee2ac98f99a4bb8385d53ba6d901671d685f98e5c318d64d1c572f186e347917056f59a79155532928aa8d9401ef0337e985da506ef76ce9b72d4b9a31d30afad687822628189f0c7d57eb02865d682c67fd8312e7acba48cb04c259f0a4be177a693f0b972d3103721734c2156ab5368b1e493707a2af78d132c449622a30b321b6a75958cc83f51c074384e39c1ec96e0b3a9b75500a2dbfe377b7f869147a0d8a697146e459719937f5787aee2cddad0cdf320f8b8dea9b2fb6f57383cc5531ca406b4cb55d581b8c6138be3783fd2860d55bd3794694b7cd1625c642c52872dd795c6349d8c001b6071418fa8d46aaaf251366567fa1b6eb62e0791d744a0137675c842e5ef14d31a57e01eb53f3a7e220f8def589978e9a7f9fae8b577549b49f1aa0a0ded4076267c342b52632fd0a21618998cd03e8c02c8c76b05a82acf818fd7149bcfc25a71ff02c326b766430f46b08618bf7b0cb3de09504a170376e1545542576f607c7f55a6b044f119a7959ab2624a6494f4f22d3d656d162690306600c2fabbae73a7520448427e93d9544d1e84a0e7b6dd29cb1375f1ca7272dd8ff89c23e6facc168d55878f1a94da1e38399b9dd56819f93186f9b5ca7d4f3e12bdbb27c3fd6c6160dad2344ddb133117efe14e1c0a4f1cc82b474795e323be4b44b4d3c1983c236468c23d232ea392b601adee55d8c4671caaf571f19767290a986375ccb4ff871ca2cf998aa62de7a25a911aa85ca9fea6e40b95b454739d6ea35bed90c6c724e2d60cd0f38036577811f8e7cf69b813aed62f3b8c106042929b220a90ed8270e425e99fe760276ac410f8775030617a487d3c8ea5aa12ebf8e0fc4e411cceb7217e1fc2209cfcf54d95e2a72924e36e0648ee41c5581f321eb01794ecff4dde324c2da8dbbe843547458781962e832d5a7f44f7ffd71c0bb6de988578bd258d5230ea08b84a5aa40bfac430b0a746e1a597a178f6b138cad7bb1cbbc506eb561a88224d1e7c51d2be8ce8a2b4e719b107937ded76593588c6a4b8209fdc7e876af1fd23de7696dd75905567bfcfcfb7a2eb0a09ddfbc54ab7245744f7e9581beebb9db34cd2556a4a0351322f7fb06eee44ef94ec975a349c7da066ac5122bd7a9a5c4b684a51c94aa637c5290d98397157026f581167cc1dacbf74e7dada39552e8f03962702b188f7f31c25ff93a08885fd3e300ad69d230706e78c235ab95a57326bc913cc1279e83995c73ab4c8b20a238726bbe6fe9f5793cff7af4b5f92219b517195fa254aa83ce7d379021695ad51c5c3ab30140c6bd15753f0a072302da5fc5e42d652bc4ce7580075710396a27af10c3f3bbf094e5223a12d269c9865dca292ae56d38d3a058150ca0918937ff54873aebcb7e371879451289e7bc55fe5fc815fbd82a75b459fe76d06499ae0f3c7a6415416c601c44c527bd65d1d3a7a24aeb819fd7442b23cbd11d28992e87158308c006818053b253f9be11139c0792d6fffd872148dbbbc70eb7deae8b1d1f22e9bf8ad1e0f8a095d6530fc924384258e0bb42dddcb9b055dbc41e6e44aa070aafd501d59ec6dcfc12586a053481f87d46de278e7c421bf342621f19d55fcf6b03cb13ac5d5d5da5c8e5fa7aeceeb17175d035f10983f5339bfb2fa35c16d2761d1e89cb07cb2cdc555e9f63c7f4d3925eb060424f4d33187b56ae8ff7cbc4b96712edf43b89b3874df3c9271a664ab9e09247944ebf57b58849b2cd586a791faa1d0759394dee280ae984b54b128d10707e3f40d6b031dc2e455f8fb0a47e5d39d5b64514fd0be5d0cfa587a74e9bc0200f560118a4274e3996d8bf4bea370d5e772e1a890fe87339877fd11c5359fd4926ecef4f0a7e01c594cf8b4b7adff86a5889f16ccbe5b98ef72e8ecd5e5b078c5796e3d636739c92d1cd3e7ac5d622143466b42250092eea5c83092720ded42f057aa10bb2e9d4f818474f532ed0c2f2ea27ee6983ace0056e3ac8bf9a1553112060bd10d9b0ee7f4b7d10ea12e43388f19210bc01d273e03f91818c4d4f35e64836184b388d8cd6906627c39ad8d340c88391b3bec5f54d26ec54021d8756f629398c77d5e52633997eeaca53d8b5774f7c3c0e8bbfd2a93e42d5e70d81937f4d72b1dc07ca25b82b52de8a686ec7c371be05feeb2570e635686269106a628b9f017b13897e133de1080faf565e5eb3dcffebe63bde3a20a3605e1d161461f3ccb002bbe125f414ca10b7d071db94e815a42308c850918aad51248aaa42f4f34283fea5c6c95c89f390dc9d09d9bf1ccec3f7001afc9b5af8a2a0e51c10c1a3b40caae0451bda4c13f6b1903ca3e7953686faf4be06e392092ce357e604d0bf790b70ca244abb97e31cc6e6debcff129bf240b5b06f86418e15a1492d6ac4efcacf6ec96c56ad38ffadd62b9458ff0ae81ed5df28359fe440959ba9bb181fb26756ffd3ceb108586d40c2b3d1898b220ad597ead57bad0b2d146ad87cc44d85ad4085c004bf5bced9e29febb9849eb20819797c09e42084578f1ad35dfbcc7823b40e533104a0c795c4602d2ecad17479933c04c611cb0606092376f9103ff0fa704eab3ef06783d370b8c99736be7ffa25e94fa9092fde98805bc95d814b1227557bd339a47ed6e93c02c908087cc9aa8897fcb0ab9a2c2e7b372b38c9f9ce72cfdc9b2869363132b7ee8b1d2a6f39d2cf95bac9b95562cce51305ea39ed0d8126d60573bfcc786295775e36df6f28486a783bb0ddd9b2c572ea2441e54856a97fc877294c01570ecc90671f4f7ff8557ff1bed39b410abb09d4f60a698704858a2987c8fc2db82b90e9c97a7d0a09da56c08380afb7779235005cc9249bac82c8e5709ac3faf9883efe7dbcb04c3f18befd8692789f9a5f5a6fed3bee6be7e82064b10a96bab0eb7f52b5ab313b94fbb567cc182752c7b3eac77db485c1faae060b12e9ed446584f0d4764fae878e6c377fda6a109aa6c6a958c64b2ab50bf1ac02f11acfc25a31770ac4372544bcd02d5367f9aa8bb43f4ba512336a931bca269b217ac4e87b343e2a8e89967dd5ce5eb5177a628ad99291d5059f7e1e3bead48a77dfbecd207283b684e07e2102b2a52e9e56044979c9861f22a12bd3b1ac470f3f040c67cc43a10ff3fe0002161aa180e373c4a7fafaafb2ac77e1f33404005f36daade855006d9a119af1febe8b7f7ee78eac8f37e40fe7cfce4a3c83154a20e5cd3c469b94581cde18c937369ec27e95df2004880f2a872be7809f170e86886add40b09f47358603453af95305bd008de6a97afb4686290dcdcae4a3ebfb88367e217fbf08759e980740a7cbcf45f0e08d97f87279efc9503b9d3435cff2f88399c5df73886695114beaddbe256b290bd53b531ae94c4a68bf049d6871de80846b9a7221799f79d4dc04de0dae072a623246caef8558b5249ec98778461d09f408e2e55d4a4a5b6c3b5dfd1961d32434800e9c66a0ce4c14052b9049572e796843d5db33b5cb50272a1df47d394343c0ea9e3896477acc47bdf8cf75e5f73da84daaf6d9b2e93acfd7e61bc5049aba29f02f10b43a1472844a87ff80e46185f2a75a24f1cc5b6d1eaf3d7385ed8d85d0c2a6ef0c0d7e7d5dc36120e1b5673aa7e2e17813559f91a67b6779f49600455b051f4a6ca81c2c916ccd3e7edd2f45c9891461a68b2f50a38bd8d3bef9ab7e09e5369812f508d268bda2ec2993b4b68aa3879081b0786c850088dd4cf3cd798afb39603fcef853d000b6d1c5df891d33a18feb3f993c01f69afa99991ed9aa99acbd62250c401d2d599eff8d13ba19144f76ac4fe059cf04d32657f4b0c6f87304a288ac06a311a697f169efc563c53f044369cdddaa9284394ae86077ab957213cf891a7f5bdd8391be39bfa3d564be84d3196dd5720956de3bcd9ed39b0fb70bd784896b87eed94df522059a8f119ae7bd508237f09852026c8ab2261300dbf6f1d3ed78eb7d0f4982ef1fccfdcc8add2a7332ae1c727c5ec6773b82354bad6c89db73c2074c08886f9c7ef4f6372009ed744ada422dc7826b8ccafd5c17d37519", 0x1000}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593e", 0x88}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6, &(0x7f00000046c0)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp={0x44, 0x14, 0x51, 0x0, 0xa, [0x81, 0x6, 0x80000001, 0x5]}]}}}, @ip_retopts={{0x58, 0x0, 0x7, {[@ssrr={0x89, 0xf, 0xc1, [@remote, @empty, @empty]}, @ra={0x94, 0x4}, @noop, @rr={0x7, 0xf, 0x3d, [@rand_addr=0x10000, @loopback, @rand_addr=0x8]}, @rr={0x7, 0xb, 0x76, [@multicast2, @remote]}, @ssrr={0x89, 0x17, 0x4e, [@dev={0xac, 0x14, 0x14, 0x1e}, @loopback, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @local]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xc}}], 0xa0}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 980.160770][ T9873] CPU: 0 PID: 9873 Comm: syz-executor.5 Not tainted 5.5.0-rc1-syzkaller #0 [ 980.169435][ T9873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 980.179488][ T9873] Call Trace: [ 980.182796][ T9873] dump_stack+0x11d/0x181 [ 980.187146][ T9873] should_fail.cold+0xa/0x1a [ 980.191763][ T9873] __should_failslab+0xee/0x130 [ 980.196632][ T9873] should_failslab+0x9/0x14 [ 980.201222][ T9873] __kmalloc+0x53/0x690 [ 980.205417][ T9873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 980.211670][ T9873] ? preempt_count_add+0x6f/0xb0 [ 980.216723][ T9873] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 980.222683][ T9873] ? sock_kmalloc+0xbf/0x110 [ 980.227279][ T9873] sock_kmalloc+0xbf/0x110 [ 980.231708][ T9873] af_alg_alloc_areq+0x40/0x130 [ 980.236628][ T9873] aead_recvmsg+0x275/0xd60 [ 980.241147][ T9873] ? aead_release+0x50/0x50 [ 980.245787][ T9873] sock_recvmsg+0x92/0xb0 [ 980.250181][ T9873] ____sys_recvmsg+0x167/0x3a0 [ 980.255061][ T9873] ? copy_msghdr_from_user+0x246/0x320 [ 980.260711][ T9873] ___sys_recvmsg+0xb2/0x100 [ 980.265378][ T9873] ? __fget_light+0xaf/0x190 [ 980.270070][ T9873] ? __fdget+0x2c/0x40 [ 980.274264][ T9873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 980.280587][ T9873] __sys_recvmsg+0x9d/0x160 [ 980.285217][ T9873] __x64_sys_recvmsg+0x51/0x70 [ 980.290088][ T9873] do_syscall_64+0xcc/0x3a0 [ 980.294613][ T9873] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 980.300506][ T9873] RIP: 0033:0x45b399 [ 980.304485][ T9873] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 980.324128][ T9873] RSP: 002b:00007f9d703adc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 980.332608][ T9873] RAX: ffffffffffffffda RBX: 00007f9d703ae6d4 RCX: 000000000045b399 [ 980.340592][ T9873] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 980.348611][ T9873] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x3f00, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) [ 980.356634][ T9873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 980.364607][ T9873] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000004 [ 980.376065][T10072] FAULT_INJECTION: forcing a failure. [ 980.376065][T10072] name failslab, interval 1, probability 0, space 0, times 0 [ 980.387689][T10071] FAULT_INJECTION: forcing a failure. [ 980.387689][T10071] name failslab, interval 1, probability 0, space 0, times 0 [ 980.466912][T10071] CPU: 0 PID: 10071 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 980.475653][T10071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 980.485742][T10071] Call Trace: [ 980.489117][T10071] dump_stack+0x11d/0x181 [ 980.493530][T10071] should_fail.cold+0xa/0x1a [ 980.498249][T10071] __should_failslab+0xee/0x130 [ 980.503126][T10071] should_failslab+0x9/0x14 [ 980.507689][T10071] __kmalloc+0x53/0x690 [ 980.511861][T10071] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 980.518188][T10071] ? preempt_count_add+0x6f/0xb0 [ 980.523142][T10071] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 980.529916][T10071] ? sock_kmalloc+0xbf/0x110 [ 980.534587][T10071] sock_kmalloc+0xbf/0x110 [ 980.539069][T10071] af_alg_alloc_areq+0x40/0x130 [ 980.543934][T10071] aead_recvmsg+0x275/0xd60 [ 980.548458][T10071] ? aead_release+0x50/0x50 [ 980.552972][T10071] sock_recvmsg+0x92/0xb0 [ 980.557320][T10071] ____sys_recvmsg+0x167/0x3a0 [ 980.562103][T10071] ? copy_msghdr_from_user+0x246/0x320 [ 980.567583][T10071] ___sys_recvmsg+0xb2/0x100 [ 980.572227][T10071] ? __fget_light+0xaf/0x190 [ 980.576905][T10071] ? __fdget+0x2c/0x40 [ 980.580987][T10071] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 980.587251][T10071] __sys_recvmsg+0x9d/0x160 [ 980.591812][T10071] __x64_sys_recvmsg+0x51/0x70 [ 980.596596][T10071] do_syscall_64+0xcc/0x3a0 [ 980.601138][T10071] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 980.607100][T10071] RIP: 0033:0x45b399 [ 980.611017][T10071] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 980.630719][T10071] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 980.639138][T10071] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 980.647246][T10071] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 980.655227][T10071] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:18 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x40000000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) [ 980.663201][T10071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 980.671209][T10071] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000002 [ 980.683784][T10072] CPU: 0 PID: 10072 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 980.692584][T10072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 980.702636][T10072] Call Trace: [ 980.705936][T10072] dump_stack+0x11d/0x181 [ 980.710291][T10072] should_fail.cold+0xa/0x1a [ 980.715057][T10072] __should_failslab+0xee/0x130 [ 980.719918][T10072] should_failslab+0x9/0x14 [ 980.724438][T10072] __kmalloc+0x53/0x690 [ 980.728607][T10072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 980.734861][T10072] ? preempt_count_add+0x6f/0xb0 [ 980.739811][T10072] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 980.745768][T10072] ? sock_kmalloc+0xbf/0x110 [ 980.750377][T10072] sock_kmalloc+0xbf/0x110 [ 980.754887][T10072] af_alg_alloc_areq+0x40/0x130 [ 980.759754][T10072] aead_recvmsg+0x275/0xd60 [ 980.764323][T10072] ? aead_release+0x50/0x50 [ 980.768903][T10072] sock_recvmsg+0x92/0xb0 [ 980.773252][T10072] ____sys_recvmsg+0x167/0x3a0 [ 980.778032][T10072] ? copy_msghdr_from_user+0x246/0x320 [ 980.783521][T10072] ___sys_recvmsg+0xb2/0x100 [ 980.788132][T10072] ? __fget_light+0xaf/0x190 [ 980.792753][T10072] ? __fdget+0x2c/0x40 [ 980.796896][T10072] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 980.803197][T10072] __sys_recvmsg+0x9d/0x160 [ 980.807731][T10072] __x64_sys_recvmsg+0x51/0x70 [ 980.812512][T10072] do_syscall_64+0xcc/0x3a0 [ 980.817185][T10072] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 980.823081][T10072] RIP: 0033:0x45b399 [ 980.827003][T10072] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 980.846615][T10072] RSP: 002b:00007f766211ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 980.855049][T10072] RAX: ffffffffffffffda RBX: 00007f766211f6d4 RCX: 000000000045b399 09:27:19 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)="25288a17ffdb3d33238e181216cf52a4423f2952252bd67c240e7253d2362edbeb9cd9be7e44bdadf43b5150d3ba188b092f26eade0cc24b576716c90e7bfb95fb1a70b0c13cd1dbf6a5bdc6a7ce", 0x4e}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{&(0x7f0000002100)="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", 0x1000}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593e", 0x88}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6, &(0x7f00000046c0)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp={0x44, 0x14, 0x51, 0x0, 0xa, [0x81, 0x6, 0x80000001, 0x5]}]}}}, @ip_retopts={{0x58, 0x0, 0x7, {[@ssrr={0x89, 0xf, 0xc1, [@remote, @empty, @empty]}, @ra={0x94, 0x4}, @noop, @rr={0x7, 0xf, 0x3d, [@rand_addr=0x10000, @loopback, @rand_addr=0x8]}, @rr={0x7, 0xb, 0x76, [@multicast2, @remote]}, @ssrr={0x89, 0x17, 0x4e, [@dev={0xac, 0x14, 0x14, 0x1e}, @loopback, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @local]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xc}}], 0xa0}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:19 executing program 3 (fault-call:5 fault-nth:3): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) [ 980.863028][T10072] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 980.871035][T10072] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 980.879009][T10072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 980.887018][T10072] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000005 [ 980.959164][T10349] FAULT_INJECTION: forcing a failure. [ 980.959164][T10349] name failslab, interval 1, probability 0, space 0, times 0 [ 980.981154][T10349] CPU: 0 PID: 10349 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 980.989853][T10349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 980.999911][T10349] Call Trace: [ 981.003282][T10349] dump_stack+0x11d/0x181 [ 981.007629][T10349] should_fail.cold+0xa/0x1a [ 981.012234][T10349] __should_failslab+0xee/0x130 [ 981.017207][T10349] should_failslab+0x9/0x14 [ 981.021727][T10349] __kmalloc+0x53/0x690 [ 981.025966][T10349] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 981.032215][T10349] ? preempt_count_add+0x6f/0xb0 [ 981.037164][T10349] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 981.043085][T10349] ? sock_kmalloc+0xbf/0x110 [ 981.047682][T10349] sock_kmalloc+0xbf/0x110 [ 981.052107][T10349] af_alg_alloc_areq+0x40/0x130 [ 981.057126][T10349] aead_recvmsg+0x275/0xd60 [ 981.061660][T10349] ? aead_release+0x50/0x50 [ 981.066187][T10349] sock_recvmsg+0x92/0xb0 [ 981.070561][T10349] ____sys_recvmsg+0x167/0x3a0 [ 981.075347][T10349] ? copy_msghdr_from_user+0x246/0x320 [ 981.080825][T10349] ___sys_recvmsg+0xb2/0x100 [ 981.085512][T10349] ? __fget_light+0xaf/0x190 [ 981.090177][T10349] ? __fdget+0x2c/0x40 [ 981.094259][T10349] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 981.100507][T10349] __sys_recvmsg+0x9d/0x160 [ 981.105135][T10349] __x64_sys_recvmsg+0x51/0x70 09:27:19 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x4000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) [ 981.109925][T10349] do_syscall_64+0xcc/0x3a0 [ 981.114447][T10349] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 981.120446][T10349] RIP: 0033:0x45b399 [ 981.124469][T10349] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 981.144079][T10349] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f 09:27:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) [ 981.152539][T10349] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 981.160558][T10349] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 981.168664][T10349] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 981.176643][T10349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 981.184646][T10349] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000003 09:27:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:19 executing program 3 (fault-call:5 fault-nth:4): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:19 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)="25288a17ffdb3d33238e181216cf52a4423f2952252bd67c240e7253d2362edbeb9cd9be7e44bdadf43b5150d3ba188b092f26eade0cc24b576716c90e7bfb95fb1a70b0c13cd1dbf6a5bdc6a7ce", 0x4e}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x5, &(0x7f00000046c0)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp={0x44, 0x14, 0x51, 0x0, 0xa, [0x81, 0x6, 0x80000001, 0x5]}]}}}, @ip_retopts={{0x58, 0x0, 0x7, {[@ssrr={0x89, 0xf, 0xc1, [@remote, @empty, @empty]}, @ra={0x94, 0x4}, @noop, @rr={0x7, 0xf, 0x3d, [@rand_addr=0x10000, @loopback, @rand_addr=0x8]}, @rr={0x7, 0xb, 0x76, [@multicast2, @remote]}, @ssrr={0x89, 0x17, 0x4e, [@dev={0xac, 0x14, 0x14, 0x1e}, @loopback, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @local]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xc}}], 0xa0}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 981.421024][T10404] FAULT_INJECTION: forcing a failure. [ 981.421024][T10404] name failslab, interval 1, probability 0, space 0, times 0 [ 981.454164][T10404] CPU: 1 PID: 10404 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 981.462888][T10404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.472938][T10404] Call Trace: [ 981.476240][T10404] dump_stack+0x11d/0x181 [ 981.480636][T10404] should_fail.cold+0xa/0x1a [ 981.485234][T10404] __should_failslab+0xee/0x130 [ 981.490169][T10404] should_failslab+0x9/0x14 [ 981.494730][T10404] __kmalloc+0x53/0x690 [ 981.498936][T10404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 981.505268][T10404] ? preempt_count_add+0x6f/0xb0 [ 981.510254][T10404] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 981.516157][T10404] ? sock_kmalloc+0xbf/0x110 [ 981.520759][T10404] sock_kmalloc+0xbf/0x110 [ 981.525241][T10404] af_alg_alloc_areq+0x40/0x130 [ 981.530180][T10404] aead_recvmsg+0x275/0xd60 [ 981.534700][T10404] ? aead_release+0x50/0x50 [ 981.539213][T10404] sock_recvmsg+0x92/0xb0 [ 981.543577][T10404] ____sys_recvmsg+0x167/0x3a0 [ 981.548354][T10404] ? copy_msghdr_from_user+0x246/0x320 [ 981.553854][T10404] ___sys_recvmsg+0xb2/0x100 [ 981.558462][T10404] ? __fget_light+0xaf/0x190 [ 981.563070][T10404] ? __fdget+0x2c/0x40 [ 981.567150][T10404] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 981.573485][T10404] __sys_recvmsg+0x9d/0x160 [ 981.578008][T10404] __x64_sys_recvmsg+0x51/0x70 [ 981.582796][T10404] do_syscall_64+0xcc/0x3a0 [ 981.587334][T10404] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 981.593226][T10404] RIP: 0033:0x45b399 [ 981.597133][T10404] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:27:19 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x10}], 0x1}, 0x0) 09:27:19 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)="25288a17ffdb3d33238e181216cf52a4423f2952252bd67c240e7253d2362edbeb9cd9be7e44bdadf43b5150d3ba188b092f26eade0cc24b576716c90e7bfb95fb1a70b0c13cd1dbf6a5bdc6a7ce", 0x4e}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x5, &(0x7f00000046c0)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp={0x44, 0x14, 0x51, 0x0, 0xa, [0x81, 0x6, 0x80000001, 0x5]}]}}}, @ip_retopts={{0x58, 0x0, 0x7, {[@ssrr={0x89, 0xf, 0xc1, [@remote, @empty, @empty]}, @ra={0x94, 0x4}, @noop, @rr={0x7, 0xf, 0x3d, [@rand_addr=0x10000, @loopback, @rand_addr=0x8]}, @rr={0x7, 0xb, 0x76, [@multicast2, @remote]}, @ssrr={0x89, 0x17, 0x4e, [@dev={0xac, 0x14, 0x14, 0x1e}, @loopback, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @local]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xc}}], 0xa0}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 981.616739][T10404] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 981.625163][T10404] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 981.633189][T10404] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 981.641213][T10404] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 981.649205][T10404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 981.657174][T10404] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000004 09:27:20 executing program 3 (fault-call:5 fault-nth:5): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe703, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x30}], 0x1}, 0x0) [ 981.978032][T10722] FAULT_INJECTION: forcing a failure. [ 981.978032][T10722] name failslab, interval 1, probability 0, space 0, times 0 [ 982.022625][T10722] CPU: 0 PID: 10722 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 982.031484][T10722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 982.041542][T10722] Call Trace: [ 982.044846][T10722] dump_stack+0x11d/0x181 [ 982.049300][T10722] should_fail.cold+0xa/0x1a [ 982.054030][T10722] __should_failslab+0xee/0x130 [ 982.058983][T10722] should_failslab+0x9/0x14 [ 982.063509][T10722] __kmalloc+0x53/0x690 [ 982.067678][T10722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 982.073928][T10722] ? preempt_count_add+0x6f/0xb0 [ 982.078877][T10722] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 982.084897][T10722] ? sock_kmalloc+0xbf/0x110 [ 982.089501][T10722] sock_kmalloc+0xbf/0x110 [ 982.093936][T10722] af_alg_alloc_areq+0x40/0x130 [ 982.098832][T10722] aead_recvmsg+0x275/0xd60 [ 982.103367][T10722] ? aead_release+0x50/0x50 [ 982.107889][T10722] sock_recvmsg+0x92/0xb0 [ 982.112239][T10722] ____sys_recvmsg+0x167/0x3a0 [ 982.117072][T10722] ? copy_msghdr_from_user+0x246/0x320 [ 982.122552][T10722] ___sys_recvmsg+0xb2/0x100 [ 982.127158][T10722] ? __fget_light+0xaf/0x190 [ 982.131777][T10722] ? __fdget+0x2c/0x40 [ 982.135896][T10722] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 982.142146][T10722] __sys_recvmsg+0x9d/0x160 [ 982.146749][T10722] __x64_sys_recvmsg+0x51/0x70 [ 982.151526][T10722] do_syscall_64+0xcc/0x3a0 [ 982.156097][T10722] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 982.162039][T10722] RIP: 0033:0x45b399 [ 982.165957][T10722] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 982.185586][T10722] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 982.193999][T10722] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 982.201973][T10722] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 982.209942][T10722] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:20 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)="25288a17ffdb3d33238e181216cf52a4423f2952252bd67c240e7253d2362edbeb9cd9be7e44bdadf43b5150d3ba188b092f26eade0cc24b576716c90e7bfb95fb1a70b0c13cd1dbf6a5bdc6a7ce", 0x4e}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x5, &(0x7f00000046c0)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp={0x44, 0x14, 0x51, 0x0, 0xa, [0x81, 0x6, 0x80000001, 0x5]}]}}}, @ip_retopts={{0x58, 0x0, 0x7, {[@ssrr={0x89, 0xf, 0xc1, [@remote, @empty, @empty]}, @ra={0x94, 0x4}, @noop, @rr={0x7, 0xf, 0x3d, [@rand_addr=0x10000, @loopback, @rand_addr=0x8]}, @rr={0x7, 0xb, 0x76, [@multicast2, @remote]}, @ssrr={0x89, 0x17, 0x4e, [@dev={0xac, 0x14, 0x14, 0x1e}, @loopback, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @local]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xc}}], 0xa0}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x3e7, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) [ 982.217917][T10722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 982.225890][T10722] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000005 09:27:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:20 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x50}], 