@loopback}}, &(0x7f0000000440)=0xe8) mount$9p_xen(&(0x7f00000001c0)='/proc/capi/capi20\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x4, &(0x7f0000000480)={'trans=xen,', {[{@version_L='version=9p2000.L'}, {@dfltgid={'dfltgid', 0x3d, r1}}, {@debug={'debug', 0x3d, 0x1ffc00}}, {@afid={'afid', 0x3d, 0x8}}, {@access_user='access=user'}, {@access_client='access=client'}, {@cache_fscache='cache=fscache'}], [{@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r2}}, {@subj_role={'subj_role', 0x3d, 'vboxnet0md5sumproc[-posix_acl_accesslowlan0%cpuset\\nodev'}}]}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:39 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x34000, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1, 0x0, 0x0, 0x0}], 0x1, 0x0) 14:53:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x1000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:39 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0xa6, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) setsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000001c0)=0x1ff, 0x4) 14:53:39 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x400300, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:39 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2d5, 0x10400003) 14:53:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1, 0x0, 0x0, 0x0}], 0x1, 0x0) 14:53:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x2000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:39 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x2000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:40 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x1000000, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:40 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2d6, 0x10400003) 14:53:40 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x38, r1, 0x20, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x10001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x40}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000}, 0x44800) 14:53:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x4000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:40 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x3000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1, 0x0, 0x0, 0x0}], 0x1, 0x0) 14:53:40 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2d7, 0x10400003) 14:53:40 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x2000000, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:40 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2d8, 0x10400003) 14:53:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x20000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:40 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:40 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2a80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xb4, r1, 0x10, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="5475d98a8959bc17b7340a3a389b6a76"}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xff}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}]}, 0xb4}}, 0x800) 14:53:40 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x4000000, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1, 0x0, 0x0, 0x0}], 0x1, 0x0) 14:53:40 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2d9, 0x10400003) 14:53:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x3f000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:40 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3f000000, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:40 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x5000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:40 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2da, 0x10400003) 14:53:40 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000001c0)=0xffffffffffffff01, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1, 0x0, 0x0, 0x0}], 0x1, 0x0) 14:53:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0xffffff7f, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:40 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xffffff7f, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:40 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2db, 0x10400003) 14:53:40 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x6000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:40 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x40030000000000, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x40030000000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1, 0x0, 0x0, 0x0}], 0x1, 0x0) 14:53:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:41 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2dc, 0x10400003) 14:53:41 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x7000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:41 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x100000000000000, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x100000000000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:41 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2dd, 0x10400003) 14:53:