0x1}, 0x0) 09:27:20 executing program 3 (fault-call:5 fault-nth:6): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x3e7, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) [ 982.588543][T10995] FAULT_INJECTION: forcing a failure. [ 982.588543][T10995] name failslab, interval 1, probability 0, space 0, times 0 [ 982.633836][T10995] CPU: 1 PID: 10995 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 982.642540][T10995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 982.652593][T10995] Call Trace: [ 982.655896][T10995] dump_stack+0x11d/0x181 [ 982.660239][T10995] should_fail.cold+0xa/0x1a [ 982.664903][T10995] __should_failslab+0xee/0x130 [ 982.669766][T10995] should_failslab+0x9/0x14 [ 982.674285][T10995] __kmalloc+0x53/0x690 09:27:20 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) [ 982.678494][T10995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 982.684760][T10995] ? preempt_count_add+0x6f/0xb0 [ 982.689741][T10995] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 982.695707][T10995] ? sock_kmalloc+0xbf/0x110 [ 982.700304][T10995] sock_kmalloc+0xbf/0x110 [ 982.704747][T10995] af_alg_alloc_areq+0x40/0x130 [ 982.709604][T10995] aead_recvmsg+0x275/0xd60 [ 982.714197][T10995] ? aead_release+0x50/0x50 [ 982.718719][T10995] sock_recvmsg+0x92/0xb0 [ 982.723076][T10995] ____sys_recvmsg+0x167/0x3a0 [ 982.727919][T10995] ? copy_msghdr_from_user+0x246/0x320 09:27:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x3f00, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) [ 982.733405][T10995] ___sys_recvmsg+0xb2/0x100 [ 982.738012][T10995] ? __fget_light+0xaf/0x190 [ 982.742613][T10995] ? __fdget+0x2c/0x40 [ 982.746698][T10995] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 982.752955][T10995] __sys_recvmsg+0x9d/0x160 [ 982.757622][T10995] __x64_sys_recvmsg+0x51/0x70 [ 982.762448][T10995] do_syscall_64+0xcc/0x3a0 [ 982.767001][T10995] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 982.772951][T10995] RIP: 0033:0x45b399 [ 982.776855][T10995] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 982.796457][T10995] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 982.804933][T10995] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 982.812978][T10995] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 982.820948][T10995] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x60}], 0x1}, 0x0) [ 982.829109][T10995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 982.837085][T10995] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000006 09:27:21 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)="25288a17ffdb3d33238e181216cf52a4423f2952252bd67c240e7253d2362edbeb9cd9be7e44bdadf43b5150d3ba188b092f26eade0cc24b576716c90e7bfb95fb1a70b0c13cd1dbf6a5bdc6a7ce", 0x4e}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6, &(0x7f00000046c0)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp={0x44, 0x14, 0x51, 0x0, 0xa, [0x81, 0x6, 0x80000001, 0x5]}]}}}, @ip_retopts={{0x58, 0x0, 0x7, {[@ssrr={0x89, 0xf, 0xc1, [@remote, @empty, @empty]}, @ra={0x94, 0x4}, @noop, @rr={0x7, 0xf, 0x3d, [@rand_addr=0x10000, @loopback, @rand_addr=0x8]}, @rr={0x7, 0xb, 0x76, [@multicast2, @remote]}, @ssrr={0x89, 0x17, 0x4e, [@dev={0xac, 0x14, 0x14, 0x1e}, @loopback, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @local]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xc}}], 0xa0}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:21 executing program 3 (fault-call:5 fault-nth:7): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x3f00, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x70}], 0x1}, 0x0) 09:27:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x40000000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x4000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) [ 983.178382][T11382] FAULT_INJECTION: forcing a failure. [ 983.178382][T11382] name failslab, interval 1, probability 0, space 0, times 0 [ 983.247598][T11382] CPU: 1 PID: 11382 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 983.256381][T11382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.266539][T11382] Call Trace: [ 983.269837][T11382] dump_stack+0x11d/0x181 [ 983.274287][T11382] should_fail.cold+0xa/0x1a [ 983.278889][T11382] __should_failslab+0xee/0x130 [ 983.283784][T11382] should_failslab+0x9/0x14 [ 983.288303][T11382] __kmalloc+0x53/0x690 [ 983.292476][T11382] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 983.298829][T11382] ? preempt_count_add+0x6f/0xb0 [ 983.303786][T11382] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 983.309688][T11382] ? sock_kmalloc+0xbf/0x110 [ 983.314397][T11382] sock_kmalloc+0xbf/0x110 [ 983.318910][T11382] af_alg_alloc_areq+0x40/0x130 [ 983.323871][T11382] aead_recvmsg+0x275/0xd60 [ 983.328412][T11382] ? aead_release+0x50/0x50 [ 983.333047][T11382] sock_recvmsg+0x92/0xb0 [ 983.337407][T11382] ____sys_recvmsg+0x167/0x3a0 [ 983.342313][T11382] ? copy_msghdr_from_user+0x246/0x320 [ 983.347916][T11382] ___sys_recvmsg+0xb2/0x100 [ 983.352525][T11382] ? __fget_light+0xaf/0x190 [ 983.357126][T11382] ? __fdget+0x2c/0x40 [ 983.361228][T11382] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 983.367537][T11382] __sys_recvmsg+0x9d/0x160 [ 983.372166][T11382] __x64_sys_recvmsg+0x51/0x70 [ 983.377003][T11382] do_syscall_64+0xcc/0x3a0 [ 983.381525][T11382] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 983.387499][T11382] RIP: 0033:0x45b399 [ 983.391440][T11382] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 983.411069][T11382] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 983.419490][T11382] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 983.427466][T11382] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 983.435443][T11382] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x90}], 0x1}, 0x0) 09:27:21 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)="25288a17ffdb3d33238e181216cf52a4423f2952252bd67c240e7253d2362edbeb9cd9be7e44bdadf43b5150d3ba188b092f26eade0cc24b576716c90e7bfb95fb1a70b0c13cd1dbf6a5bdc6a7ce", 0x4e}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6, &(0x7f00000046c0)=[@ip_retopts={{0x2c, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @noop, @timestamp={0x44, 0x14, 0x51, 0x0, 0xa, [0x81, 0x6, 0x80000001, 0x5]}]}}}, @ip_retopts={{0x58, 0x0, 0x7, {[@ssrr={0x89, 0xf, 0xc1, [@remote, @empty, @empty]}, @ra={0x94, 0x4}, @noop, @rr={0x7, 0xf, 0x3d, [@rand_addr=0x10000, @loopback, @rand_addr=0x8]}, @rr={0x7, 0xb, 0x76, [@multicast2, @remote]}, @ssrr={0x89, 0x17, 0x4e, [@dev={0xac, 0x14, 0x14, 0x1e}, @loopback, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @local]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xc}}], 0xa0}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 983.443429][T11382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 983.451405][T11382] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000007 09:27:21 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x4000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:21 executing program 3 (fault-call:5 fault-nth:8): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe703, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xa0}], 0x1}, 0x0) [ 983.850959][T11770] FAULT_INJECTION: forcing a failure. [ 983.850959][T11770] name failslab, interval 1, probability 0, space 0, times 0 [ 983.874253][T11770] CPU: 0 PID: 11770 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 983.882952][T11770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.893006][T11770] Call Trace: [ 983.896299][T11770] dump_stack+0x11d/0x181 [ 983.900638][T11770] should_fail.cold+0xa/0x1a [ 983.905253][T11770] __should_failslab+0xee/0x130 [ 983.910121][T11770] should_failslab+0x9/0x14 [ 983.914638][T11770] __kmalloc+0x53/0x690 [ 983.918888][T11770] ? preempt_count_add+0x6f/0xb0 [ 983.923839][T11770] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 983.929813][T11770] ? sock_kmalloc+0xbf/0x110 [ 983.934422][T11770] sock_kmalloc+0xbf/0x110 [ 983.938883][T11770] af_alg_alloc_areq+0x40/0x130 [ 983.943813][T11770] aead_recvmsg+0x275/0xd60 [ 983.948345][T11770] ? aead_release+0x50/0x50 [ 983.952934][T11770] sock_recvmsg+0x92/0xb0 [ 983.957315][T11770] ____sys_recvmsg+0x167/0x3a0 [ 983.962133][T11770] ? copy_msghdr_from_user+0x246/0x320 [ 983.967705][T11770] ___sys_recvmsg+0xb2/0x100 [ 983.972328][T11770] ? __fget_light+0xaf/0x190 [ 983.976935][T11770] ? __fdget+0x2c/0x40 [ 983.981018][T11770] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 983.987355][T11770] __sys_recvmsg+0x9d/0x160 [ 983.991937][T11770] __x64_sys_recvmsg+0x51/0x70 [ 983.996715][T11770] do_syscall_64+0xcc/0x3a0 [ 984.001228][T11770] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 984.007132][T11770] RIP: 0033:0x45b399 [ 984.011040][T11770] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 984.030710][T11770] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 984.039126][T11770] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 09:27:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x10}], 0x1}, 0x0) 09:27:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe703, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xb0}], 0x1}, 0x0) [ 984.047102][T11770] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 984.055077][T11770] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 984.063051][T11770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 984.071027][T11770] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000008 09:27:22 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)="25288a17ffdb3d33238e181216cf52a4423f2952252bd67c240e7253d2362edbeb9cd9be7e44bdadf43b5150d3ba188b092f26eade0cc24b576716c90e7bfb95fb1a70b0c13cd1dbf6a5bdc6a7ce", 0x4e}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:22 executing program 3 (fault-call:5 fault-nth:9): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x30}], 0x1}, 0x0) 09:27:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xc0}], 0x1}, 0x0) [ 984.469601][T12163] FAULT_INJECTION: forcing a failure. [ 984.469601][T12163] name failslab, interval 1, probability 0, space 0, times 0 09:27:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) [ 984.514299][T12163] CPU: 1 PID: 12163 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 984.523001][T12163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.533055][T12163] Call Trace: [ 984.536358][T12163] dump_stack+0x11d/0x181 [ 984.540707][T12163] should_fail.cold+0xa/0x1a [ 984.545305][T12163] __should_failslab+0xee/0x130 [ 984.550165][T12163] should_failslab+0x9/0x14 [ 984.554707][T12163] __kmalloc+0x53/0x690 [ 984.558880][T12163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 984.565166][T12163] ? preempt_count_add+0x6f/0xb0 [ 984.570193][T12163] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 984.576096][T12163] ? sock_kmalloc+0xbf/0x110 [ 984.580801][T12163] sock_kmalloc+0xbf/0x110 [ 984.585267][T12163] af_alg_alloc_areq+0x40/0x130 [ 984.590186][T12163] aead_recvmsg+0x275/0xd60 [ 984.594700][T12163] ? aead_release+0x50/0x50 [ 984.599239][T12163] sock_recvmsg+0x92/0xb0 [ 984.603593][T12163] ____sys_recvmsg+0x167/0x3a0 [ 984.608370][T12163] ? copy_msghdr_from_user+0x246/0x320 09:27:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x50}], 0x1}, 0x0) [ 984.613846][T12163] ___sys_recvmsg+0xb2/0x100 [ 984.618449][T12163] ? __fget_light+0xaf/0x190 [ 984.623052][T12163] ? __fdget+0x2c/0x40 [ 984.627135][T12163] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 984.633386][T12163] __sys_recvmsg+0x9d/0x160 [ 984.637909][T12163] __x64_sys_recvmsg+0x51/0x70 [ 984.642691][T12163] do_syscall_64+0xcc/0x3a0 [ 984.647269][T12163] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 984.653157][T12163] RIP: 0033:0x45b399 [ 984.657060][T12163] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 984.676669][T12163] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 984.685081][T12163] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 984.693074][T12163] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 984.701047][T12163] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) [ 984.709161][T12163] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 984.717136][T12163] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000009 09:27:23 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)="25288a17ffdb3d33238e181216cf52a4423f2952252bd67c240e7253d2362edbeb9cd9be7e44bdadf43b5150d3ba188b092f26eade0cc24b576716c90e7bfb95fb1a70b0c13cd1dbf6a5bdc6a7ce", 0x4e}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:23 executing program 3 (fault-call:5 fault-nth:10): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x60}], 0x1}, 0x0) 09:27:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xd0}], 0x1}, 0x0) [ 984.978938][T12531] FAULT_INJECTION: forcing a failure. [ 984.978938][T12531] name failslab, interval 1, probability 0, space 0, times 0 [ 985.059096][T12531] CPU: 1 PID: 12531 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 985.067802][T12531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 985.077860][T12531] Call Trace: [ 985.081162][T12531] dump_stack+0x11d/0x181 [ 985.085505][T12531] should_fail.cold+0xa/0x1a [ 985.090109][T12531] __should_failslab+0xee/0x130 [ 985.094966][T12531] should_failslab+0x9/0x14 [ 985.099505][T12531] __kmalloc+0x53/0x690 [ 985.103671][T12531] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 985.109926][T12531] ? preempt_count_add+0x6f/0xb0 [ 985.114953][T12531] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 985.120855][T12531] ? sock_kmalloc+0xbf/0x110 [ 985.125454][T12531] sock_kmalloc+0xbf/0x110 [ 985.129945][T12531] af_alg_alloc_areq+0x40/0x130 [ 985.134824][T12531] aead_recvmsg+0x275/0xd60 [ 985.139496][T12531] ? aead_release+0x50/0x50 [ 985.144006][T12531] sock_recvmsg+0x92/0xb0 [ 985.148346][T12531] ____sys_recvmsg+0x167/0x3a0 [ 985.153192][T12531] ? copy_msghdr_from_user+0x246/0x320 09:27:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x70}], 0x1}, 0x0) 09:27:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xe0}], 0x1}, 0x0) [ 985.158689][T12531] ___sys_recvmsg+0xb2/0x100 [ 985.163299][T12531] ? __fget_light+0xaf/0x190 [ 985.167948][T12531] ? __fdget+0x2c/0x40 [ 985.172058][T12531] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 985.178384][T12531] __sys_recvmsg+0x9d/0x160 [ 985.182917][T12531] __x64_sys_recvmsg+0x51/0x70 [ 985.187779][T12531] do_syscall_64+0xcc/0x3a0 [ 985.192365][T12531] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 985.198250][T12531] RIP: 0033:0x45b399 [ 985.202158][T12531] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 985.221768][T12531] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 985.230190][T12531] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 985.238295][T12531] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 985.246270][T12531] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x40000000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x40000000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) [ 985.254246][T12531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 985.262263][T12531] R13: 0000000000000891 R14: 00000000004c9f88 R15: 000000000000000a 09:27:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x90}], 0x1}, 0x0) 09:27:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xf0}], 0x1}, 0x0) 09:27:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:23 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r6, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x3, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:23 executing program 3 (fault-call:5 fault-nth:11): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x110}], 0x1}, 0x0) 09:27:23 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xa0}], 0x1}, 0x0) [ 985.799343][T13195] FAULT_INJECTION: forcing a failure. [ 985.799343][T13195] name failslab, interval 1, probability 0, space 0, times 0 [ 985.824786][T13195] CPU: 1 PID: 13195 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 985.833484][T13195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 985.843598][T13195] Call Trace: 09:27:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x10}], 0x1}, 0x0) [ 985.846999][T13195] dump_stack+0x11d/0x181 [ 985.851347][T13195] should_fail.cold+0xa/0x1a [ 985.855962][T13195] __should_failslab+0xee/0x130 [ 985.860986][T13195] should_failslab+0x9/0x14 [ 985.865520][T13195] __kmalloc+0x53/0x690 [ 985.869696][T13195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 985.875950][T13195] ? preempt_count_add+0x6f/0xb0 [ 985.880900][T13195] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 985.886837][T13195] ? sock_kmalloc+0xbf/0x110 [ 985.891442][T13195] sock_kmalloc+0xbf/0x110 [ 985.895942][T13195] af_alg_alloc_areq+0x40/0x130 [ 985.900805][T13195] aead_recvmsg+0x275/0xd60 [ 985.905328][T13195] ? aead_release+0x50/0x50 [ 985.909900][T13195] sock_recvmsg+0x92/0xb0 [ 985.914296][T13195] ____sys_recvmsg+0x167/0x3a0 [ 985.919079][T13195] ? copy_msghdr_from_user+0x246/0x320 [ 985.924618][T13195] ___sys_recvmsg+0xb2/0x100 [ 985.929227][T13195] ? __fget_light+0xaf/0x190 [ 985.933890][T13195] ? __fdget+0x2c/0x40 [ 985.937975][T13195] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 985.944294][T13195] __sys_recvmsg+0x9d/0x160 09:27:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xb0}], 0x1}, 0x0) [ 985.948818][T13195] __x64_sys_recvmsg+0x51/0x70 [ 985.953651][T13195] do_syscall_64+0xcc/0x3a0 [ 985.958219][T13195] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 985.964113][T13195] RIP: 0033:0x45b399 [ 985.968036][T13195] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 985.987805][T13195] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 985.996407][T13195] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 986.004381][T13195] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 986.012354][T13195] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 986.020340][T13195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 986.028320][T13195] R13: 0000000000000891 R14: 00000000004c9f88 R15: 000000000000000b 09:27:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x30}], 0x1}, 0x0) 09:27:24 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x10}], 0x1}, 0x0) 09:27:24 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r6, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x3, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x120}], 0x1}, 0x0) 09:27:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xc0}], 0x1}, 0x0) 09:27:24 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x30}], 0x1}, 0x0) 09:27:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x50}], 0x1}, 0x0) 09:27:24 executing program 3 (fault-call:5 fault-nth:12): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xd0}], 0x1}, 0x0) 09:27:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x130}], 0x1}, 0x0) 09:27:24 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x50}], 0x1}, 0x0) 09:27:24 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x60}], 0x1}, 0x0) [ 986.695796][T13756] FAULT_INJECTION: forcing a failure. [ 986.695796][T13756] name failslab, interval 1, probability 0, space 0, times 0 [ 986.737601][T13756] CPU: 0 PID: 13756 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 986.746309][T13756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 986.756420][T13756] Call Trace: [ 986.759739][T13756] dump_stack+0x11d/0x181 [ 986.764114][T13756] should_fail.cold+0xa/0x1a [ 986.768712][T13756] __should_failslab+0xee/0x130 [ 986.773638][T13756] should_failslab+0x9/0x14 [ 986.778157][T13756] __kmalloc+0x53/0x690 09:27:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x70}], 0x1}, 0x0) 09:27:25 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x60}], 0x1}, 0x0) [ 986.782325][T13756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 986.788573][T13756] ? preempt_count_add+0x6f/0xb0 [ 986.793616][T13756] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 986.799519][T13756] ? sock_kmalloc+0xbf/0x110 [ 986.804117][T13756] sock_kmalloc+0xbf/0x110 [ 986.808540][T13756] af_alg_alloc_areq+0x40/0x130 [ 986.813410][T13756] aead_recvmsg+0x275/0xd60 [ 986.817936][T13756] ? aead_release+0x50/0x50 [ 986.822466][T13756] sock_recvmsg+0x92/0xb0 [ 986.826813][T13756] ____sys_recvmsg+0x167/0x3a0 [ 986.831705][T13756] ? copy_msghdr_from_user+0x246/0x320 09:27:25 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r6, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x3, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 986.837241][T13756] ___sys_recvmsg+0xb2/0x100 [ 986.841853][T13756] ? __fget_light+0xaf/0x190 [ 986.846518][T13756] ? __fdget+0x2c/0x40 [ 986.850597][T13756] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 986.856918][T13756] __sys_recvmsg+0x9d/0x160 [ 986.861475][T13756] __x64_sys_recvmsg+0x51/0x70 [ 986.866251][T13756] do_syscall_64+0xcc/0x3a0 [ 986.870769][T13756] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 986.876696][T13756] RIP: 0033:0x45b399 [ 986.880655][T13756] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 986.900457][T13756] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 986.908869][T13756] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 986.916839][T13756] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 986.924900][T13756] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 986.932872][T13756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 986.940901][T13756] R13: 0000000000000891 R14: 00000000004c9f88 R15: 000000000000000c 09:27:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x90}], 0x1}, 0x0) 09:27:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xe0}], 0x1}, 0x0) 09:27:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x140}], 0x1}, 0x0) 09:27:25 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x70}], 0x1}, 0x0) 09:27:25 executing program 3 (fault-call:5 fault-nth:13): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xa0}], 0x1}, 0x0) 09:27:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xf0}], 0x1}, 0x0) [ 987.370938][T14177] FAULT_INJECTION: forcing a failure. [ 987.370938][T14177] name failslab, interval 1, probability 0, space 0, times 0 [ 987.392525][T14177] CPU: 1 PID: 14177 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 987.401225][T14177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 987.411313][T14177] Call Trace: [ 987.414680][T14177] dump_stack+0x11d/0x181 [ 987.419030][T14177] should_fail.cold+0xa/0x1a [ 987.423631][T14177] __should_failslab+0xee/0x130 [ 987.428493][T14177] should_failslab+0x9/0x14 [ 987.433085][T14177] __kmalloc+0x53/0x690 [ 987.437255][T14177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 987.443512][T14177] ? preempt_count_add+0x6f/0xb0 [ 987.448460][T14177] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 987.454359][T14177] ? sock_kmalloc+0xbf/0x110 [ 987.459041][T14177] sock_kmalloc+0xbf/0x110 [ 987.463535][T14177] af_alg_alloc_areq+0x40/0x130 [ 987.468472][T14177] aead_recvmsg+0x275/0xd60 [ 987.473015][T14177] ? aead_release+0x50/0x50 [ 987.477698][T14177] sock_recvmsg+0x92/0xb0 [ 987.482070][T14177] ____sys_recvmsg+0x167/0x3a0 [ 987.486865][T14177] ? copy_msghdr_from_user+0x246/0x320 [ 987.492347][T14177] ___sys_recvmsg+0xb2/0x100 [ 987.496981][T14177] ? __fget_light+0xaf/0x190 [ 987.501629][T14177] ? __fdget+0x2c/0x40 [ 987.505765][T14177] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 987.512012][T14177] __sys_recvmsg+0x9d/0x160 [ 987.516582][T14177] __x64_sys_recvmsg+0x51/0x70 [ 987.521363][T14177] do_syscall_64+0xcc/0x3a0 [ 987.525935][T14177] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 987.531843][T14177] RIP: 0033:0x45b399 [ 987.535812][T14177] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 987.558125][T14177] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f 09:27:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x150}], 0x1}, 0x0) 09:27:25 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x90}], 0x1}, 0x0) 09:27:25 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x110}], 0x1}, 0x0) 09:27:25 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xa0}], 0x1}, 0x0) [ 987.566547][T14177] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 987.574545][T14177] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 987.582514][T14177] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 987.590488][T14177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 987.598465][T14177] R13: 0000000000000891 R14: 00000000004c9f88 R15: 000000000000000d 09:27:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)="25288a17ffdb3d33238e181216cf52a4423f2952252bd67c240e7253d2362edbeb9cd9be7e44bdadf43b5150d3ba188b092f26eade0cc24b576716c90e7bfb95fb1a70b0c13cd1dbf6a5bdc6a7ce", 0x4e}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x160}], 0x1}, 0x0) 09:27:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xb0}], 0x1}, 0x0) 09:27:26 executing program 3 (fault-call:5 fault-nth:14): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x120}], 0x1}, 0x0) 09:27:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xb0}], 0x1}, 0x0) [ 987.918301][T14632] FAULT_INJECTION: forcing a failure. [ 987.918301][T14632] name failslab, interval 1, probability 0, space 0, times 0 09:27:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x170}], 0x1}, 0x0) [ 987.987247][T14632] CPU: 0 PID: 14632 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 987.995963][T14632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 988.006020][T14632] Call Trace: [ 988.009345][T14632] dump_stack+0x11d/0x181 [ 988.013704][T14632] should_fail.cold+0xa/0x1a [ 988.018304][T14632] __should_failslab+0xee/0x130 [ 988.023184][T14632] should_failslab+0x9/0x14 [ 988.027697][T14632] __kmalloc+0x53/0x690 09:27:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xc0}], 0x1}, 0x0) [ 988.031858][T14632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 988.038105][T14632] ? preempt_count_add+0x6f/0xb0 [ 988.043097][T14632] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 988.049078][T14632] ? sock_kmalloc+0xbf/0x110 [ 988.053750][T14632] sock_kmalloc+0xbf/0x110 [ 988.058178][T14632] af_alg_alloc_areq+0x40/0x130 [ 988.063041][T14632] aead_recvmsg+0x275/0xd60 [ 988.067565][T14632] ? aead_release+0x50/0x50 [ 988.072088][T14632] sock_recvmsg+0x92/0xb0 [ 988.076496][T14632] ____sys_recvmsg+0x167/0x3a0 [ 988.081278][T14632] ? copy_msghdr_from_user+0x246/0x320 [ 988.086826][T14632] ___sys_recvmsg+0xb2/0x100 [ 988.091461][T14632] ? __fget_light+0xaf/0x190 [ 988.096419][T14632] ? __fdget+0x2c/0x40 [ 988.100602][T14632] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 988.106853][T14632] __sys_recvmsg+0x9d/0x160 [ 988.111378][T14632] __x64_sys_recvmsg+0x51/0x70 [ 988.116189][T14632] do_syscall_64+0xcc/0x3a0 [ 988.120764][T14632] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 988.126658][T14632] RIP: 0033:0x45b399 [ 988.130624][T14632] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 988.150225][T14632] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 988.158693][T14632] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 988.166667][T14632] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 988.174637][T14632] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xd0}], 0x1}, 0x0) 09:27:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)="25288a17ffdb3d33238e181216cf52a4423f2952252bd67c240e7253d2362edbeb9cd9be7e44bdadf43b5150d3ba188b092f26eade0cc24b576716c90e7bfb95fb1a70b0c13cd1dbf6a5bdc6a7ce", 0x4e}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 988.182601][T14632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 988.190573][T14632] R13: 0000000000000891 R14: 00000000004c9f88 R15: 000000000000000e 09:27:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x130}], 0x1}, 0x0) 09:27:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xc0}], 0x1}, 0x0) 09:27:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x180}], 0x1}, 0x0) 09:27:26 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xe0}], 0x1}, 0x0) 09:27:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x140}], 0x1}, 0x0) 09:27:26 executing program 3 (fault-call:5 fault-nth:15): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:26 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)="25288a17ffdb3d33238e181216cf52a4423f2952252bd67c240e7253d2362edbeb9cd9be7e44bdadf43b5150d3ba188b092f26eade0cc24b576716c90e7bfb95fb1a70b0c13cd1dbf6a5bdc6a7ce", 0x4e}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xd0}], 0x1}, 0x0) 09:27:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x190}], 0x1}, 0x0) 09:27:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xf0}], 0x1}, 0x0) 09:27:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xe0}], 0x1}, 0x0) 09:27:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x150}], 0x1}, 0x0) [ 988.826806][T15181] FAULT_INJECTION: forcing a failure. [ 988.826806][T15181] name failslab, interval 1, probability 0, space 0, times 0 [ 988.886104][T15181] CPU: 1 PID: 15181 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 988.894794][T15181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 988.904847][T15181] Call Trace: [ 988.908146][T15181] dump_stack+0x11d/0x181 [ 988.912560][T15181] should_fail.cold+0xa/0x1a [ 988.917169][T15181] __should_failslab+0xee/0x130 [ 988.922031][T15181] should_failslab+0x9/0x14 [ 988.926602][T15181] __kmalloc+0x53/0x690 [ 988.930772][T15181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 988.937082][T15181] ? preempt_count_add+0x6f/0xb0 [ 988.942164][T15181] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 988.948162][T15181] ? sock_kmalloc+0xbf/0x110 [ 988.952773][T15181] sock_kmalloc+0xbf/0x110 [ 988.957209][T15181] af_alg_alloc_areq+0x40/0x130 [ 988.962111][T15181] aead_recvmsg+0x275/0xd60 [ 988.966633][T15181] ? aead_release+0x50/0x50 [ 988.971150][T15181] sock_recvmsg+0x92/0xb0 [ 988.975522][T15181] ____sys_recvmsg+0x167/0x3a0 [ 988.980298][T15181] ? copy_msghdr_from_user+0x246/0x320 [ 988.985782][T15181] ___sys_recvmsg+0xb2/0x100 [ 988.990393][T15181] ? __fget_light+0xaf/0x190 [ 988.995111][T15181] ? __fdget+0x2c/0x40 [ 988.999201][T15181] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 989.005471][T15181] __sys_recvmsg+0x9d/0x160 [ 989.009994][T15181] __x64_sys_recvmsg+0x51/0x70 [ 989.014904][T15181] do_syscall_64+0xcc/0x3a0 [ 989.019492][T15181] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 989.025387][T15181] RIP: 0033:0x45b399 [ 989.029337][T15181] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 989.048944][T15181] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 989.057418][T15181] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 989.065493][T15181] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 989.073471][T15181] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xf0}], 0x1}, 0x0) [ 989.081517][T15181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 989.089589][T15181] R13: 0000000000000891 R14: 00000000004c9f88 R15: 000000000000000f 09:27:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x110}], 0x1}, 0x0) 09:27:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x110}], 0x1}, 0x0) 09:27:27 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)="25288a17ffdb3d33238e181216cf52a4423f2952252bd67c240e7253d2362edbeb9cd9be7e44bdadf43b5150d3ba188b092f26eade0cc24b576716c90e7bfb95fb1a70b0c13cd1dbf6a5bdc6a7ce", 0x4e}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x160}], 0x1}, 0x0) 09:27:27 executing program 3 (fault-call:5 fault-nth:16): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1a0}], 0x1}, 0x0) 09:27:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x120}], 0x1}, 0x0) 09:27:27 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x120}], 0x1}, 0x0) 09:27:27 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x170}], 0x1}, 0x0) [ 989.566663][T15521] FAULT_INJECTION: forcing a failure. [ 989.566663][T15521] name failslab, interval 1, probability 0, space 0, times 0 [ 989.634070][T15521] CPU: 0 PID: 15521 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 989.642945][T15521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 989.653005][T15521] Call Trace: [ 989.656349][T15521] dump_stack+0x11d/0x181 [ 989.660825][T15521] should_fail.cold+0xa/0x1a [ 989.665550][T15521] __should_failslab+0xee/0x130 [ 989.670507][T15521] should_failslab+0x9/0x14 [ 989.675031][T15521] __kmalloc+0x53/0x690 [ 989.679319][T15521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 989.685571][T15521] ? preempt_count_add+0x6f/0xb0 [ 989.690583][T15521] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 989.696489][T15521] ? sock_kmalloc+0xbf/0x110 [ 989.701100][T15521] sock_kmalloc+0xbf/0x110 [ 989.705605][T15521] af_alg_alloc_areq+0x40/0x130 [ 989.710480][T15521] aead_recvmsg+0x275/0xd60 [ 989.715005][T15521] ? aead_release+0x50/0x50 [ 989.719547][T15521] sock_recvmsg+0x92/0xb0 [ 989.723942][T15521] ____sys_recvmsg+0x167/0x3a0 [ 989.728777][T15521] ? copy_msghdr_from_user+0x246/0x320 [ 989.734368][T15521] ___sys_recvmsg+0xb2/0x100 [ 989.738991][T15521] ? __fget_light+0xaf/0x190 [ 989.743594][T15521] ? __fdget+0x2c/0x40 [ 989.747701][T15521] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 989.753997][T15521] __sys_recvmsg+0x9d/0x160 [ 989.758524][T15521] __x64_sys_recvmsg+0x51/0x70 [ 989.763303][T15521] do_syscall_64+0xcc/0x3a0 [ 989.767845][T15521] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 989.773742][T15521] RIP: 0033:0x45b399 [ 989.777645][T15521] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 989.797240][T15521] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 989.805643][T15521] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 989.813669][T15521] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 989.821696][T15521] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1b0}], 0x1}, 0x0) 09:27:28 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)="25288a17ffdb3d33238e181216cf52a4423f2952252bd67c240e7253d2362edbeb9cd9be7e44bdadf43b5150d3ba188b092f26eade0cc24b576716c90e7bfb95fb1a70b0c13cd1dbf6a5bdc6a7ce", 0x4e}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:28 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x130}], 0x1}, 0x0) [ 989.829665][T15521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 989.837641][T15521] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000010 09:27:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x130}], 0x1}, 0x0) 09:27:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x180}], 0x1}, 0x0) 09:27:28 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x140}], 0x1}, 0x0) 09:27:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1c0}], 0x1}, 0x0) 09:27:28 executing program 3 (fault-call:5 fault-nth:17): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x140}], 0x1}, 0x0) 09:27:28 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x150}], 0x1}, 0x0) 09:27:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x190}], 0x1}, 0x0) 09:27:28 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)="25288a17ffdb3d33238e181216cf52a4423f2952252bd67c240e7253d2362edbeb9cd9be7e44bdadf43b5150d3ba188b092f26eade0cc24b576716c90e7bfb95fb1a70b0c13cd1dbf6a5bdc6a7ce", 0x4e}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 990.452637][T16064] FAULT_INJECTION: forcing a failure. [ 990.452637][T16064] name failslab, interval 1, probability 0, space 0, times 0 09:27:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1d0}], 0x1}, 0x0) [ 990.514139][T16064] CPU: 1 PID: 16064 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 990.522849][T16064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 990.532945][T16064] Call Trace: [ 990.536241][T16064] dump_stack+0x11d/0x181 [ 990.540626][T16064] should_fail.cold+0xa/0x1a [ 990.545225][T16064] __should_failslab+0xee/0x130 [ 990.550131][T16064] should_failslab+0x9/0x14 [ 990.554647][T16064] __kmalloc+0x53/0x690 09:27:28 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x160}], 0x1}, 0x0) 09:27:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1a0}], 0x1}, 0x0) [ 990.558879][T16064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 990.565129][T16064] ? preempt_count_add+0x6f/0xb0 [ 990.570112][T16064] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 990.576006][T16064] ? sock_kmalloc+0xbf/0x110 [ 990.580608][T16064] sock_kmalloc+0xbf/0x110 [ 990.585033][T16064] af_alg_alloc_areq+0x40/0x130 [ 990.589892][T16064] aead_recvmsg+0x275/0xd60 [ 990.594469][T16064] ? aead_release+0x50/0x50 [ 990.598983][T16064] sock_recvmsg+0x92/0xb0 [ 990.603323][T16064] ____sys_recvmsg+0x167/0x3a0 [ 990.608102][T16064] ? copy_msghdr_from_user+0x246/0x320 [ 990.613577][T16064] ___sys_recvmsg+0xb2/0x100 [ 990.618177][T16064] ? __fget_light+0xaf/0x190 [ 990.622863][T16064] ? __fdget+0x2c/0x40 [ 990.626968][T16064] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 990.633317][T16064] __sys_recvmsg+0x9d/0x160 [ 990.637833][T16064] __x64_sys_recvmsg+0x51/0x70 [ 990.642609][T16064] do_syscall_64+0xcc/0x3a0 [ 990.647178][T16064] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 990.653091][T16064] RIP: 0033:0x45b399 [ 990.657128][T16064] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 990.676736][T16064] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 990.685152][T16064] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 990.693119][T16064] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 990.701096][T16064] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x150}], 0x1}, 0x0) [ 990.709109][T16064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 990.717086][T16064] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000011 09:27:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1b0}], 0x1}, 0x0) 09:27:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x170}], 0x1}, 0x0) 09:27:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1e0}], 0x1}, 0x0) 09:27:29 executing program 3 (fault-call:5 fault-nth:18): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x160}], 0x1}, 0x0) 09:27:29 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)="25288a17ffdb3d33238e181216cf52a4423f2952252bd67c240e7253d2362edbeb9cd9be7e44bdadf43b5150d3ba188b092f26eade0cc24b576716c90e7bfb95fb1a70b0c13cd1dbf6a5bdc6a7ce", 0x4e}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x180}], 0x1}, 0x0) 09:27:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1f0}], 0x1}, 0x0) 09:27:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1c0}], 0x1}, 0x0) [ 991.304990][T16693] FAULT_INJECTION: forcing a failure. [ 991.304990][T16693] name failslab, interval 1, probability 0, space 0, times 0 [ 991.324990][T16693] CPU: 1 PID: 16693 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 991.333695][T16693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 991.343813][T16693] Call Trace: [ 991.347237][T16693] dump_stack+0x11d/0x181 09:27:29 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x210}], 0x1}, 0x0) 09:27:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x190}], 0x1}, 0x0) [ 991.351763][T16693] should_fail.cold+0xa/0x1a [ 991.356444][T16693] __should_failslab+0xee/0x130 [ 991.361307][T16693] should_failslab+0x9/0x14 [ 991.365882][T16693] __kmalloc+0x53/0x690 [ 991.370061][T16693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 991.376396][T16693] ? preempt_count_add+0x6f/0xb0 [ 991.381350][T16693] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 991.387285][T16693] ? sock_kmalloc+0xbf/0x110 [ 991.391888][T16693] sock_kmalloc+0xbf/0x110 [ 991.396315][T16693] af_alg_alloc_areq+0x40/0x130 [ 991.401175][T16693] aead_recvmsg+0x275/0xd60 [ 991.405699][T16693] ? aead_release+0x50/0x50 [ 991.410281][T16693] sock_recvmsg+0x92/0xb0 [ 991.414624][T16693] ____sys_recvmsg+0x167/0x3a0 [ 991.419634][T16693] ? copy_msghdr_from_user+0x246/0x320 [ 991.425118][T16693] ___sys_recvmsg+0xb2/0x100 [ 991.429769][T16693] ? __fget_light+0xaf/0x190 [ 991.434428][T16693] ? __fdget+0x2c/0x40 [ 991.438527][T16693] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 991.444781][T16693] __sys_recvmsg+0x9d/0x160 [ 991.449359][T16693] __x64_sys_recvmsg+0x51/0x70 [ 991.454139][T16693] do_syscall_64+0xcc/0x3a0 [ 991.458674][T16693] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 991.464568][T16693] RIP: 0033:0x45b399 [ 991.468551][T16693] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 991.488161][T16693] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 991.496639][T16693] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 09:27:29 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)="25288a17ffdb3d33238e181216cf52a4423f2952252bd67c240e7253d2362edbeb9cd9be7e44bdadf43b5150d3ba188b092f26eade0cc24b576716c90e7bfb95fb1a70b0c13cd1dbf6a5bdc6a7ce", 0x4e}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1d0}], 0x1}, 0x0) 09:27:29 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x170}], 0x1}, 0x0) [ 991.504611][T16693] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 991.512645][T16693] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 991.520626][T16693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 991.528604][T16693] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000012 09:27:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x180}], 0x1}, 0x0) 09:27:30 executing program 3 (fault-call:5 fault-nth:19): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:30 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1a0}], 0x1}, 0x0) 09:27:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1e0}], 0x1}, 0x0) 09:27:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x220}], 0x1}, 0x0) 09:27:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x190}], 0x1}, 0x0) 09:27:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1f0}], 0x1}, 0x0) [ 992.071229][T17031] FAULT_INJECTION: forcing a failure. [ 992.071229][T17031] name failslab, interval 1, probability 0, space 0, times 0 [ 992.102748][T17031] CPU: 0 PID: 17031 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 992.111459][T17031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 992.121515][T17031] Call Trace: [ 992.124823][T17031] dump_stack+0x11d/0x181 [ 992.129175][T17031] should_fail.cold+0xa/0x1a [ 992.133897][T17031] __should_failslab+0xee/0x130 [ 992.138753][T17031] should_failslab+0x9/0x14 [ 992.143373][T17031] __kmalloc+0x53/0x690 [ 992.147568][T17031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 992.153812][T17031] ? preempt_count_add+0x6f/0xb0 [ 992.158762][T17031] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 992.164667][T17031] ? sock_kmalloc+0xbf/0x110 [ 992.169264][T17031] sock_kmalloc+0xbf/0x110 [ 992.173691][T17031] af_alg_alloc_areq+0x40/0x130 [ 992.178549][T17031] aead_recvmsg+0x275/0xd60 [ 992.183075][T17031] ? aead_release+0x50/0x50 [ 992.187587][T17031] sock_recvmsg+0x92/0xb0 [ 992.192023][T17031] ____sys_recvmsg+0x167/0x3a0 [ 992.196830][T17031] ? copy_msghdr_from_user+0x246/0x320 [ 992.202307][T17031] ___sys_recvmsg+0xb2/0x100 [ 992.206952][T17031] ? __fget_light+0xaf/0x190 [ 992.211555][T17031] ? __fdget+0x2c/0x40 [ 992.215706][T17031] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 992.222610][T17031] __sys_recvmsg+0x9d/0x160 [ 992.227165][T17031] __x64_sys_recvmsg+0x51/0x70 [ 992.232002][T17031] do_syscall_64+0xcc/0x3a0 [ 992.236545][T17031] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 992.242440][T17031] RIP: 0033:0x45b399 [ 992.246351][T17031] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:27:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1a0}], 0x1}, 0x0) 09:27:30 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)="25288a17ffdb3d33238e181216cf52a4423f2952252bd67c240e7253d2362edbeb9cd9be7e44bdadf43b5150d3ba188b092f26eade0cc24b576716c90e7bfb95fb1a70b0c13cd1dbf6a5bdc6a7ce", 0x4e}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x230}], 0x1}, 0x0) 09:27:30 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1b0}], 0x1}, 0x0) [ 992.266093][T17031] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 992.274521][T17031] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 992.282541][T17031] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 992.290521][T17031] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 992.298495][T17031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 992.306477][T17031] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000013 09:27:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1b0}], 0x1}, 0x0) 09:27:30 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1c0}], 0x1}, 0x0) 09:27:30 executing program 3 (fault-call:5 fault-nth:20): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:30 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x210}], 0x1}, 0x0) 09:27:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x240}], 0x1}, 0x0) 09:27:31 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, 0x0, 0x0, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 992.712004][T17380] FAULT_INJECTION: forcing a failure. [ 992.712004][T17380] name failslab, interval 1, probability 0, space 0, times 0 09:27:31 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1d0}], 0x1}, 0x0) [ 992.759114][T17380] CPU: 0 PID: 17380 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 992.767813][T17380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 992.777863][T17380] Call Trace: [ 992.781162][T17380] dump_stack+0x11d/0x181 [ 992.785508][T17380] should_fail.cold+0xa/0x1a [ 992.790131][T17380] __should_failslab+0xee/0x130 [ 992.795065][T17380] should_failslab+0x9/0x14 [ 992.799596][T17380] __kmalloc+0x53/0x690 [ 992.803776][T17380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 992.810079][T17380] ? preempt_count_add+0x6f/0xb0 [ 992.816769][T17380] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 992.822763][T17380] ? sock_kmalloc+0xbf/0x110 [ 992.827428][T17380] sock_kmalloc+0xbf/0x110 [ 992.831977][T17380] af_alg_alloc_areq+0x40/0x130 [ 992.836832][T17380] aead_recvmsg+0x275/0xd60 [ 992.841489][T17380] ? aead_release+0x50/0x50 [ 992.846004][T17380] sock_recvmsg+0x92/0xb0 [ 992.850402][T17380] ____sys_recvmsg+0x167/0x3a0 [ 992.855227][T17380] ? copy_msghdr_from_user+0x246/0x320 [ 992.860708][T17380] ___sys_recvmsg+0xb2/0x100 [ 992.865315][T17380] ? __fget_light+0xaf/0x190 [ 992.869985][T17380] ? __fdget+0x2c/0x40 [ 992.874152][T17380] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 992.880425][T17380] __sys_recvmsg+0x9d/0x160 [ 992.884944][T17380] __x64_sys_recvmsg+0x51/0x70 [ 992.889752][T17380] do_syscall_64+0xcc/0x3a0 [ 992.894269][T17380] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 992.900192][T17380] RIP: 0033:0x45b399 09:27:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x220}], 0x1}, 0x0) 09:27:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x250}], 0x1}, 0x0) [ 992.904174][T17380] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 992.923874][T17380] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 992.932294][T17380] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 992.940271][T17380] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 992.948424][T17380] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1c0}], 0x1}, 0x0) [ 992.956470][T17380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 992.964487][T17380] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000014 09:27:31 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1e0}], 0x1}, 0x0) 09:27:31 executing program 3 (fault-call:5 fault-nth:21): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1d0}], 0x1}, 0x0) 09:27:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x230}], 0x1}, 0x0) 09:27:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x260}], 0x1}, 0x0) 09:27:31 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1f0}], 0x1}, 0x0) [ 993.364161][T17816] FAULT_INJECTION: forcing a failure. [ 993.364161][T17816] name failslab, interval 1, probability 0, space 0, times 0 [ 993.393949][T17816] CPU: 0 PID: 17816 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 993.402677][T17816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 993.412827][T17816] Call Trace: [ 993.416127][T17816] dump_stack+0x11d/0x181 [ 993.420471][T17816] should_fail.cold+0xa/0x1a [ 993.425153][T17816] __should_failslab+0xee/0x130 [ 993.430019][T17816] should_failslab+0x9/0x14 [ 993.434596][T17816] __kmalloc+0x53/0x690 [ 993.438895][T17816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 993.445149][T17816] ? preempt_count_add+0x6f/0xb0 [ 993.450152][T17816] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 993.456086][T17816] ? sock_kmalloc+0xbf/0x110 09:27:31 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, 0x0, 0x0, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:31 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1e0}], 0x1}, 0x0) [ 993.460691][T17816] sock_kmalloc+0xbf/0x110 [ 993.465144][T17816] af_alg_alloc_areq+0x40/0x130 [ 993.470003][T17816] aead_recvmsg+0x275/0xd60 [ 993.474521][T17816] ? aead_release+0x50/0x50 [ 993.479030][T17816] sock_recvmsg+0x92/0xb0 [ 993.483375][T17816] ____sys_recvmsg+0x167/0x3a0 [ 993.488157][T17816] ? copy_msghdr_from_user+0x246/0x320 [ 993.493686][T17816] ___sys_recvmsg+0xb2/0x100 [ 993.498292][T17816] ? __fget_light+0xaf/0x190 [ 993.502919][T17816] ? __fdget+0x2c/0x40 [ 993.507044][T17816] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 993.513310][T17816] __sys_recvmsg+0x9d/0x160 [ 993.517925][T17816] __x64_sys_recvmsg+0x51/0x70 [ 993.522767][T17816] do_syscall_64+0xcc/0x3a0 [ 993.527292][T17816] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 993.533284][T17816] RIP: 0033:0x45b399 [ 993.537197][T17816] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 993.556801][T17816] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 993.565218][T17816] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 993.573262][T17816] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 993.581235][T17816] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 993.589213][T17816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 993.597290][T17816] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000015 09:27:31 executing program 3 (fault-call:5 fault-nth:22): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x240}], 0x1}, 0x0) 09:27:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x270}], 0x1}, 0x0) 09:27:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x210}], 0x1}, 0x0) 09:27:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1f0}], 0x1}, 0x0) [ 993.906750][T18040] FAULT_INJECTION: forcing a failure. [ 993.906750][T18040] name failslab, interval 1, probability 0, space 0, times 0 [ 993.953885][T18040] CPU: 0 PID: 18040 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 993.962578][T18040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 993.972633][T18040] Call Trace: [ 993.976018][T18040] dump_stack+0x11d/0x181 [ 993.980362][T18040] should_fail.cold+0xa/0x1a [ 993.984973][T18040] __should_failslab+0xee/0x130 [ 993.989868][T18040] should_failslab+0x9/0x14 [ 993.994384][T18040] __kmalloc+0x53/0x690 [ 993.998559][T18040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.004866][T18040] ? preempt_count_add+0x6f/0xb0 [ 994.009861][T18040] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 994.015765][T18040] ? sock_kmalloc+0xbf/0x110 [ 994.020513][T18040] sock_kmalloc+0xbf/0x110 [ 994.024951][T18040] af_alg_alloc_areq+0x40/0x130 [ 994.029811][T18040] aead_recvmsg+0x275/0xd60 [ 994.034330][T18040] ? aead_release+0x50/0x50 [ 994.038850][T18040] sock_recvmsg+0x92/0xb0 [ 994.043255][T18040] ____sys_recvmsg+0x167/0x3a0 [ 994.048059][T18040] ? copy_msghdr_from_user+0x246/0x320 [ 994.053727][T18040] ___sys_recvmsg+0xb2/0x100 [ 994.058335][T18040] ? __fget_light+0xaf/0x190 [ 994.062937][T18040] ? __fdget+0x2c/0x40 [ 994.067024][T18040] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 994.076457][T18040] __sys_recvmsg+0x9d/0x160 [ 994.081184][T18040] __x64_sys_recvmsg+0x51/0x70 [ 994.085990][T18040] do_syscall_64+0xcc/0x3a0 [ 994.090552][T18040] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 994.096506][T18040] RIP: 0033:0x45b399 09:27:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x280}], 0x1}, 0x0) 09:27:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x250}], 0x1}, 0x0) [ 994.100464][T18040] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 994.120141][T18040] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 994.128557][T18040] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 994.136530][T18040] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 994.144511][T18040] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x210}], 0x1}, 0x0) [ 994.152483][T18040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 994.160500][T18040] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000016 09:27:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x220}], 0x1}, 0x0) 09:27:32 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, 0x0, 0x0, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x260}], 0x1}, 0x0) 09:27:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x290}], 0x1}, 0x0) 09:27:32 executing program 3 (fault-call:5 fault-nth:23): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:32 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x220}], 0x1}, 0x0) 09:27:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x230}], 0x1}, 0x0) 09:27:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2a0}], 0x1}, 0x0) [ 994.665921][T18710] FAULT_INJECTION: forcing a failure. [ 994.665921][T18710] name failslab, interval 1, probability 0, space 0, times 0 [ 994.715278][T18710] CPU: 1 PID: 18710 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 994.724045][T18710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.734159][T18710] Call Trace: [ 994.737470][T18710] dump_stack+0x11d/0x181 [ 994.741881][T18710] should_fail.cold+0xa/0x1a [ 994.746512][T18710] __should_failslab+0xee/0x130 [ 994.751378][T18710] should_failslab+0x9/0x14 [ 994.755923][T18710] __kmalloc+0x53/0x690 [ 994.760154][T18710] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.766420][T18710] ? preempt_count_add+0x6f/0xb0 [ 994.771375][T18710] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 994.777382][T18710] ? sock_kmalloc+0xbf/0x110 [ 994.782178][T18710] sock_kmalloc+0xbf/0x110 [ 994.786621][T18710] af_alg_alloc_areq+0x40/0x130 [ 994.791490][T18710] aead_recvmsg+0x275/0xd60 [ 994.796006][T18710] ? aead_release+0x50/0x50 [ 994.800524][T18710] sock_recvmsg+0x92/0xb0 [ 994.804868][T18710] ____sys_recvmsg+0x167/0x3a0 [ 994.809764][T18710] ? copy_msghdr_from_user+0x246/0x320 [ 994.815327][T18710] ___sys_recvmsg+0xb2/0x100 [ 994.819935][T18710] ? __fget_light+0xaf/0x190 [ 994.824579][T18710] ? __fdget+0x2c/0x40 [ 994.828814][T18710] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 994.835069][T18710] __sys_recvmsg+0x9d/0x160 [ 994.839622][T18710] __x64_sys_recvmsg+0x51/0x70 [ 994.844473][T18710] do_syscall_64+0xcc/0x3a0 [ 994.848994][T18710] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 994.854887][T18710] RIP: 0033:0x45b399 [ 994.858797][T18710] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 994.878407][T18710] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 994.886839][T18710] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 994.894816][T18710] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 994.902894][T18710] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x270}], 0x1}, 0x0) 09:27:33 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x230}], 0x1}, 0x0) [ 994.910984][T18710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 994.918964][T18710] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000017 09:27:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2b0}], 0x1}, 0x0) 09:27:33 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x240}], 0x1}, 0x0) 09:27:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x280}], 0x1}, 0x0) 09:27:33 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x250}], 0x1}, 0x0) 09:27:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2c0}], 0x1}, 0x0) 09:27:33 executing program 3 (fault-call:5 fault-nth:24): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x240}], 0x1}, 0x0) 09:27:33 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x290}], 0x1}, 0x0) 09:27:33 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x260}], 0x1}, 0x0) 09:27:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2d0}], 0x1}, 0x0) 09:27:33 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x250}], 0x1}, 0x0) 09:27:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2a0}], 0x1}, 0x0) 09:27:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x270}], 0x1}, 0x0) [ 995.737647][T19366] FAULT_INJECTION: forcing a failure. [ 995.737647][T19366] name failslab, interval 1, probability 0, space 0, times 0 09:27:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x260}], 0x1}, 0x0) [ 995.779607][T19366] CPU: 0 PID: 19366 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 995.788307][T19366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.798473][T19366] Call Trace: [ 995.801839][T19366] dump_stack+0x11d/0x181 [ 995.806221][T19366] should_fail.cold+0xa/0x1a [ 995.810823][T19366] __should_failslab+0xee/0x130 [ 995.815704][T19366] should_failslab+0x9/0x14 [ 995.820214][T19366] __kmalloc+0x53/0x690 09:27:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2e0}], 0x1}, 0x0) [ 995.824487][T19366] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.830765][T19366] ? preempt_count_add+0x6f/0xb0 [ 995.835714][T19366] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 995.841614][T19366] ? sock_kmalloc+0xbf/0x110 [ 995.846221][T19366] sock_kmalloc+0xbf/0x110 [ 995.850653][T19366] af_alg_alloc_areq+0x40/0x130 [ 995.855517][T19366] aead_recvmsg+0x275/0xd60 [ 995.860037][T19366] ? aead_release+0x50/0x50 [ 995.864551][T19366] sock_recvmsg+0x92/0xb0 [ 995.868901][T19366] ____sys_recvmsg+0x167/0x3a0 [ 995.873684][T19366] ? copy_msghdr_from_user+0x246/0x320 [ 995.879197][T19366] ___sys_recvmsg+0xb2/0x100 [ 995.883861][T19366] ? __fget_light+0xaf/0x190 [ 995.888624][T19366] ? __fdget+0x2c/0x40 [ 995.892779][T19366] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 995.899075][T19366] __sys_recvmsg+0x9d/0x160 [ 995.903607][T19366] __x64_sys_recvmsg+0x51/0x70 [ 995.908399][T19366] do_syscall_64+0xcc/0x3a0 [ 995.912922][T19366] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 995.918863][T19366] RIP: 0033:0x45b399 [ 995.922779][T19366] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 995.942388][T19366] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 995.950814][T19366] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 995.958805][T19366] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 995.966779][T19366] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:34 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 995.974756][T19366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 995.982730][T19366] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000018 09:27:34 executing program 3 (fault-call:5 fault-nth:25): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x270}], 0x1}, 0x0) 09:27:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x280}], 0x1}, 0x0) 09:27:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2b0}], 0x1}, 0x0) 09:27:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2f0}], 0x1}, 0x0) 09:27:34 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {0x0}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 996.415796][T19762] FAULT_INJECTION: forcing a failure. [ 996.415796][T19762] name failslab, interval 1, probability 0, space 0, times 0 [ 996.450555][T19762] CPU: 0 PID: 19762 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 996.459273][T19762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.469363][T19762] Call Trace: [ 996.472663][T19762] dump_stack+0x11d/0x181 [ 996.477067][T19762] should_fail.cold+0xa/0x1a [ 996.481671][T19762] __should_failslab+0xee/0x130 [ 996.486672][T19762] should_failslab+0x9/0x14 [ 996.491258][T19762] __kmalloc+0x53/0x690 [ 996.495508][T19762] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 996.501756][T19762] ? preempt_count_add+0x6f/0xb0 [ 996.506774][T19762] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 996.512673][T19762] ? sock_kmalloc+0xbf/0x110 [ 996.517277][T19762] sock_kmalloc+0xbf/0x110 [ 996.521700][T19762] af_alg_alloc_areq+0x40/0x130 [ 996.526563][T19762] aead_recvmsg+0x275/0xd60 [ 996.531087][T19762] ? aead_release+0x50/0x50 [ 996.535602][T19762] sock_recvmsg+0x92/0xb0 [ 996.539947][T19762] ____sys_recvmsg+0x167/0x3a0 [ 996.544726][T19762] ? copy_msghdr_from_user+0x246/0x320 [ 996.550196][T19762] ___sys_recvmsg+0xb2/0x100 [ 996.554799][T19762] ? __fget_light+0xaf/0x190 [ 996.559470][T19762] ? __fdget+0x2c/0x40 09:27:34 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x290}], 0x1}, 0x0) 09:27:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2c0}], 0x1}, 0x0) 09:27:34 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x300}], 0x1}, 0x0) [ 996.563599][T19762] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 996.569904][T19762] __sys_recvmsg+0x9d/0x160 [ 996.574427][T19762] __x64_sys_recvmsg+0x51/0x70 [ 996.579241][T19762] do_syscall_64+0xcc/0x3a0 [ 996.583758][T19762] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 996.589799][T19762] RIP: 0033:0x45b399 [ 996.593722][T19762] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:27:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x280}], 0x1}, 0x0) [ 996.613329][T19762] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 996.621751][T19762] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 996.629732][T19762] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 996.637798][T19762] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 996.645786][T19762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 996.653813][T19762] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000019 09:27:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2a0}], 0x1}, 0x0) 09:27:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x290}], 0x1}, 0x0) 09:27:35 executing program 3 (fault-call:5 fault-nth:26): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:35 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {0x0}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2d0}], 0x1}, 0x0) 09:27:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x310}], 0x1}, 0x0) 09:27:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2a0}], 0x1}, 0x0) [ 997.106605][T20136] FAULT_INJECTION: forcing a failure. [ 997.106605][T20136] name failslab, interval 1, probability 0, space 0, times 0 [ 997.147256][T20136] CPU: 0 PID: 20136 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 997.155981][T20136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.166118][T20136] Call Trace: [ 997.169509][T20136] dump_stack+0x11d/0x181 [ 997.173931][T20136] should_fail.cold+0xa/0x1a [ 997.178713][T20136] __should_failslab+0xee/0x130 [ 997.183595][T20136] should_failslab+0x9/0x14 [ 997.188174][T20136] __kmalloc+0x53/0x690 [ 997.192596][T20136] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 997.198983][T20136] ? preempt_count_add+0x6f/0xb0 [ 997.203979][T20136] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 997.209925][T20136] ? sock_kmalloc+0xbf/0x110 [ 997.214532][T20136] sock_kmalloc+0xbf/0x110 [ 997.218961][T20136] af_alg_alloc_areq+0x40/0x130 [ 997.223922][T20136] aead_recvmsg+0x275/0xd60 [ 997.228442][T20136] ? aead_release+0x50/0x50 [ 997.233034][T20136] sock_recvmsg+0x92/0xb0 [ 997.237374][T20136] ____sys_recvmsg+0x167/0x3a0 [ 997.242290][T20136] ? copy_msghdr_from_user+0x246/0x320 09:27:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2b0}], 0x1}, 0x0) [ 997.247853][T20136] ___sys_recvmsg+0xb2/0x100 [ 997.252520][T20136] ? __fget_light+0xaf/0x190 [ 997.257132][T20136] ? __fdget+0x2c/0x40 [ 997.261299][T20136] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 997.267560][T20136] __sys_recvmsg+0x9d/0x160 [ 997.272084][T20136] __x64_sys_recvmsg+0x51/0x70 [ 997.276907][T20136] do_syscall_64+0xcc/0x3a0 [ 997.281431][T20136] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 997.287337][T20136] RIP: 0033:0x45b399 [ 997.291340][T20136] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 997.310947][T20136] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 997.319516][T20136] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 997.327494][T20136] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 997.335469][T20136] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2e0}], 0x1}, 0x0) 09:27:35 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {0x0}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 997.343449][T20136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 997.351428][T20136] R13: 0000000000000891 R14: 00000000004c9f88 R15: 000000000000001a 09:27:35 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x320}], 0x1}, 0x0) 09:27:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2b0}], 0x1}, 0x0) 09:27:35 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2c0}], 0x1}, 0x0) 09:27:35 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2f0}], 0x1}, 0x0) 09:27:35 executing program 3 (fault-call:5 fault-nth:27): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2c0}], 0x1}, 0x0) 09:27:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x330}], 0x1}, 0x0) [ 997.764192][T20566] FAULT_INJECTION: forcing a failure. [ 997.764192][T20566] name failslab, interval 1, probability 0, space 0, times 0 [ 997.800277][T20566] CPU: 0 PID: 20566 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 997.809057][T20566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.819147][T20566] Call Trace: [ 997.822537][T20566] dump_stack+0x11d/0x181 [ 997.826892][T20566] should_fail.cold+0xa/0x1a [ 997.831500][T20566] __should_failslab+0xee/0x130 [ 997.836412][T20566] should_failslab+0x9/0x14 [ 997.840933][T20566] __kmalloc+0x53/0x690 [ 997.845213][T20566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 997.851486][T20566] ? preempt_count_add+0x6f/0xb0 [ 997.856511][T20566] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 997.862498][T20566] ? sock_kmalloc+0xbf/0x110 [ 997.867249][T20566] sock_kmalloc+0xbf/0x110 [ 997.871667][T20566] af_alg_alloc_areq+0x40/0x130 [ 997.876534][T20566] aead_recvmsg+0x275/0xd60 [ 997.881056][T20566] ? aead_release+0x50/0x50 [ 997.885570][T20566] sock_recvmsg+0x92/0xb0 [ 997.889918][T20566] ____sys_recvmsg+0x167/0x3a0 [ 997.894696][T20566] ? copy_msghdr_from_user+0x246/0x320 [ 997.900172][T20566] ___sys_recvmsg+0xb2/0x100 [ 997.904794][T20566] ? __fget_light+0xaf/0x190 [ 997.909408][T20566] ? __fdget+0x2c/0x40 [ 997.913490][T20566] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 997.919765][T20566] __sys_recvmsg+0x9d/0x160 [ 997.924369][T20566] __x64_sys_recvmsg+0x51/0x70 [ 997.929158][T20566] do_syscall_64+0xcc/0x3a0 [ 997.933679][T20566] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 997.939596][T20566] RIP: 0033:0x45b399 [ 997.943599][T20566] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:27:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38dbc9db03cf25eb579378b01a7cbf817f32719c775ee715b9cdc1bd0", 0x37}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:36 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2d0}], 0x1}, 0x0) 09:27:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2d0}], 0x1}, 0x0) 09:27:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x300}], 0x1}, 0x0) [ 997.963405][T20566] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 997.971902][T20566] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 997.979886][T20566] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 997.987865][T20566] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 997.995941][T20566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 998.004019][T20566] R13: 0000000000000891 R14: 00000000004c9f88 R15: 000000000000001b 09:27:36 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2e0}], 0x1}, 0x0) 09:27:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x340}], 0x1}, 0x0) 09:27:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x310}], 0x1}, 0x0) 09:27:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2e0}], 0x1}, 0x0) 09:27:36 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2f0}], 0x1}, 0x0) 09:27:36 executing program 3 (fault-call:5 fault-nth:28): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:36 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x350}], 0x1}, 0x0) 09:27:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x2f0}], 0x1}, 0x0) 09:27:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x320}], 0x1}, 0x0) [ 998.738935][T21114] FAULT_INJECTION: forcing a failure. [ 998.738935][T21114] name failslab, interval 1, probability 0, space 0, times 0 [ 998.785104][T21114] CPU: 1 PID: 21114 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 998.793854][T21114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 998.803934][T21114] Call Trace: [ 998.807324][T21114] dump_stack+0x11d/0x181 [ 998.811677][T21114] should_fail.cold+0xa/0x1a [ 998.816343][T21114] __should_failslab+0xee/0x130 [ 998.821278][T21114] should_failslab+0x9/0x14 [ 998.825796][T21114] __kmalloc+0x53/0x690 [ 998.829981][T21114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 998.836364][T21114] ? preempt_count_add+0x6f/0xb0 [ 998.841431][T21114] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 998.847346][T21114] ? sock_kmalloc+0xbf/0x110 [ 998.851996][T21114] sock_kmalloc+0xbf/0x110 [ 998.856424][T21114] af_alg_alloc_areq+0x40/0x130 [ 998.861301][T21114] aead_recvmsg+0x275/0xd60 [ 998.865825][T21114] ? aead_release+0x50/0x50 [ 998.870418][T21114] sock_recvmsg+0x92/0xb0 [ 998.874780][T21114] ____sys_recvmsg+0x167/0x3a0 [ 998.879557][T21114] ? copy_msghdr_from_user+0x246/0x320 [ 998.885069][T21114] ___sys_recvmsg+0xb2/0x100 [ 998.889690][T21114] ? __fget_light+0xaf/0x190 [ 998.894293][T21114] ? __fdget+0x2c/0x40 [ 998.898375][T21114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 998.904630][T21114] __sys_recvmsg+0x9d/0x160 [ 998.909222][T21114] __x64_sys_recvmsg+0x51/0x70 [ 998.914059][T21114] do_syscall_64+0xcc/0x3a0 [ 998.918589][T21114] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 998.924483][T21114] RIP: 0033:0x45b399 [ 998.928439][T21114] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 998.948158][T21114] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 998.956582][T21114] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 998.964577][T21114] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 998.972556][T21114] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x300}], 0x1}, 0x0) 09:27:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x360}], 0x1}, 0x0) 09:27:37 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x300}], 0x1}, 0x0) [ 998.980532][T21114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 998.988513][T21114] R13: 0000000000000891 R14: 00000000004c9f88 R15: 000000000000001c 09:27:37 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x330}], 0x1}, 0x0) 09:27:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x310}], 0x1}, 0x0) 09:27:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x370}], 0x1}, 0x0) 09:27:37 executing program 3 (fault-call:5 fault-nth:29): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:37 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x310}], 0x1}, 0x0) 09:27:37 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x380}], 0x1}, 0x0) 09:27:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x340}], 0x1}, 0x0) 09:27:37 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x320}], 0x1}, 0x0) [ 999.562085][T21654] FAULT_INJECTION: forcing a failure. [ 999.562085][T21654] name failslab, interval 1, probability 0, space 0, times 0 [ 999.604081][T21654] CPU: 0 PID: 21654 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 999.612788][T21654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.622974][T21654] Call Trace: [ 999.626283][T21654] dump_stack+0x11d/0x181 [ 999.630663][T21654] should_fail.cold+0xa/0x1a [ 999.635273][T21654] __should_failslab+0xee/0x130 [ 999.640138][T21654] should_failslab+0x9/0x14 [ 999.644656][T21654] __kmalloc+0x53/0x690 [ 999.648828][T21654] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 999.655083][T21654] ? preempt_count_add+0x6f/0xb0 [ 999.660107][T21654] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 999.666040][T21654] ? sock_kmalloc+0xbf/0x110 [ 999.670640][T21654] sock_kmalloc+0xbf/0x110 [ 999.675070][T21654] af_alg_alloc_areq+0x40/0x130 [ 999.679958][T21654] aead_recvmsg+0x275/0xd60 [ 999.684484][T21654] ? aead_release+0x50/0x50 [ 999.689014][T21654] sock_recvmsg+0x92/0xb0 [ 999.693395][T21654] ____sys_recvmsg+0x167/0x3a0 [ 999.698277][T21654] ? copy_msghdr_from_user+0x246/0x320 [ 999.703810][T21654] ___sys_recvmsg+0xb2/0x100 [ 999.708417][T21654] ? __fget_light+0xaf/0x190 [ 999.713027][T21654] ? __fdget+0x2c/0x40 [ 999.717231][T21654] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 999.723492][T21654] __sys_recvmsg+0x9d/0x160 [ 999.728048][T21654] __x64_sys_recvmsg+0x51/0x70 [ 999.732822][T21654] do_syscall_64+0xcc/0x3a0 [ 999.737343][T21654] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 999.743242][T21654] RIP: 0033:0x45b399 09:27:38 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x320}], 0x1}, 0x0) 09:27:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x330}], 0x1}, 0x0) 09:27:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x390}], 0x1}, 0x0) [ 999.747215][T21654] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 999.766828][T21654] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 999.775305][T21654] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 999.783279][T21654] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 999.791256][T21654] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:38 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 999.799361][T21654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 999.807373][T21654] R13: 0000000000000891 R14: 00000000004c9f88 R15: 000000000000001d 09:27:38 executing program 3 (fault-call:5 fault-nth:30): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x350}], 0x1}, 0x0) 09:27:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x340}], 0x1}, 0x0) 09:27:38 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x330}], 0x1}, 0x0) [ 1000.108865][T21981] FAULT_INJECTION: forcing a failure. [ 1000.108865][T21981] name failslab, interval 1, probability 0, space 0, times 0 09:27:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3a0}], 0x1}, 0x0) [ 1000.208667][T21981] CPU: 1 PID: 21981 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1000.217378][T21981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.227609][T21981] Call Trace: [ 1000.230934][T21981] dump_stack+0x11d/0x181 [ 1000.235281][T21981] should_fail.cold+0xa/0x1a [ 1000.240058][T21981] __should_failslab+0xee/0x130 [ 1000.244928][T21981] should_failslab+0x9/0x14 [ 1000.249445][T21981] __kmalloc+0x53/0x690 [ 1000.253613][T21981] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.259861][T21981] ? preempt_count_add+0x6f/0xb0 [ 1000.264846][T21981] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1000.270750][T21981] ? sock_kmalloc+0xbf/0x110 [ 1000.275355][T21981] sock_kmalloc+0xbf/0x110 [ 1000.279790][T21981] af_alg_alloc_areq+0x40/0x130 [ 1000.284651][T21981] aead_recvmsg+0x275/0xd60 [ 1000.289174][T21981] ? aead_release+0x50/0x50 [ 1000.293692][T21981] sock_recvmsg+0x92/0xb0 [ 1000.298087][T21981] ____sys_recvmsg+0x167/0x3a0 [ 1000.302945][T21981] ? copy_msghdr_from_user+0x246/0x320 [ 1000.308591][T21981] ___sys_recvmsg+0xb2/0x100 [ 1000.313204][T21981] ? __fget_light+0xaf/0x190 [ 1000.317843][T21981] ? __fdget+0x2c/0x40 [ 1000.321919][T21981] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1000.328173][T21981] __sys_recvmsg+0x9d/0x160 [ 1000.332713][T21981] __x64_sys_recvmsg+0x51/0x70 [ 1000.337498][T21981] do_syscall_64+0xcc/0x3a0 [ 1000.342023][T21981] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1000.347918][T21981] RIP: 0033:0x45b399 [ 1000.351830][T21981] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1000.371669][T21981] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1000.380167][T21981] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1000.388163][T21981] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1000.396242][T21981] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x350}], 0x1}, 0x0) [ 1000.404333][T21981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1000.412322][T21981] R13: 0000000000000891 R14: 00000000004c9f88 R15: 000000000000001e 09:27:38 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3b0}], 0x1}, 0x0) 09:27:38 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {0x0}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x360}], 0x1}, 0x0) 09:27:38 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x340}], 0x1}, 0x0) 09:27:38 executing program 3 (fault-call:5 fault-nth:31): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x360}], 0x1}, 0x0) 09:27:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x370}], 0x1}, 0x0) [ 1000.761654][T22316] FAULT_INJECTION: forcing a failure. [ 1000.761654][T22316] name failslab, interval 1, probability 0, space 0, times 0 09:27:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3c0}], 0x1}, 0x0) [ 1000.801956][T22316] CPU: 0 PID: 22316 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1000.810657][T22316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.820711][T22316] Call Trace: [ 1000.824087][T22316] dump_stack+0x11d/0x181 [ 1000.828444][T22316] should_fail.cold+0xa/0x1a [ 1000.833135][T22316] __should_failslab+0xee/0x130 [ 1000.838036][T22316] should_failslab+0x9/0x14 [ 1000.842553][T22316] __kmalloc+0x53/0x690 [ 1000.846723][T22316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.852992][T22316] ? preempt_count_add+0x6f/0xb0 [ 1000.857951][T22316] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1000.863854][T22316] ? sock_kmalloc+0xbf/0x110 [ 1000.868465][T22316] sock_kmalloc+0xbf/0x110 [ 1000.872898][T22316] af_alg_alloc_areq+0x40/0x130 [ 1000.877822][T22316] aead_recvmsg+0x275/0xd60 [ 1000.882368][T22316] ? aead_release+0x50/0x50 [ 1000.886930][T22316] sock_recvmsg+0x92/0xb0 [ 1000.891304][T22316] ____sys_recvmsg+0x167/0x3a0 [ 1000.896088][T22316] ? copy_msghdr_from_user+0x246/0x320 [ 1000.901571][T22316] ___sys_recvmsg+0xb2/0x100 [ 1000.906184][T22316] ? __fget_light+0xaf/0x190 [ 1000.910892][T22316] ? __fdget+0x2c/0x40 [ 1000.914972][T22316] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1000.921232][T22316] __sys_recvmsg+0x9d/0x160 [ 1000.925854][T22316] __x64_sys_recvmsg+0x51/0x70 [ 1000.930628][T22316] do_syscall_64+0xcc/0x3a0 [ 1000.935217][T22316] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1000.941104][T22316] RIP: 0033:0x45b399 [ 1000.945086][T22316] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1000.964689][T22316] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1000.973106][T22316] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1000.981083][T22316] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1000.989070][T22316] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1000.997039][T22316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1001.005020][T22316] R13: 0000000000000891 R14: 00000000004c9f88 R15: 000000000000001f 09:27:39 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {0x0}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x370}], 0x1}, 0x0) 09:27:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x380}], 0x1}, 0x0) 09:27:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3d0}], 0x1}, 0x0) 09:27:39 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x350}], 0x1}, 0x0) 09:27:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x390}], 0x1}, 0x0) 09:27:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x380}], 0x1}, 0x0) 09:27:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3e0}], 0x1}, 0x0) 09:27:39 executing program 3 (fault-call:5 fault-nth:32): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:39 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x360}], 0x1}, 0x0) 09:27:39 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {0x0}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:39 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3a0}], 0x1}, 0x0) [ 1001.686819][T22803] FAULT_INJECTION: forcing a failure. [ 1001.686819][T22803] name failslab, interval 1, probability 0, space 0, times 0 09:27:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x390}], 0x1}, 0x0) 09:27:40 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x370}], 0x1}, 0x0) 09:27:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3f0}], 0x1}, 0x0) [ 1001.828224][T22803] CPU: 0 PID: 22803 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1001.836930][T22803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.846987][T22803] Call Trace: [ 1001.850289][T22803] dump_stack+0x11d/0x181 [ 1001.854690][T22803] should_fail.cold+0xa/0x1a [ 1001.859369][T22803] __should_failslab+0xee/0x130 [ 1001.864233][T22803] should_failslab+0x9/0x14 [ 1001.868749][T22803] __kmalloc+0x53/0x690 [ 1001.872925][T22803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.879176][T22803] ? preempt_count_add+0x6f/0xb0 [ 1001.884133][T22803] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1001.890036][T22803] ? sock_kmalloc+0xbf/0x110 [ 1001.894657][T22803] sock_kmalloc+0xbf/0x110 [ 1001.899079][T22803] af_alg_alloc_areq+0x40/0x130 [ 1001.903933][T22803] aead_recvmsg+0x275/0xd60 [ 1001.908504][T22803] ? aead_release+0x50/0x50 [ 1001.913026][T22803] sock_recvmsg+0x92/0xb0 [ 1001.917369][T22803] ____sys_recvmsg+0x167/0x3a0 [ 1001.922205][T22803] ? copy_msghdr_from_user+0x246/0x320 [ 1001.927690][T22803] ___sys_recvmsg+0xb2/0x100 [ 1001.932303][T22803] ? __fget_light+0xaf/0x190 [ 1001.937049][T22803] ? __fdget+0x2c/0x40 [ 1001.941164][T22803] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1001.947466][T22803] __sys_recvmsg+0x9d/0x160 [ 1001.951999][T22803] __x64_sys_recvmsg+0x51/0x70 [ 1001.956828][T22803] do_syscall_64+0xcc/0x3a0 [ 1001.961371][T22803] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1001.967320][T22803] RIP: 0033:0x45b399 [ 1001.971257][T22803] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1001.990868][T22803] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1001.999291][T22803] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1002.007267][T22803] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1002.015240][T22803] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1002.023247][T22803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1002.031223][T22803] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000020 09:27:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3b0}], 0x1}, 0x0) 09:27:40 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:40 executing program 3 (fault-call:5 fault-nth:33): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x410}], 0x1}, 0x0) 09:27:40 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x380}], 0x1}, 0x0) 09:27:40 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3a0}], 0x1}, 0x0) 09:27:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3c0}], 0x1}, 0x0) [ 1002.347663][T23184] FAULT_INJECTION: forcing a failure. [ 1002.347663][T23184] name failslab, interval 1, probability 0, space 0, times 0 [ 1002.399507][T23184] CPU: 1 PID: 23184 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1002.408313][T23184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1002.418373][T23184] Call Trace: [ 1002.421679][T23184] dump_stack+0x11d/0x181 [ 1002.426039][T23184] should_fail.cold+0xa/0x1a [ 1002.430640][T23184] __should_failslab+0xee/0x130 [ 1002.435592][T23184] should_failslab+0x9/0x14 [ 1002.440103][T23184] __kmalloc+0x53/0x690 [ 1002.444286][T23184] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1002.450540][T23184] ? preempt_count_add+0x6f/0xb0 [ 1002.455550][T23184] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1002.461453][T23184] ? sock_kmalloc+0xbf/0x110 [ 1002.466105][T23184] sock_kmalloc+0xbf/0x110 [ 1002.470531][T23184] af_alg_alloc_areq+0x40/0x130 [ 1002.475452][T23184] aead_recvmsg+0x275/0xd60 [ 1002.479992][T23184] ? aead_release+0x50/0x50 [ 1002.484507][T23184] sock_recvmsg+0x92/0xb0 [ 1002.488847][T23184] ____sys_recvmsg+0x167/0x3a0 [ 1002.493625][T23184] ? copy_msghdr_from_user+0x246/0x320 [ 1002.499100][T23184] ___sys_recvmsg+0xb2/0x100 [ 1002.503710][T23184] ? __fget_light+0xaf/0x190 [ 1002.508309][T23184] ? __fdget+0x2c/0x40 [ 1002.512393][T23184] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1002.518646][T23184] __sys_recvmsg+0x9d/0x160 [ 1002.523167][T23184] __x64_sys_recvmsg+0x51/0x70 [ 1002.527935][T23184] do_syscall_64+0xcc/0x3a0 [ 1002.532446][T23184] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1002.538338][T23184] RIP: 0033:0x45b399 [ 1002.542238][T23184] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1002.561839][T23184] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1002.570252][T23184] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1002.578225][T23184] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1002.586198][T23184] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:40 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x390}], 0x1}, 0x0) [ 1002.594166][T23184] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1002.602139][T23184] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000021 09:27:40 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3d0}], 0x1}, 0x0) 09:27:41 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:41 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3a0}], 0x1}, 0x0) 09:27:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x420}], 0x1}, 0x0) 09:27:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3b0}], 0x1}, 0x0) 09:27:41 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3b0}], 0x1}, 0x0) 09:27:41 executing program 3 (fault-call:5 fault-nth:34): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3e0}], 0x1}, 0x0) 09:27:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3c0}], 0x1}, 0x0) 09:27:41 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3c0}], 0x1}, 0x0) 09:27:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x430}], 0x1}, 0x0) 09:27:41 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 1003.352384][T23785] FAULT_INJECTION: forcing a failure. [ 1003.352384][T23785] name failslab, interval 1, probability 0, space 0, times 0 [ 1003.400360][T23785] CPU: 1 PID: 23785 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1003.409219][T23785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1003.419273][T23785] Call Trace: [ 1003.422578][T23785] dump_stack+0x11d/0x181 [ 1003.426942][T23785] should_fail.cold+0xa/0x1a [ 1003.431541][T23785] __should_failslab+0xee/0x130 [ 1003.436558][T23785] should_failslab+0x9/0x14 [ 1003.441073][T23785] __kmalloc+0x53/0x690 [ 1003.445250][T23785] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1003.451507][T23785] ? preempt_count_add+0x6f/0xb0 [ 1003.456462][T23785] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1003.462398][T23785] ? sock_kmalloc+0xbf/0x110 [ 1003.467002][T23785] sock_kmalloc+0xbf/0x110 [ 1003.471497][T23785] af_alg_alloc_areq+0x40/0x130 [ 1003.476411][T23785] aead_recvmsg+0x275/0xd60 [ 1003.480936][T23785] ? aead_release+0x50/0x50 [ 1003.485459][T23785] sock_recvmsg+0x92/0xb0 [ 1003.489805][T23785] ____sys_recvmsg+0x167/0x3a0 [ 1003.494639][T23785] ? copy_msghdr_from_user+0x246/0x320 [ 1003.500112][T23785] ___sys_recvmsg+0xb2/0x100 [ 1003.504723][T23785] ? __fget_light+0xaf/0x190 [ 1003.509323][T23785] ? __fdget+0x2c/0x40 [ 1003.513545][T23785] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1003.519803][T23785] __sys_recvmsg+0x9d/0x160 [ 1003.524372][T23785] __x64_sys_recvmsg+0x51/0x70 [ 1003.529144][T23785] do_syscall_64+0xcc/0x3a0 [ 1003.533656][T23785] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1003.539544][T23785] RIP: 0033:0x45b399 [ 1003.543455][T23785] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1003.563082][T23785] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1003.571508][T23785] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1003.579556][T23785] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1003.587617][T23785] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:41 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3f0}], 0x1}, 0x0) 09:27:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x440}], 0x1}, 0x0) 09:27:41 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3d0}], 0x1}, 0x0) 09:27:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3d0}], 0x1}, 0x0) 09:27:41 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38d", 0x1c}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 1003.595596][T23785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1003.603599][T23785] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000022 09:27:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x410}], 0x1}, 0x0) 09:27:42 executing program 3 (fault-call:5 fault-nth:35): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x450}], 0x1}, 0x0) 09:27:42 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3e0}], 0x1}, 0x0) 09:27:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3e0}], 0x1}, 0x0) 09:27:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x420}], 0x1}, 0x0) 09:27:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x460}], 0x1}, 0x0) [ 1004.062725][T24175] FAULT_INJECTION: forcing a failure. [ 1004.062725][T24175] name failslab, interval 1, probability 0, space 0, times 0 [ 1004.117235][T24175] CPU: 1 PID: 24175 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1004.126013][T24175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1004.136164][T24175] Call Trace: [ 1004.139460][T24175] dump_stack+0x11d/0x181 [ 1004.143825][T24175] should_fail.cold+0xa/0x1a [ 1004.148426][T24175] __should_failslab+0xee/0x130 [ 1004.153278][T24175] should_failslab+0x9/0x14 [ 1004.157788][T24175] __kmalloc+0x53/0x690 [ 1004.161970][T24175] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1004.168223][T24175] ? preempt_count_add+0x6f/0xb0 [ 1004.173169][T24175] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1004.179123][T24175] ? sock_kmalloc+0xbf/0x110 [ 1004.183717][T24175] sock_kmalloc+0xbf/0x110 [ 1004.188142][T24175] af_alg_alloc_areq+0x40/0x130 [ 1004.193024][T24175] aead_recvmsg+0x275/0xd60 [ 1004.197543][T24175] ? aead_release+0x50/0x50 [ 1004.202056][T24175] sock_recvmsg+0x92/0xb0 [ 1004.206464][T24175] ____sys_recvmsg+0x167/0x3a0 [ 1004.211264][T24175] ? copy_msghdr_from_user+0x246/0x320 [ 1004.216794][T24175] ___sys_recvmsg+0xb2/0x100 [ 1004.221397][T24175] ? __fget_light+0xaf/0x190 [ 1004.225995][T24175] ? __fdget+0x2c/0x40 [ 1004.230106][T24175] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1004.236418][T24175] __sys_recvmsg+0x9d/0x160 [ 1004.240938][T24175] __x64_sys_recvmsg+0x51/0x70 [ 1004.245756][T24175] do_syscall_64+0xcc/0x3a0 [ 1004.250275][T24175] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1004.256203][T24175] RIP: 0033:0x45b399 [ 1004.260119][T24175] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1004.280228][T24175] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1004.288648][T24175] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1004.296624][T24175] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1004.304695][T24175] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:42 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38d", 0x1c}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:42 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3f0}], 0x1}, 0x0) [ 1004.312672][T24175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1004.320721][T24175] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000023 09:27:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x430}], 0x1}, 0x0) 09:27:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x3f0}], 0x1}, 0x0) 09:27:42 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x470}], 0x1}, 0x0) 09:27:42 executing program 3 (fault-call:5 fault-nth:36): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:42 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x440}], 0x1}, 0x0) 09:27:42 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x410}], 0x1}, 0x0) 09:27:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x410}], 0x1}, 0x0) [ 1004.711692][T24551] FAULT_INJECTION: forcing a failure. [ 1004.711692][T24551] name failslab, interval 1, probability 0, space 0, times 0 09:27:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x480}], 0x1}, 0x0) 09:27:43 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d4", 0x1}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 1004.812839][T24551] CPU: 1 PID: 24551 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1004.821613][T24551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1004.831669][T24551] Call Trace: [ 1004.834963][T24551] dump_stack+0x11d/0x181 [ 1004.839375][T24551] should_fail.cold+0xa/0x1a [ 1004.843976][T24551] __should_failslab+0xee/0x130 [ 1004.848832][T24551] should_failslab+0x9/0x14 [ 1004.853348][T24551] __kmalloc+0x53/0x690 [ 1004.857514][T24551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1004.863826][T24551] ? preempt_count_add+0x6f/0xb0 [ 1004.868798][T24551] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1004.874761][T24551] ? sock_kmalloc+0xbf/0x110 [ 1004.879355][T24551] sock_kmalloc+0xbf/0x110 [ 1004.883793][T24551] af_alg_alloc_areq+0x40/0x130 [ 1004.888647][T24551] aead_recvmsg+0x275/0xd60 [ 1004.893176][T24551] ? aead_release+0x50/0x50 [ 1004.897691][T24551] sock_recvmsg+0x92/0xb0 [ 1004.902108][T24551] ____sys_recvmsg+0x167/0x3a0 [ 1004.906886][T24551] ? copy_msghdr_from_user+0x246/0x320 [ 1004.912413][T24551] ___sys_recvmsg+0xb2/0x100 [ 1004.917013][T24551] ? __fget_light+0xaf/0x190 [ 1004.921610][T24551] ? __fdget+0x2c/0x40 [ 1004.925686][T24551] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1004.931990][T24551] __sys_recvmsg+0x9d/0x160 [ 1004.936550][T24551] __x64_sys_recvmsg+0x51/0x70 [ 1004.941402][T24551] do_syscall_64+0xcc/0x3a0 [ 1004.945912][T24551] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1004.951803][T24551] RIP: 0033:0x45b399 [ 1004.955726][T24551] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1004.975332][T24551] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1004.983745][T24551] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1004.991755][T24551] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1004.999730][T24551] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x450}], 0x1}, 0x0) 09:27:43 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x420}], 0x1}, 0x0) [ 1005.007707][T24551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1005.015685][T24551] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000024 09:27:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x460}], 0x1}, 0x0) 09:27:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x420}], 0x1}, 0x0) 09:27:43 executing program 3 (fault-call:5 fault-nth:37): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:43 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x490}], 0x1}, 0x0) 09:27:43 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x430}], 0x1}, 0x0) 09:27:43 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d4", 0x1}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x470}], 0x1}, 0x0) [ 1005.473160][T24877] FAULT_INJECTION: forcing a failure. [ 1005.473160][T24877] name failslab, interval 1, probability 0, space 0, times 0 [ 1005.501938][T24877] CPU: 0 PID: 24877 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1005.510647][T24877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1005.520762][T24877] Call Trace: [ 1005.524066][T24877] dump_stack+0x11d/0x181 [ 1005.528524][T24877] should_fail.cold+0xa/0x1a [ 1005.533256][T24877] __should_failslab+0xee/0x130 [ 1005.538116][T24877] should_failslab+0x9/0x14 [ 1005.542634][T24877] __kmalloc+0x53/0x690 [ 1005.546813][T24877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1005.553074][T24877] ? preempt_count_add+0x6f/0xb0 [ 1005.558130][T24877] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1005.564031][T24877] ? sock_kmalloc+0xbf/0x110 [ 1005.568635][T24877] sock_kmalloc+0xbf/0x110 [ 1005.573063][T24877] af_alg_alloc_areq+0x40/0x130 [ 1005.577971][T24877] aead_recvmsg+0x275/0xd60 [ 1005.582498][T24877] ? aead_release+0x50/0x50 [ 1005.587654][T24877] sock_recvmsg+0x92/0xb0 [ 1005.592096][T24877] ____sys_recvmsg+0x167/0x3a0 [ 1005.596877][T24877] ? copy_msghdr_from_user+0x246/0x320 [ 1005.602526][T24877] ___sys_recvmsg+0xb2/0x100 [ 1005.607158][T24877] ? __fget_light+0xaf/0x190 [ 1005.611776][T24877] ? __fdget+0x2c/0x40 [ 1005.615861][T24877] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1005.622139][T24877] __sys_recvmsg+0x9d/0x160 [ 1005.626664][T24877] __x64_sys_recvmsg+0x51/0x70 [ 1005.631570][T24877] do_syscall_64+0xcc/0x3a0 [ 1005.636091][T24877] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1005.641984][T24877] RIP: 0033:0x45b399 [ 1005.645941][T24877] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:27:44 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x440}], 0x1}, 0x0) 09:27:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x430}], 0x1}, 0x0) [ 1005.665798][T24877] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1005.674378][T24877] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1005.682358][T24877] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1005.690332][T24877] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1005.698329][T24877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1005.706312][T24877] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000025 09:27:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d4", 0x1}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x480}], 0x1}, 0x0) 09:27:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4a0}], 0x1}, 0x0) 09:27:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x440}], 0x1}, 0x0) 09:27:44 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x450}], 0x1}, 0x0) 09:27:44 executing program 3 (fault-call:5 fault-nth:38): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:44 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x460}], 0x1}, 0x0) 09:27:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x490}], 0x1}, 0x0) 09:27:44 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4b0}], 0x1}, 0x0) 09:27:44 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1", 0xf}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x450}], 0x1}, 0x0) 09:27:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4a0}], 0x1}, 0x0) 09:27:44 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x470}], 0x1}, 0x0) [ 1006.411986][T25391] FAULT_INJECTION: forcing a failure. [ 1006.411986][T25391] name failslab, interval 1, probability 0, space 0, times 0 [ 1006.470006][T25391] CPU: 0 PID: 25391 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1006.478710][T25391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1006.488776][T25391] Call Trace: [ 1006.492081][T25391] dump_stack+0x11d/0x181 [ 1006.496422][T25391] should_fail.cold+0xa/0x1a [ 1006.501024][T25391] __should_failslab+0xee/0x130 [ 1006.505879][T25391] should_failslab+0x9/0x14 [ 1006.510467][T25391] __kmalloc+0x53/0x690 [ 1006.514637][T25391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1006.520885][T25391] ? preempt_count_add+0x6f/0xb0 [ 1006.525881][T25391] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1006.531815][T25391] ? sock_kmalloc+0xbf/0x110 [ 1006.536434][T25391] sock_kmalloc+0xbf/0x110 [ 1006.540929][T25391] af_alg_alloc_areq+0x40/0x130 [ 1006.545830][T25391] aead_recvmsg+0x275/0xd60 [ 1006.550351][T25391] ? aead_release+0x50/0x50 [ 1006.554862][T25391] sock_recvmsg+0x92/0xb0 [ 1006.559210][T25391] ____sys_recvmsg+0x167/0x3a0 [ 1006.564033][T25391] ? copy_msghdr_from_user+0x246/0x320 [ 1006.569540][T25391] ___sys_recvmsg+0xb2/0x100 [ 1006.574143][T25391] ? __fget_light+0xaf/0x190 [ 1006.578752][T25391] ? __fdget+0x2c/0x40 [ 1006.582953][T25391] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1006.589280][T25391] __sys_recvmsg+0x9d/0x160 [ 1006.593871][T25391] __x64_sys_recvmsg+0x51/0x70 [ 1006.598728][T25391] do_syscall_64+0xcc/0x3a0 [ 1006.603249][T25391] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1006.609139][T25391] RIP: 0033:0x45b399 [ 1006.613040][T25391] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1006.632641][T25391] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1006.641067][T25391] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1006.649041][T25391] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1006.657011][T25391] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:44 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4b0}], 0x1}, 0x0) [ 1006.665159][T25391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1006.673132][T25391] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000026 09:27:45 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x480}], 0x1}, 0x0) 09:27:45 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1", 0xf}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x460}], 0x1}, 0x0) 09:27:45 executing program 3 (fault-call:5 fault-nth:39): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4c0}], 0x1}, 0x0) 09:27:45 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x490}], 0x1}, 0x0) 09:27:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4c0}], 0x1}, 0x0) 09:27:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x470}], 0x1}, 0x0) [ 1007.152403][T25794] FAULT_INJECTION: forcing a failure. [ 1007.152403][T25794] name failslab, interval 1, probability 0, space 0, times 0 09:27:45 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4a0}], 0x1}, 0x0) 09:27:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4d0}], 0x1}, 0x0) [ 1007.216184][T25794] CPU: 0 PID: 25794 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1007.224903][T25794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1007.234955][T25794] Call Trace: [ 1007.238261][T25794] dump_stack+0x11d/0x181 [ 1007.242613][T25794] should_fail.cold+0xa/0x1a [ 1007.247246][T25794] __should_failslab+0xee/0x130 [ 1007.252116][T25794] should_failslab+0x9/0x14 [ 1007.256686][T25794] __kmalloc+0x53/0x690 [ 1007.260856][T25794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1007.267106][T25794] ? preempt_count_add+0x6f/0xb0 [ 1007.272181][T25794] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1007.278084][T25794] ? sock_kmalloc+0xbf/0x110 [ 1007.282685][T25794] sock_kmalloc+0xbf/0x110 [ 1007.287107][T25794] af_alg_alloc_areq+0x40/0x130 [ 1007.292043][T25794] aead_recvmsg+0x275/0xd60 [ 1007.296561][T25794] ? aead_release+0x50/0x50 [ 1007.301100][T25794] sock_recvmsg+0x92/0xb0 [ 1007.305458][T25794] ____sys_recvmsg+0x167/0x3a0 [ 1007.310326][T25794] ? copy_msghdr_from_user+0x246/0x320 [ 1007.315828][T25794] ___sys_recvmsg+0xb2/0x100 [ 1007.320424][T25794] ? __fget_light+0xaf/0x190 [ 1007.325124][T25794] ? __fdget+0x2c/0x40 [ 1007.329202][T25794] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1007.335462][T25794] __sys_recvmsg+0x9d/0x160 [ 1007.339985][T25794] __x64_sys_recvmsg+0x51/0x70 [ 1007.344793][T25794] do_syscall_64+0xcc/0x3a0 [ 1007.349342][T25794] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1007.355233][T25794] RIP: 0033:0x45b399 [ 1007.359134][T25794] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1007.378746][T25794] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1007.387160][T25794] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1007.395155][T25794] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1007.403135][T25794] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:45 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x480}], 0x1}, 0x0) 09:27:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4d0}], 0x1}, 0x0) [ 1007.411107][T25794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1007.419114][T25794] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000027 09:27:45 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4b0}], 0x1}, 0x0) 09:27:45 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1", 0xf}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:45 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4e0}], 0x1}, 0x0) 09:27:45 executing program 3 (fault-call:5 fault-nth:40): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:45 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4e0}], 0x1}, 0x0) 09:27:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x490}], 0x1}, 0x0) 09:27:46 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4c0}], 0x1}, 0x0) [ 1007.812350][T26161] FAULT_INJECTION: forcing a failure. [ 1007.812350][T26161] name failslab, interval 1, probability 0, space 0, times 0 [ 1007.914174][T26161] CPU: 1 PID: 26161 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1007.922881][T26161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1007.932982][T26161] Call Trace: [ 1007.936287][T26161] dump_stack+0x11d/0x181 [ 1007.940632][T26161] should_fail.cold+0xa/0x1a [ 1007.945269][T26161] __should_failslab+0xee/0x130 [ 1007.950162][T26161] should_failslab+0x9/0x14 [ 1007.954684][T26161] __kmalloc+0x53/0x690 [ 1007.958924][T26161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1007.965266][T26161] ? preempt_count_add+0x6f/0xb0 [ 1007.970230][T26161] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1007.976133][T26161] ? sock_kmalloc+0xbf/0x110 [ 1007.980732][T26161] sock_kmalloc+0xbf/0x110 [ 1007.985149][T26161] af_alg_alloc_areq+0x40/0x130 [ 1007.990064][T26161] aead_recvmsg+0x275/0xd60 [ 1007.994661][T26161] ? aead_release+0x50/0x50 [ 1007.999213][T26161] sock_recvmsg+0x92/0xb0 [ 1008.003705][T26161] ____sys_recvmsg+0x167/0x3a0 [ 1008.008485][T26161] ? copy_msghdr_from_user+0x246/0x320 [ 1008.013970][T26161] ___sys_recvmsg+0xb2/0x100 [ 1008.018581][T26161] ? __fget_light+0xaf/0x190 [ 1008.023181][T26161] ? __fdget+0x2c/0x40 [ 1008.027333][T26161] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1008.033735][T26161] __sys_recvmsg+0x9d/0x160 [ 1008.038257][T26161] __x64_sys_recvmsg+0x51/0x70 [ 1008.043121][T26161] do_syscall_64+0xcc/0x3a0 [ 1008.047640][T26161] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1008.053527][T26161] RIP: 0033:0x45b399 [ 1008.057441][T26161] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1008.077043][T26161] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1008.085458][T26161] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1008.093445][T26161] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1008.101445][T26161] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4f0}], 0x1}, 0x0) 09:27:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a", 0x16}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4f0}], 0x1}, 0x0) [ 1008.109422][T26161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1008.117395][T26161] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000028 09:27:46 executing program 3 (fault-call:5 fault-nth:41): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:46 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4d0}], 0x1}, 0x0) 09:27:46 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x500}], 0x1}, 0x0) 09:27:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4a0}], 0x1}, 0x0) 09:27:46 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x500}], 0x1}, 0x0) [ 1008.417492][T26486] FAULT_INJECTION: forcing a failure. [ 1008.417492][T26486] name failslab, interval 1, probability 0, space 0, times 0 [ 1008.436600][T26486] CPU: 0 PID: 26486 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1008.445322][T26486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1008.455375][T26486] Call Trace: [ 1008.458668][T26486] dump_stack+0x11d/0x181 [ 1008.463053][T26486] should_fail.cold+0xa/0x1a [ 1008.467697][T26486] __should_failslab+0xee/0x130 [ 1008.472557][T26486] should_failslab+0x9/0x14 [ 1008.477071][T26486] __kmalloc+0x53/0x690 [ 1008.481299][T26486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1008.487996][T26486] ? preempt_count_add+0x6f/0xb0 [ 1008.492948][T26486] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1008.498851][T26486] ? sock_kmalloc+0xbf/0x110 [ 1008.503455][T26486] sock_kmalloc+0xbf/0x110 [ 1008.507899][T26486] af_alg_alloc_areq+0x40/0x130 [ 1008.512957][T26486] aead_recvmsg+0x275/0xd60 [ 1008.517524][T26486] ? aead_release+0x50/0x50 [ 1008.522076][T26486] sock_recvmsg+0x92/0xb0 [ 1008.526473][T26486] ____sys_recvmsg+0x167/0x3a0 [ 1008.531355][T26486] ? copy_msghdr_from_user+0x246/0x320 [ 1008.536851][T26486] ___sys_recvmsg+0xb2/0x100 [ 1008.541462][T26486] ? __fget_light+0xaf/0x190 [ 1008.546078][T26486] ? __fdget+0x2c/0x40 [ 1008.550237][T26486] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1008.556597][T26486] __sys_recvmsg+0x9d/0x160 [ 1008.561177][T26486] __x64_sys_recvmsg+0x51/0x70 [ 1008.565957][T26486] do_syscall_64+0xcc/0x3a0 [ 1008.570491][T26486] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1008.576377][T26486] RIP: 0033:0x45b399 [ 1008.580282][T26486] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1008.599969][T26486] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1008.608396][T26486] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 09:27:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4b0}], 0x1}, 0x0) 09:27:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a", 0x16}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 1008.616371][T26486] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1008.624405][T26486] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1008.632376][T26486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1008.640474][T26486] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000029 09:27:47 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4e0}], 0x1}, 0x0) 09:27:47 executing program 3 (fault-call:5 fault-nth:42): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x510}], 0x1}, 0x0) 09:27:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x510}], 0x1}, 0x0) [ 1008.954836][T26737] FAULT_INJECTION: forcing a failure. [ 1008.954836][T26737] name failslab, interval 1, probability 0, space 0, times 0 [ 1009.002180][T26737] CPU: 0 PID: 26737 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1009.010904][T26737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.021161][T26737] Call Trace: [ 1009.024469][T26737] dump_stack+0x11d/0x181 [ 1009.028893][T26737] should_fail.cold+0xa/0x1a [ 1009.033550][T26737] __should_failslab+0xee/0x130 [ 1009.038439][T26737] should_failslab+0x9/0x14 [ 1009.042992][T26737] __kmalloc+0x53/0x690 09:27:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4c0}], 0x1}, 0x0) [ 1009.047163][T26737] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1009.053417][T26737] ? preempt_count_add+0x6f/0xb0 [ 1009.058451][T26737] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1009.064350][T26737] ? sock_kmalloc+0xbf/0x110 [ 1009.068953][T26737] sock_kmalloc+0xbf/0x110 [ 1009.073445][T26737] af_alg_alloc_areq+0x40/0x130 [ 1009.078996][T26737] aead_recvmsg+0x275/0xd60 [ 1009.083586][T26737] ? aead_release+0x50/0x50 [ 1009.088214][T26737] sock_recvmsg+0x92/0xb0 [ 1009.092557][T26737] ____sys_recvmsg+0x167/0x3a0 [ 1009.097410][T26737] ? copy_msghdr_from_user+0x246/0x320 09:27:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x520}], 0x1}, 0x0) [ 1009.102934][T26737] ___sys_recvmsg+0xb2/0x100 [ 1009.107545][T26737] ? __fget_light+0xaf/0x190 [ 1009.112144][T26737] ? __fdget+0x2c/0x40 [ 1009.116387][T26737] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1009.122693][T26737] __sys_recvmsg+0x9d/0x160 [ 1009.127222][T26737] __x64_sys_recvmsg+0x51/0x70 [ 1009.132024][T26737] do_syscall_64+0xcc/0x3a0 [ 1009.136546][T26737] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1009.142475][T26737] RIP: 0033:0x45b399 [ 1009.146408][T26737] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1009.166013][T26737] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1009.174496][T26737] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1009.182507][T26737] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1009.190485][T26737] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:47 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4f0}], 0x1}, 0x0) [ 1009.198558][T26737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1009.206529][T26737] R13: 0000000000000891 R14: 00000000004c9f88 R15: 000000000000002a 09:27:47 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a", 0x16}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:47 executing program 3 (fault-call:5 fault-nth:43): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x530}], 0x1}, 0x0) 09:27:47 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x500}], 0x1}, 0x0) 09:27:47 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4d0}], 0x1}, 0x0) 09:27:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x520}], 0x1}, 0x0) [ 1009.555760][T27038] FAULT_INJECTION: forcing a failure. [ 1009.555760][T27038] name failslab, interval 1, probability 0, space 0, times 0 [ 1009.593018][T27038] CPU: 0 PID: 27038 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1009.601838][T27038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.611901][T27038] Call Trace: [ 1009.615212][T27038] dump_stack+0x11d/0x181 [ 1009.619691][T27038] should_fail.cold+0xa/0x1a [ 1009.624305][T27038] __should_failslab+0xee/0x130 [ 1009.629278][T27038] should_failslab+0x9/0x14 [ 1009.633841][T27038] __kmalloc+0x53/0x690 [ 1009.638013][T27038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1009.644307][T27038] ? preempt_count_add+0x6f/0xb0 [ 1009.649265][T27038] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1009.655220][T27038] ? sock_kmalloc+0xbf/0x110 [ 1009.659827][T27038] sock_kmalloc+0xbf/0x110 [ 1009.664258][T27038] af_alg_alloc_areq+0x40/0x130 [ 1009.669121][T27038] aead_recvmsg+0x275/0xd60 [ 1009.673798][T27038] ? aead_release+0x50/0x50 [ 1009.678321][T27038] sock_recvmsg+0x92/0xb0 [ 1009.682672][T27038] ____sys_recvmsg+0x167/0x3a0 [ 1009.687556][T27038] ? copy_msghdr_from_user+0x246/0x320 [ 1009.693061][T27038] ___sys_recvmsg+0xb2/0x100 [ 1009.697740][T27038] ? __fget_light+0xaf/0x190 [ 1009.702345][T27038] ? __fdget+0x2c/0x40 09:27:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x510}], 0x1}, 0x0) [ 1009.706431][T27038] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1009.712729][T27038] __sys_recvmsg+0x9d/0x160 [ 1009.717327][T27038] __x64_sys_recvmsg+0x51/0x70 [ 1009.722102][T27038] do_syscall_64+0xcc/0x3a0 [ 1009.726622][T27038] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1009.732522][T27038] RIP: 0033:0x45b399 [ 1009.736433][T27038] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1009.756067][T27038] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1009.764516][T27038] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1009.772498][T27038] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1009.780476][T27038] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1009.788460][T27038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1009.796442][T27038] R13: 0000000000000891 R14: 00000000004c9f88 R15: 000000000000002b 09:27:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x540}], 0x1}, 0x0) 09:27:48 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229", 0x19}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4e0}], 0x1}, 0x0) 09:27:48 executing program 3 (fault-call:5 fault-nth:44): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x530}], 0x1}, 0x0) 09:27:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x520}], 0x1}, 0x0) [ 1010.147320][T27261] FAULT_INJECTION: forcing a failure. [ 1010.147320][T27261] name failslab, interval 1, probability 0, space 0, times 0 09:27:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x550}], 0x1}, 0x0) [ 1010.194356][T27261] CPU: 0 PID: 27261 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1010.203108][T27261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1010.213168][T27261] Call Trace: [ 1010.216584][T27261] dump_stack+0x11d/0x181 [ 1010.220966][T27261] should_fail.cold+0xa/0x1a [ 1010.225589][T27261] __should_failslab+0xee/0x130 [ 1010.230550][T27261] should_failslab+0x9/0x14 [ 1010.235109][T27261] __kmalloc+0x53/0x690 [ 1010.239285][T27261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1010.245550][T27261] ? preempt_count_add+0x6f/0xb0 [ 1010.250675][T27261] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1010.256686][T27261] ? sock_kmalloc+0xbf/0x110 [ 1010.261305][T27261] sock_kmalloc+0xbf/0x110 [ 1010.265794][T27261] af_alg_alloc_areq+0x40/0x130 [ 1010.270665][T27261] aead_recvmsg+0x275/0xd60 [ 1010.275235][T27261] ? aead_release+0x50/0x50 [ 1010.279754][T27261] sock_recvmsg+0x92/0xb0 [ 1010.284101][T27261] ____sys_recvmsg+0x167/0x3a0 [ 1010.288909][T27261] ? copy_msghdr_from_user+0x246/0x320 [ 1010.294454][T27261] ___sys_recvmsg+0xb2/0x100 [ 1010.299077][T27261] ? __fget_light+0xaf/0x190 [ 1010.303699][T27261] ? __fdget+0x2c/0x40 [ 1010.307788][T27261] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1010.314121][T27261] __sys_recvmsg+0x9d/0x160 [ 1010.319472][T27261] __x64_sys_recvmsg+0x51/0x70 [ 1010.324335][T27261] do_syscall_64+0xcc/0x3a0 [ 1010.328927][T27261] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1010.334819][T27261] RIP: 0033:0x45b399 [ 1010.338734][T27261] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1010.358509][T27261] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1010.367031][T27261] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1010.375006][T27261] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1010.383090][T27261] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x540}], 0x1}, 0x0) [ 1010.391154][T27261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1010.399135][T27261] R13: 0000000000000891 R14: 00000000004c9f88 R15: 000000000000002c 09:27:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x560}], 0x1}, 0x0) 09:27:48 executing program 3 (fault-call:5 fault-nth:45): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x4f0}], 0x1}, 0x0) 09:27:48 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229", 0x19}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x530}], 0x1}, 0x0) [ 1010.729141][T27558] FAULT_INJECTION: forcing a failure. [ 1010.729141][T27558] name failslab, interval 1, probability 0, space 0, times 0 [ 1010.767381][T27558] CPU: 0 PID: 27558 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1010.776117][T27558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1010.786622][T27558] Call Trace: [ 1010.789929][T27558] dump_stack+0x11d/0x181 [ 1010.794389][T27558] should_fail.cold+0xa/0x1a [ 1010.799011][T27558] __should_failslab+0xee/0x130 [ 1010.803907][T27558] should_failslab+0x9/0x14 [ 1010.808461][T27558] __kmalloc+0x53/0x690 [ 1010.812755][T27558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1010.819000][T27558] ? preempt_count_add+0x6f/0xb0 [ 1010.824077][T27558] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1010.829978][T27558] ? sock_kmalloc+0xbf/0x110 [ 1010.834581][T27558] sock_kmalloc+0xbf/0x110 [ 1010.839004][T27558] af_alg_alloc_areq+0x40/0x130 [ 1010.843863][T27558] aead_recvmsg+0x275/0xd60 [ 1010.848386][T27558] ? aead_release+0x50/0x50 [ 1010.852906][T27558] sock_recvmsg+0x92/0xb0 [ 1010.857317][T27558] ____sys_recvmsg+0x167/0x3a0 [ 1010.862097][T27558] ? copy_msghdr_from_user+0x246/0x320 [ 1010.867576][T27558] ___sys_recvmsg+0xb2/0x100 [ 1010.872219][T27558] ? __fget_light+0xaf/0x190 [ 1010.876824][T27558] ? __fdget+0x2c/0x40 [ 1010.880907][T27558] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1010.887162][T27558] __sys_recvmsg+0x9d/0x160 [ 1010.891682][T27558] __x64_sys_recvmsg+0x51/0x70 [ 1010.896504][T27558] do_syscall_64+0xcc/0x3a0 [ 1010.901128][T27558] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1010.907117][T27558] RIP: 0033:0x45b399 09:27:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x570}], 0x1}, 0x0) 09:27:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x550}], 0x1}, 0x0) [ 1010.911025][T27558] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1010.930905][T27558] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1010.939425][T27558] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1010.947400][T27558] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1010.955377][T27558] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1010.963349][T27558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1010.971352][T27558] R13: 0000000000000891 R14: 00000000004c9f88 R15: 000000000000002d 09:27:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x500}], 0x1}, 0x0) 09:27:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x580}], 0x1}, 0x0) 09:27:49 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x540}], 0x1}, 0x0) 09:27:49 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229", 0x19}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x560}], 0x1}, 0x0) 09:27:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x510}], 0x1}, 0x0) 09:27:49 executing program 3 (fault-call:5 fault-nth:46): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:49 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x550}], 0x1}, 0x0) [ 1011.451297][T27932] FAULT_INJECTION: forcing a failure. [ 1011.451297][T27932] name failslab, interval 1, probability 0, space 0, times 0 [ 1011.474240][T27932] CPU: 0 PID: 27932 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1011.482924][T27932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1011.493073][T27932] Call Trace: [ 1011.496374][T27932] dump_stack+0x11d/0x181 [ 1011.500799][T27932] should_fail.cold+0xa/0x1a [ 1011.505405][T27932] __should_failslab+0xee/0x130 [ 1011.510299][T27932] should_failslab+0x9/0x14 [ 1011.514808][T27932] __kmalloc+0x53/0x690 [ 1011.518977][T27932] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1011.525225][T27932] ? preempt_count_add+0x6f/0xb0 [ 1011.530171][T27932] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1011.536166][T27932] ? sock_kmalloc+0xbf/0x110 [ 1011.540767][T27932] sock_kmalloc+0xbf/0x110 [ 1011.545193][T27932] af_alg_alloc_areq+0x40/0x130 [ 1011.550124][T27932] aead_recvmsg+0x275/0xd60 [ 1011.554641][T27932] ? aead_release+0x50/0x50 [ 1011.559225][T27932] sock_recvmsg+0x92/0xb0 [ 1011.563577][T27932] ____sys_recvmsg+0x167/0x3a0 [ 1011.568348][T27932] ? copy_msghdr_from_user+0x246/0x320 [ 1011.573885][T27932] ___sys_recvmsg+0xb2/0x100 [ 1011.578487][T27932] ? __fget_light+0xaf/0x190 [ 1011.583084][T27932] ? __fdget+0x2c/0x40 [ 1011.587187][T27932] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1011.593480][T27932] __sys_recvmsg+0x9d/0x160 [ 1011.598002][T27932] __x64_sys_recvmsg+0x51/0x70 [ 1011.602879][T27932] do_syscall_64+0xcc/0x3a0 [ 1011.607401][T27932] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1011.613396][T27932] RIP: 0033:0x45b399 [ 1011.617294][T27932] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1011.636902][T27932] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f 09:27:49 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc3", 0x1b}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x590}], 0x1}, 0x0) 09:27:49 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x570}], 0x1}, 0x0) [ 1011.645372][T27932] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1011.653321][T27932] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1011.661291][T27932] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1011.669250][T27932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1011.677228][T27932] R13: 0000000000000891 R14: 00000000004c9f88 R15: 000000000000002e 09:27:50 executing program 3 (fault-call:5 fault-nth:47): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x520}], 0x1}, 0x0) 09:27:50 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x560}], 0x1}, 0x0) 09:27:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x580}], 0x1}, 0x0) 09:27:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5a0}], 0x1}, 0x0) [ 1012.101091][T28246] FAULT_INJECTION: forcing a failure. [ 1012.101091][T28246] name failslab, interval 1, probability 0, space 0, times 0 [ 1012.175265][T28246] CPU: 0 PID: 28246 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1012.183966][T28246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1012.194081][T28246] Call Trace: [ 1012.197377][T28246] dump_stack+0x11d/0x181 [ 1012.201727][T28246] should_fail.cold+0xa/0x1a [ 1012.206326][T28246] __should_failslab+0xee/0x130 [ 1012.211296][T28246] should_failslab+0x9/0x14 [ 1012.215960][T28246] __kmalloc+0x53/0x690 [ 1012.220139][T28246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1012.226389][T28246] ? preempt_count_add+0x6f/0xb0 [ 1012.231388][T28246] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1012.237319][T28246] ? sock_kmalloc+0xbf/0x110 [ 1012.241951][T28246] sock_kmalloc+0xbf/0x110 [ 1012.246376][T28246] af_alg_alloc_areq+0x40/0x130 [ 1012.251343][T28246] aead_recvmsg+0x275/0xd60 [ 1012.255915][T28246] ? aead_release+0x50/0x50 [ 1012.260427][T28246] sock_recvmsg+0x92/0xb0 [ 1012.264768][T28246] ____sys_recvmsg+0x167/0x3a0 [ 1012.269546][T28246] ? copy_msghdr_from_user+0x246/0x320 [ 1012.275091][T28246] ___sys_recvmsg+0xb2/0x100 [ 1012.279765][T28246] ? __fget_light+0xaf/0x190 [ 1012.284359][T28246] ? __fdget+0x2c/0x40 [ 1012.288474][T28246] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1012.294788][T28246] __sys_recvmsg+0x9d/0x160 [ 1012.299311][T28246] __x64_sys_recvmsg+0x51/0x70 [ 1012.304087][T28246] do_syscall_64+0xcc/0x3a0 [ 1012.308688][T28246] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1012.314655][T28246] RIP: 0033:0x45b399 [ 1012.318562][T28246] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1012.338184][T28246] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1012.346597][T28246] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1012.354575][T28246] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1012.362547][T28246] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x590}], 0x1}, 0x0) 09:27:50 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x570}], 0x1}, 0x0) 09:27:50 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc3", 0x1b}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x530}], 0x1}, 0x0) [ 1012.370517][T28246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1012.378556][T28246] R13: 0000000000000891 R14: 00000000004c9f88 R15: 000000000000002f 09:27:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5b0}], 0x1}, 0x0) 09:27:50 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x580}], 0x1}, 0x0) 09:27:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5a0}], 0x1}, 0x0) 09:27:51 executing program 3 (fault-call:5 fault-nth:48): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:51 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x590}], 0x1}, 0x0) 09:27:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000580)="058903e670d062f5f496f121feb84f09b00be10b164f76df040ec12d46e0f5a8b84f3d4f7c627c23cdc0b1f583fe802d19f8f9c536c8e8ab28a38ad3c97f1ee44788750e75628b48f5446040", 0x4c}, {&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc3", 0x1b}, {&(0x7f0000000640)}], 0x3, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5c0}], 0x1}, 0x0) 09:27:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x540}], 0x1}, 0x0) 09:27:51 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5a0}], 0x1}, 0x0) 09:27:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5b0}], 0x1}, 0x0) [ 1013.026412][T28795] FAULT_INJECTION: forcing a failure. [ 1013.026412][T28795] name failslab, interval 1, probability 0, space 0, times 0 09:27:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5d0}], 0x1}, 0x0) [ 1013.114113][T28795] CPU: 1 PID: 28795 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1013.122824][T28795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1013.132876][T28795] Call Trace: [ 1013.136245][T28795] dump_stack+0x11d/0x181 [ 1013.140600][T28795] should_fail.cold+0xa/0x1a [ 1013.145202][T28795] __should_failslab+0xee/0x130 [ 1013.150099][T28795] should_failslab+0x9/0x14 [ 1013.154612][T28795] __kmalloc+0x53/0x690 [ 1013.158781][T28795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1013.165179][T28795] ? preempt_count_add+0x6f/0xb0 [ 1013.170175][T28795] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1013.176124][T28795] ? sock_kmalloc+0xbf/0x110 [ 1013.180730][T28795] sock_kmalloc+0xbf/0x110 [ 1013.185154][T28795] af_alg_alloc_areq+0x40/0x130 [ 1013.190018][T28795] aead_recvmsg+0x275/0xd60 [ 1013.194532][T28795] ? aead_release+0x50/0x50 [ 1013.199083][T28795] sock_recvmsg+0x92/0xb0 [ 1013.203427][T28795] ____sys_recvmsg+0x167/0x3a0 [ 1013.208320][T28795] ? copy_msghdr_from_user+0x246/0x320 [ 1013.213796][T28795] ___sys_recvmsg+0xb2/0x100 [ 1013.218397][T28795] ? __fget_light+0xaf/0x190 [ 1013.223038][T28795] ? __fdget+0x2c/0x40 [ 1013.227118][T28795] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1013.233369][T28795] __sys_recvmsg+0x9d/0x160 [ 1013.237891][T28795] __x64_sys_recvmsg+0x51/0x70 [ 1013.242685][T28795] do_syscall_64+0xcc/0x3a0 [ 1013.247277][T28795] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1013.253164][T28795] RIP: 0033:0x45b399 [ 1013.257077][T28795] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1013.276852][T28795] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1013.285326][T28795] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1013.293339][T28795] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1013.301316][T28795] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:51 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38d", 0x1c}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 1013.309280][T28795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1013.317324][T28795] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000030 09:27:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x550}], 0x1}, 0x0) 09:27:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5e0}], 0x1}, 0x0) 09:27:51 executing program 3 (fault-call:5 fault-nth:49): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:51 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5b0}], 0x1}, 0x0) 09:27:51 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5c0}], 0x1}, 0x0) 09:27:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x560}], 0x1}, 0x0) [ 1013.656523][T29128] FAULT_INJECTION: forcing a failure. [ 1013.656523][T29128] name failslab, interval 1, probability 0, space 0, times 0 [ 1013.696537][T29128] CPU: 1 PID: 29128 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1013.705241][T29128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1013.725195][T29128] Call Trace: [ 1013.728499][T29128] dump_stack+0x11d/0x181 [ 1013.732889][T29128] should_fail.cold+0xa/0x1a [ 1013.737499][T29128] __should_failslab+0xee/0x130 [ 1013.742363][T29128] should_failslab+0x9/0x14 [ 1013.746892][T29128] __kmalloc+0x53/0x690 [ 1013.751064][T29128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1013.757359][T29128] ? preempt_count_add+0x6f/0xb0 [ 1013.762318][T29128] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1013.768256][T29128] ? sock_kmalloc+0xbf/0x110 [ 1013.772907][T29128] sock_kmalloc+0xbf/0x110 [ 1013.777330][T29128] af_alg_alloc_areq+0x40/0x130 [ 1013.782196][T29128] aead_recvmsg+0x275/0xd60 [ 1013.786834][T29128] ? aead_release+0x50/0x50 [ 1013.791345][T29128] sock_recvmsg+0x92/0xb0 [ 1013.795685][T29128] ____sys_recvmsg+0x167/0x3a0 [ 1013.800461][T29128] ? copy_msghdr_from_user+0x246/0x320 [ 1013.806017][T29128] ___sys_recvmsg+0xb2/0x100 [ 1013.810621][T29128] ? __fget_light+0xaf/0x190 [ 1013.815219][T29128] ? __fdget+0x2c/0x40 [ 1013.819286][T29128] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1013.825616][T29128] __sys_recvmsg+0x9d/0x160 [ 1013.830201][T29128] __x64_sys_recvmsg+0x51/0x70 [ 1013.834975][T29128] do_syscall_64+0xcc/0x3a0 [ 1013.839494][T29128] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1013.845404][T29128] RIP: 0033:0x45b399 [ 1013.849464][T29128] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1013.869197][T29128] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1013.877706][T29128] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1013.885662][T29128] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1013.893695][T29128] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1013.901708][T29128] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 09:27:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5d0}], 0x1}, 0x0) 09:27:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5f0}], 0x1}, 0x0) [ 1013.909669][T29128] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000031 09:27:52 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38d", 0x1c}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5c0}], 0x1}, 0x0) 09:27:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x600}], 0x1}, 0x0) 09:27:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x570}], 0x1}, 0x0) 09:27:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5e0}], 0x1}, 0x0) 09:27:52 executing program 3 (fault-call:5 fault-nth:50): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x610}], 0x1}, 0x0) 09:27:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5d0}], 0x1}, 0x0) [ 1014.438653][T29604] FAULT_INJECTION: forcing a failure. [ 1014.438653][T29604] name failslab, interval 1, probability 0, space 0, times 0 [ 1014.498623][T29604] CPU: 1 PID: 29604 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1014.507430][T29604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1014.517478][T29604] Call Trace: [ 1014.520773][T29604] dump_stack+0x11d/0x181 [ 1014.525116][T29604] should_fail.cold+0xa/0x1a [ 1014.529718][T29604] __should_failslab+0xee/0x130 [ 1014.534637][T29604] should_failslab+0x9/0x14 [ 1014.539150][T29604] __kmalloc+0x53/0x690 [ 1014.543328][T29604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1014.549588][T29604] ? preempt_count_add+0x6f/0xb0 [ 1014.554522][T29604] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1014.560418][T29604] ? sock_kmalloc+0xbf/0x110 [ 1014.565011][T29604] sock_kmalloc+0xbf/0x110 [ 1014.569467][T29604] af_alg_alloc_areq+0x40/0x130 [ 1014.574350][T29604] aead_recvmsg+0x275/0xd60 [ 1014.578870][T29604] ? aead_release+0x50/0x50 [ 1014.583470][T29604] sock_recvmsg+0x92/0xb0 [ 1014.587825][T29604] ____sys_recvmsg+0x167/0x3a0 [ 1014.592675][T29604] ? copy_msghdr_from_user+0x246/0x320 09:27:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x620}], 0x1}, 0x0) 09:27:52 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5f0}], 0x1}, 0x0) 09:27:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x580}], 0x1}, 0x0) [ 1014.598155][T29604] ___sys_recvmsg+0xb2/0x100 [ 1014.602834][T29604] ? __fget_light+0xaf/0x190 [ 1014.607457][T29604] ? __fdget+0x2c/0x40 [ 1014.611540][T29604] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1014.617819][T29604] __sys_recvmsg+0x9d/0x160 [ 1014.622337][T29604] __x64_sys_recvmsg+0x51/0x70 [ 1014.627113][T29604] do_syscall_64+0xcc/0x3a0 [ 1014.631626][T29604] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1014.637569][T29604] RIP: 0033:0x45b399 [ 1014.641535][T29604] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1014.661141][T29604] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1014.669733][T29604] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1014.677709][T29604] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1014.685684][T29604] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1014.693738][T29604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1014.701808][T29604] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000032 09:27:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5e0}], 0x1}, 0x0) 09:27:53 executing program 3 (fault-call:5 fault-nth:51): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x630}], 0x1}, 0x0) 09:27:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x600}], 0x1}, 0x0) 09:27:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x590}], 0x1}, 0x0) [ 1015.095161][T29899] FAULT_INJECTION: forcing a failure. [ 1015.095161][T29899] name failslab, interval 1, probability 0, space 0, times 0 [ 1015.134932][T29899] CPU: 1 PID: 29899 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1015.143671][T29899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1015.153734][T29899] Call Trace: [ 1015.157086][T29899] dump_stack+0x11d/0x181 [ 1015.161444][T29899] should_fail.cold+0xa/0x1a [ 1015.166106][T29899] __should_failslab+0xee/0x130 [ 1015.170968][T29899] should_failslab+0x9/0x14 [ 1015.175563][T29899] __kmalloc+0x53/0x690 [ 1015.179749][T29899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1015.186018][T29899] ? preempt_count_add+0x6f/0xb0 [ 1015.191125][T29899] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1015.197024][T29899] ? sock_kmalloc+0xbf/0x110 [ 1015.201617][T29899] sock_kmalloc+0xbf/0x110 [ 1015.206047][T29899] af_alg_alloc_areq+0x40/0x130 [ 1015.210965][T29899] aead_recvmsg+0x275/0xd60 [ 1015.215490][T29899] ? aead_release+0x50/0x50 [ 1015.220092][T29899] sock_recvmsg+0x92/0xb0 [ 1015.224525][T29899] ____sys_recvmsg+0x167/0x3a0 [ 1015.229325][T29899] ? copy_msghdr_from_user+0x246/0x320 [ 1015.234805][T29899] ___sys_recvmsg+0xb2/0x100 [ 1015.239412][T29899] ? __fget_light+0xaf/0x190 [ 1015.244007][T29899] ? __fdget+0x2c/0x40 [ 1015.248163][T29899] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1015.254477][T29899] __sys_recvmsg+0x9d/0x160 [ 1015.259074][T29899] __x64_sys_recvmsg+0x51/0x70 [ 1015.263849][T29899] do_syscall_64+0xcc/0x3a0 [ 1015.268370][T29899] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1015.274254][T29899] RIP: 0033:0x45b399 09:27:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5f0}], 0x1}, 0x0) 09:27:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x610}], 0x1}, 0x0) [ 1015.278164][T29899] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1015.298195][T29899] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1015.306613][T29899] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1015.314608][T29899] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1015.322598][T29899] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1015.330572][T29899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 09:27:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x640}], 0x1}, 0x0) [ 1015.338553][T29899] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000033 09:27:53 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5a0}], 0x1}, 0x0) 09:27:53 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x620}], 0x1}, 0x0) 09:27:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x600}], 0x1}, 0x0) 09:27:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x650}], 0x1}, 0x0) 09:27:53 executing program 3 (fault-call:5 fault-nth:52): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5b0}], 0x1}, 0x0) 09:27:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x660}], 0x1}, 0x0) 09:27:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x630}], 0x1}, 0x0) 09:27:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x610}], 0x1}, 0x0) [ 1015.851129][T30433] FAULT_INJECTION: forcing a failure. [ 1015.851129][T30433] name failslab, interval 1, probability 0, space 0, times 0 [ 1015.894991][T30433] CPU: 0 PID: 30433 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1015.903698][T30433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1015.913753][T30433] Call Trace: [ 1015.917058][T30433] dump_stack+0x11d/0x181 [ 1015.921482][T30433] should_fail.cold+0xa/0x1a [ 1015.926084][T30433] __should_failslab+0xee/0x130 [ 1015.930946][T30433] should_failslab+0x9/0x14 [ 1015.935465][T30433] __kmalloc+0x53/0x690 [ 1015.939638][T30433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1015.945889][T30433] ? preempt_count_add+0x6f/0xb0 [ 1015.950845][T30433] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1015.956922][T30433] ? sock_kmalloc+0xbf/0x110 [ 1015.961545][T30433] sock_kmalloc+0xbf/0x110 [ 1015.965992][T30433] af_alg_alloc_areq+0x40/0x130 [ 1015.971020][T30433] aead_recvmsg+0x275/0xd60 [ 1015.975537][T30433] ? aead_release+0x50/0x50 [ 1015.980068][T30433] sock_recvmsg+0x92/0xb0 [ 1015.984608][T30433] ____sys_recvmsg+0x167/0x3a0 [ 1015.989387][T30433] ? copy_msghdr_from_user+0x246/0x320 [ 1015.994873][T30433] ___sys_recvmsg+0xb2/0x100 [ 1015.999706][T30433] ? __fget_light+0xaf/0x190 [ 1016.004437][T30433] ? __fdget+0x2c/0x40 [ 1016.008543][T30433] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1016.014866][T30433] __sys_recvmsg+0x9d/0x160 [ 1016.019393][T30433] __x64_sys_recvmsg+0x51/0x70 [ 1016.024172][T30433] do_syscall_64+0xcc/0x3a0 [ 1016.028753][T30433] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1016.034645][T30433] RIP: 0033:0x45b399 [ 1016.038620][T30433] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1016.058231][T30433] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1016.066653][T30433] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1016.074625][T30433] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1016.082600][T30433] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x670}], 0x1}, 0x0) [ 1016.090568][T30433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1016.098543][T30433] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000034 09:27:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{0x0}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x640}], 0x1}, 0x0) 09:27:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5c0}], 0x1}, 0x0) 09:27:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x620}], 0x1}, 0x0) 09:27:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x680}], 0x1}, 0x0) 09:27:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:54 executing program 3 (fault-call:5 fault-nth:53): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:54 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x650}], 0x1}, 0x0) 09:27:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5d0}], 0x1}, 0x0) 09:27:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x630}], 0x1}, 0x0) 09:27:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x690}], 0x1}, 0x0) [ 1016.771982][T30873] FAULT_INJECTION: forcing a failure. [ 1016.771982][T30873] name failslab, interval 1, probability 0, space 0, times 0 [ 1016.843434][T30873] CPU: 1 PID: 30873 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1016.852134][T30873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1016.862189][T30873] Call Trace: [ 1016.865486][T30873] dump_stack+0x11d/0x181 [ 1016.869883][T30873] should_fail.cold+0xa/0x1a [ 1016.874540][T30873] __should_failslab+0xee/0x130 [ 1016.879407][T30873] should_failslab+0x9/0x14 [ 1016.883926][T30873] __kmalloc+0x53/0x690 [ 1016.888099][T30873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1016.894350][T30873] ? preempt_count_add+0x6f/0xb0 [ 1016.899308][T30873] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1016.905218][T30873] ? sock_kmalloc+0xbf/0x110 [ 1016.909822][T30873] sock_kmalloc+0xbf/0x110 [ 1016.914250][T30873] af_alg_alloc_areq+0x40/0x130 [ 1016.919106][T30873] aead_recvmsg+0x275/0xd60 [ 1016.923628][T30873] ? aead_release+0x50/0x50 [ 1016.928174][T30873] sock_recvmsg+0x92/0xb0 [ 1016.932516][T30873] ____sys_recvmsg+0x167/0x3a0 [ 1016.937305][T30873] ? copy_msghdr_from_user+0x246/0x320 09:27:55 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 1016.942838][T30873] ___sys_recvmsg+0xb2/0x100 [ 1016.947442][T30873] ? __fget_light+0xaf/0x190 [ 1016.952072][T30873] ? __fdget+0x2c/0x40 [ 1016.956217][T30873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1016.962464][T30873] __sys_recvmsg+0x9d/0x160 [ 1016.967031][T30873] __x64_sys_recvmsg+0x51/0x70 [ 1016.971804][T30873] do_syscall_64+0xcc/0x3a0 [ 1016.976382][T30873] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1016.982299][T30873] RIP: 0033:0x45b399 [ 1016.986238][T30873] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1017.005850][T30873] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1017.014312][T30873] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1017.022287][T30873] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1017.030264][T30873] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1017.038239][T30873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1017.046249][T30873] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000035 09:27:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6a0}], 0x1}, 0x0) 09:27:55 executing program 3 (fault-call:5 fault-nth:54): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x660}], 0x1}, 0x0) 09:27:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5e0}], 0x1}, 0x0) 09:27:55 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x640}], 0x1}, 0x0) [ 1017.376824][T31099] FAULT_INJECTION: forcing a failure. [ 1017.376824][T31099] name failslab, interval 1, probability 0, space 0, times 0 09:27:55 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 1017.433279][T31099] CPU: 0 PID: 31099 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1017.441978][T31099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1017.452078][T31099] Call Trace: [ 1017.455374][T31099] dump_stack+0x11d/0x181 [ 1017.459713][T31099] should_fail.cold+0xa/0x1a [ 1017.464364][T31099] __should_failslab+0xee/0x130 [ 1017.469230][T31099] should_failslab+0x9/0x14 [ 1017.473763][T31099] __kmalloc+0x53/0x690 [ 1017.478107][T31099] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1017.484370][T31099] ? preempt_count_add+0x6f/0xb0 [ 1017.489321][T31099] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1017.495219][T31099] ? sock_kmalloc+0xbf/0x110 [ 1017.499819][T31099] sock_kmalloc+0xbf/0x110 [ 1017.504376][T31099] af_alg_alloc_areq+0x40/0x130 [ 1017.509239][T31099] aead_recvmsg+0x275/0xd60 [ 1017.513768][T31099] ? aead_release+0x50/0x50 [ 1017.518290][T31099] sock_recvmsg+0x92/0xb0 [ 1017.522627][T31099] ____sys_recvmsg+0x167/0x3a0 [ 1017.527427][T31099] ? copy_msghdr_from_user+0x246/0x320 [ 1017.532912][T31099] ___sys_recvmsg+0xb2/0x100 [ 1017.537520][T31099] ? __fget_light+0xaf/0x190 [ 1017.542122][T31099] ? __fdget+0x2c/0x40 [ 1017.546256][T31099] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1017.552510][T31099] __sys_recvmsg+0x9d/0x160 [ 1017.557122][T31099] __x64_sys_recvmsg+0x51/0x70 [ 1017.561913][T31099] do_syscall_64+0xcc/0x3a0 [ 1017.566804][T31099] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1017.572799][T31099] RIP: 0033:0x45b399 [ 1017.576711][T31099] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1017.596314][T31099] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1017.604731][T31099] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1017.612823][T31099] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1017.620879][T31099] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6b0}], 0x1}, 0x0) [ 1017.628866][T31099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1017.636849][T31099] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000036 09:27:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x650}], 0x1}, 0x0) 09:27:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x5f0}], 0x1}, 0x0) 09:27:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x670}], 0x1}, 0x0) 09:27:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="d44ce305c2d1399f85915660c0ff", 0xe}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6c0}], 0x1}, 0x0) 09:27:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x660}], 0x1}, 0x0) 09:27:56 executing program 3 (fault-call:5 fault-nth:55): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x600}], 0x1}, 0x0) 09:27:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6d0}], 0x1}, 0x0) 09:27:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x680}], 0x1}, 0x0) [ 1018.287272][T31540] FAULT_INJECTION: forcing a failure. [ 1018.287272][T31540] name failslab, interval 1, probability 0, space 0, times 0 [ 1018.348909][T31540] CPU: 0 PID: 31540 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1018.357713][T31540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1018.367785][T31540] Call Trace: [ 1018.371078][T31540] dump_stack+0x11d/0x181 [ 1018.375417][T31540] should_fail.cold+0xa/0x1a [ 1018.380056][T31540] __should_failslab+0xee/0x130 [ 1018.384945][T31540] should_failslab+0x9/0x14 [ 1018.389453][T31540] __kmalloc+0x53/0x690 09:27:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6e0}], 0x1}, 0x0) [ 1018.393670][T31540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1018.399946][T31540] ? preempt_count_add+0x6f/0xb0 [ 1018.404936][T31540] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1018.410935][T31540] ? sock_kmalloc+0xbf/0x110 [ 1018.415690][T31540] sock_kmalloc+0xbf/0x110 [ 1018.420114][T31540] af_alg_alloc_areq+0x40/0x130 [ 1018.425044][T31540] aead_recvmsg+0x275/0xd60 [ 1018.429690][T31540] ? aead_release+0x50/0x50 [ 1018.434269][T31540] sock_recvmsg+0x92/0xb0 [ 1018.438612][T31540] ____sys_recvmsg+0x167/0x3a0 [ 1018.443511][T31540] ? copy_msghdr_from_user+0x246/0x320 09:27:56 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x690}], 0x1}, 0x0) [ 1018.449058][T31540] ___sys_recvmsg+0xb2/0x100 [ 1018.453706][T31540] ? __fget_light+0xaf/0x190 [ 1018.458402][T31540] ? __fdget+0x2c/0x40 [ 1018.462483][T31540] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1018.468736][T31540] __sys_recvmsg+0x9d/0x160 [ 1018.473325][T31540] __x64_sys_recvmsg+0x51/0x70 [ 1018.478120][T31540] do_syscall_64+0xcc/0x3a0 [ 1018.482660][T31540] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1018.488555][T31540] RIP: 0033:0x45b399 [ 1018.492519][T31540] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1018.512158][T31540] RSP: 002b:00007fc29df09c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1018.520577][T31540] RAX: ffffffffffffffda RBX: 00007fc29df0a6d4 RCX: 000000000045b399 [ 1018.528558][T31540] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000004 [ 1018.536539][T31540] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 09:27:56 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="d44ce305c2d1399f85915660c0ff", 0xe}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 1018.544514][T31540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 1018.552483][T31540] R13: 0000000000000891 R14: 00000000004c9f88 R15: 0000000000000037 09:27:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x670}], 0x1}, 0x0) 09:27:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x610}], 0x1}, 0x0) 09:27:56 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6f0}], 0x1}, 0x0) 09:27:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6a0}], 0x1}, 0x0) 09:27:57 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="d44ce305c2d1399f85915660c0ff", 0xe}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:57 executing program 3 (fault-call:5 fault-nth:56): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:57 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x680}], 0x1}, 0x0) 09:27:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x700}], 0x1}, 0x0) 09:27:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6b0}], 0x1}, 0x0) 09:27:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x620}], 0x1}, 0x0) 09:27:57 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a55306", 0x15}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:57 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x690}], 0x1}, 0x0) 09:27:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x710}], 0x1}, 0x0) 09:27:57 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6c0}], 0x1}, 0x0) 09:27:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x630}], 0x1}, 0x0) 09:27:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x720}], 0x1}, 0x0) 09:27:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6a0}], 0x1}, 0x0) 09:27:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:58 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a55306", 0x15}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6d0}], 0x1}, 0x0) 09:27:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x640}], 0x1}, 0x0) 09:27:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6b0}], 0x1}, 0x0) 09:27:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x730}], 0x1}, 0x0) 09:27:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x3e7, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6e0}], 0x1}, 0x0) 09:27:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x650}], 0x1}, 0x0) 09:27:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6c0}], 0x1}, 0x0) 09:27:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x740}], 0x1}, 0x0) 09:27:58 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a55306", 0x15}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6f0}], 0x1}, 0x0) 09:27:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x3f00, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6d0}], 0x1}, 0x0) 09:27:58 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x750}], 0x1}, 0x0) 09:27:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x660}], 0x1}, 0x0) 09:27:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x700}], 0x1}, 0x0) 09:27:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x760}], 0x1}, 0x0) 09:27:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x4000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:59 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6e0}], 0x1}, 0x0) 09:27:59 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229", 0x19}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x670}], 0x1}, 0x0) 09:27:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x770}], 0x1}, 0x0) 09:27:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x710}], 0x1}, 0x0) 09:27:59 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6f0}], 0x1}, 0x0) 09:27:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe703, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:27:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x680}], 0x1}, 0x0) 09:27:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x780}], 0x1}, 0x0) 09:27:59 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229", 0x19}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:27:59 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x720}], 0x1}, 0x0) 09:28:00 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x700}], 0x1}, 0x0) 09:28:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x790}], 0x1}, 0x0) 09:28:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x1000000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:28:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x690}], 0x1}, 0x0) 09:28:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x730}], 0x1}, 0x0) 09:28:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229", 0x19}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:28:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x7a0}], 0x1}, 0x0) 09:28:00 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x710}], 0x1}, 0x0) 09:28:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x3f000000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:28:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6a0}], 0x1}, 0x0) 09:28:00 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x740}], 0x1}, 0x0) 09:28:00 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x7b0}], 0x1}, 0x0) 09:28:00 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x720}], 0x1}, 0x0) 09:28:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6b0}], 0x1}, 0x0) 09:28:00 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc3", 0x1b}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:28:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x40000000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:28:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x730}], 0x1}, 0x0) 09:28:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x750}], 0x1}, 0x0) 09:28:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x7c0}], 0x1}, 0x0) 09:28:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6c0}], 0x1}, 0x0) 09:28:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0xe7030000, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x1008}], 0x1}, 0x0) 09:28:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x740}], 0x1}, 0x0) 09:28:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x760}], 0x1}, 0x0) 09:28:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x7d0}], 0x1}, 0x0) 09:28:01 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc3", 0x1b}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:28:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6d0}], 0x1}, 0x0) 09:28:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x10}], 0x1}, 0x0) 09:28:01 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x750}], 0x1}, 0x0) 09:28:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x7e0}], 0x1}, 0x0) 09:28:01 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x770}], 0x1}, 0x0) 09:28:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x30}], 0x1}, 0x0) 09:28:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6e0}], 0x1}, 0x0) 09:28:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x7f0}], 0x1}, 0x0) 09:28:02 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x760}], 0x1}, 0x0) 09:28:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc3", 0x1b}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x120}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:28:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x780}], 0x1}, 0x0) 09:28:02 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x770}], 0x1}, 0x0) 09:28:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x810}], 0x1}, 0x0) 09:28:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x6f0}], 0x1}, 0x0) 09:28:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x50}], 0x1}, 0x0) 09:28:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x790}], 0x1}, 0x0) 09:28:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x820}], 0x1}, 0x0) 09:28:02 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x780}], 0x1}, 0x0) 09:28:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x700}], 0x1}, 0x0) 09:28:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x60}], 0x1}, 0x0) 09:28:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r6, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38d", 0x1c}, {&(0x7f0000000640)}], 0x2}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:28:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x7a0}], 0x1}, 0x0) 09:28:02 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x830}], 0x1}, 0x0) 09:28:03 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x790}], 0x1}, 0x0) 09:28:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x70}], 0x1}, 0x0) 09:28:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x710}], 0x1}, 0x0) 09:28:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x7b0}], 0x1}, 0x0) 09:28:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x840}], 0x1}, 0x0) 09:28:03 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r6, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38d", 0x1c}, {&(0x7f0000000640)}], 0x2}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:28:03 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x7a0}], 0x1}, 0x0) 09:28:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x90}], 0x1}, 0x0) 09:28:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x720}], 0x1}, 0x0) 09:28:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x850}], 0x1}, 0x0) 09:28:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x7c0}], 0x1}, 0x0) 09:28:03 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x7b0}], 0x1}, 0x0) 09:28:03 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xa0}], 0x1}, 0x0) 09:28:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x730}], 0x1}, 0x0) 09:28:03 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x860}], 0x1}, 0x0) 09:28:03 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, 0x0, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r6, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38d", 0x1c}, {&(0x7f0000000640)}], 0x2}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) 09:28:03 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x7d0}], 0x1}, 0x0) 09:28:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xb0}], 0x1}, 0x0) 09:28:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x740}], 0x1}, 0x0) 09:28:04 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x7c0}], 0x1}, 0x0) 09:28:04 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x7e0}], 0x1}, 0x0) 09:28:04 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0x870}], 0x1}, 0x0) [ 1026.119773][T11296] ================================================================== [ 1026.127924][T11296] BUG: KCSAN: data-race in padata_find_next / padata_reorder [ 1026.135280][T11296] [ 1026.137613][T11296] write to 0xffff88812b01d568 of 4 bytes by task 137 on cpu 1: [ 1026.145160][T11296] padata_find_next+0x1d9/0x260 [ 1026.150014][T11296] padata_reorder+0x180/0x260 [ 1026.154691][T11296] padata_do_serial+0x181/0x1b0 [ 1026.159541][T11296] pcrypt_aead_enc+0x51/0x80 [ 1026.164140][T11296] padata_parallel_worker+0x1ae/0x220 09:28:04 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000002480)=""/4104, 0xc0}], 0x1}, 0x0) [ 1026.169513][T11296] process_one_work+0x3d4/0x890 [ 1026.174366][T11296] worker_thread+0xa0/0x800 [ 1026.178870][T11296] kthread+0x1d4/0x200 [ 1026.182942][T11296] ret_from_fork+0x1f/0x30 [ 1026.187343][T11296] [ 1026.189676][T11296] read to 0xffff88812b01d568 of 4 bytes by task 11296 on cpu 0: [ 1026.197309][T11296] padata_reorder+0x1b6/0x260 [ 1026.201990][T11296] padata_do_serial+0x181/0x1b0 [ 1026.206838][T11296] pcrypt_aead_enc+0x51/0x80 [ 1026.211425][T11296] padata_parallel_worker+0x1ae/0x220 09:28:04 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280), 0x4) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x20, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(0x0) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x3c, 0x0, 0x536ae464467e3e0b, 0x0, 0x0, {0x1d}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x3c}}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001f00)={0x0, @empty, @dev}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB], 0x2}}, 0x0) sendmmsg$inet(r2, &(0x7f0000004f40)=[{{&(0x7f00000000c0)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000100)="7594d592fa88f19e1c8d6657e6fa6214a172cbb5d862a294802a1344515f33feac1089dff463790f9935bb4877c9a5f7d171a662dfb6d6a46f8a0798ce12", 0x3e}, {&(0x7f0000000200)="e0e4ff1b90e2d0cc587a380035d179a297b74a5bc250514b0b80c89638ee07442a5d7cb37b64cbaba438db0ec6051732e90c601cc5a6767cc9a39c595bc0622d1743ad733a298b5baebc68ecaed6ba83f40246b30170592ed0a2cf45644af7238d50b2f979f4eb", 0x67}, {&(0x7f0000000140)="675465b351f27d5995ea7d915b8f0981558ae30fe895edf7ec6abe48fadc1438a40f93afcfdc9995645fc8", 0x2b}, {&(0x7f00000002c0)="b6ea27f4e83e9d8fa55d5c7ea38dfd413bef0f69f634536b06afa93bb0b16744cd62a00aa069f35a4137bff6374789c6997f65710c55b4bf35300a3be4e68218817095dd8e9869c08c789306d3", 0x4d}, {&(0x7f0000000340)="12b3139c0628dfd1fcc28399eaf4d9cb38a62e9e511c3a6d69534122b5b60dccdac595c688323ae23e344d7ec7f30782e2ebd23f898bf4f1f0bc0636", 0x3c}], 0x5, &(0x7f0000000400)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0x30}}, {{&(0x7f0000000440)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000600)="d44ce305c2d1399f85915660c0ffb1974b94a553066a7ed229ecc38d", 0x1c}, {&(0x7f0000000640)}], 0x2, &(0x7f0000001f80)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0x65, 0x3, 0x8}, @ssrr={0x89, 0x3, 0x1a}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @loopback, @broadcast}}}, @ip_retopts={{0x50, 0x0, 0x7, {[@rr={0x7, 0x1b, 0xe6, [@rand_addr=0x80000000, @rand_addr=0x7, @rand_addr=0xffffffff, @rand_addr=0x84, @empty, @dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @timestamp_prespec={0x44, 0x24, 0xf0, 0x3, 0xe, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8001}, {@rand_addr=0x830c, 0x1ff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@rand_addr=0x4, 0xc96}]}]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0xd9, 0x4, 'ha'}, @noop, @timestamp={0x44, 0x8, 0xec, 0x0, 0x3, [0xffffffff]}, @generic={0x94, 0x3, "c7"}]}}}], 0x108}}, {{&(0x7f00000020c0)={0x2, 0x4e20, @dev}, 0x10, &(0x7f0000004600)=[{0x0}, {&(0x7f0000003100)="72ff1fedc85be8091a904c452cd12c6b11e7ea32f4d98bec114a95aba8109fab37a454069f9fecd37b3756caacd8a87555fb990af909d783df1704dd1c8b31c6c24acfc07e9d8494a60f29bb2c7d6a9babd8256d0069ced3039aa6ab48e9263eaaa90ba2085b27e7a8499239e41511129bb55c9074af8e5aef6f9b7a585d531928125288d7b3593ef8", 0x89}, {&(0x7f00000031c0)="c392a98323f05184059e7e92b6e1e09f7b44b0d12489b8c813a82d3dff286210beb72815c0baad7b6430742e3b5d33bfde985863638e5cfdd723efa335a019af1f275019a2af5f4cc6784f82ec712c834ebe2e990b17a12490ae5c604d49768feb53f23538dfabe96fab4c52d58ff227b92c7623bb653f3d", 0x78}, {0x0}, {&(0x7f00000033c0)}, {&(0x7f00000034c0)="c018a3d62d8919e0f37c44ae350ac3f818384c4b89f8cc99bf408a6ab8ebbf6540f8", 0x22}], 0x6}}, {{0x0, 0x0, &(0x7f0000004dc0)=[{&(0x7f0000004780)="37000b12a5e0295fc4e4f3214fb68a98494045b3ac41d710af117fabcf06986719e8dfd72752f7a11835c1a5bcbaaa0118e0a8e86d6999f3945ce720c7f3bb4fa2fe8f4d457354a2afc1dc6c9b4a2ca6210996fe1608b0a4", 0x58}, {&(0x7f00000048c0)="713a0ee20c6ec9e527ff13343dd69b3041a898f530b3b2e732edd531d6bc9ddeb658c79ccbba821d2d4f", 0x2a}, {&(0x7f00000049c0)="d965f6c55033fa31022f457e50625c2966ca069dd00480e47f3b8945111506289edf15fda870beb1b3ccbc996d639f3e1c15d1eaa14af9c32ef1cb69fdc46aefe3c01e53c8a88ee153ab361acb16a0ac6b8661188d8b6ee6fe11f4a71c321a75e404f54bc3", 0x65}, {&(0x7f0000004a80)="8b73e84128a7f8ab6c86812e19f75b24c57a3b03c4ca5f48f0f55540ac60c7b6b1584fad0407f3032667cd300150f55506e3d7bdd7a5ac1e859ba7831dc2b14b", 0x40}, {&(0x7f0000004b40)="3d1c47706a3295db4efec3aeeaee387513f511ed1ed446437df4dd6ba5cc143ae8079934597de779fe88b5ee86fd5195596281f925f2c66407647b7635f9dbb4b38dae13c934a657baabd30388fecf9f9c8ac034e318ad9139", 0x59}, {&(0x7f0000004bc0)="6ef9200d2748f69ffb55a1c74a3446f279d518b5c1b4f17f3beed2a41f5c919ea72617c3d8", 0x25}, {&(0x7f0000004c00)="8e119bab11c061a916a0b79221fb2e7df50526225405ade5bd2101ab35bf41c416c89b4d43ef66dcbe93a4a759ffef1109ca44549c70391274c11326c27b78788f1aa308aca720f354dc53dbd4673172751212f3cffbcdb776aebbba87c155a57a2e900570c8e98083d9af04c0c24ca51ccf883eb80434142c195ec969740af5824bb7635f4a08733355b1fe321261f303e88092e782f29368b68c80bed47b28e7ea360ef48f31b3ac84b38142d0f1dc327aae26ec15e03ce6f0eb42fa5e3967abbcb4493e11ddf379196604aad79e2a0e8cce10e4a6c4289f4ae0c01e50ea", 0xdf}, {&(0x7f0000004d00)="ef97d1985f2a3d19e140454e64f53cffaff03e40089882d24448e37db3f7cb93ac6abec6c32e5e9b6c920721c7caf082b9b7de2b3645ad0bec7b26899504fd3a2a7c8bf261ae5d9e84cef8760835f0e3930dae38311c4d177507819334819c7cb3857c4468e47efb424240bad79d3e0a55a7cd770668e34a329387342ee823ce61bff7d7efd1dddd7bebbcd7b6", 0x8d}], 0x8, &(0x7f0000004e80)=[@ip_ttl={{0x14, 0x0, 0x2, 0x7fffffff}}], 0x18}}], 0x4, 0x8044) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) pipe(&(0x7f00000006c0)) close(0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1d82dbc1b3ef6f83, 0x0, 0x0) pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) [ 1026.216799][T11296] process_one_work+0x3d4/0x890 [ 1026.221660][T11296] worker_thread+0xa0/0x800 [ 1026.226164][T11296] kthread+0x1d4/0x200 [ 1026.230234][T11296] ret_from_fork+0x1f/0x30 [ 1026.234635][T11296] [ 1026.236957][T11296] Reported by Kernel Concurrency Sanitizer on: [ 1026.243111][T11296] CPU: 0 PID: 11296 Comm: kworker/u4:6 Not tainted 5.5.0-rc1-syzkaller #0 [ 1026.251598][T11296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1026.261655][T11296] Workqueue: pencrypt_parallel padata_parallel_worker [ 1026.268406][T11296] ================================================================== [ 1026.276468][T11296] Kernel panic - not syncing: panic_on_warn set ... [ 1026.283060][T11296] CPU: 0 PID: 11296 Comm: kworker/u4:6 Not tainted 5.5.0-rc1-syzkaller #0 [ 1026.291553][T11296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1026.301639][T11296] Workqueue: pencrypt_parallel padata_parallel_worker [ 1026.308394][T11296] Call Trace: [ 1026.311696][T11296] dump_stack+0x11d/0x181 [ 1026.316046][T11296] panic+0x210/0x640 [ 1026.319951][T11296] ? vprintk_func+0x8d/0x140 [ 1026.324550][T11296] kcsan_report.cold+0xc/0xd [ 1026.329153][T11296] kcsan_setup_watchpoint+0x3fe/0x460 [ 1026.334531][T11296] __tsan_read4+0xc6/0x100 [ 1026.338956][T11296] padata_reorder+0x1b6/0x260 [ 1026.343659][T11296] padata_do_serial+0x181/0x1b0 [ 1026.348520][T11296] pcrypt_aead_enc+0x51/0x80 [ 1026.353113][T11296] padata_parallel_worker+0x1ae/0x220 [ 1026.358499][T11296] process_one_work+0x3d4/0x890 [ 1026.363364][T11296] worker_thread+0xa0/0x800 [ 1026.367892][T11296] kthread+0x1d4/0x200 [ 1026.371971][T11296] ? rescuer_thread+0x6a0/0x6a0 [ 1026.376826][T11296] ? kthread_unpark+0xe0/0xe0 [ 1026.381525][T11296] ret_from_fork+0x1f/0x30 [ 1026.387288][T11296] Kernel Offset: disabled [ 1026.391648][T11296] Rebooting in 86400 seconds..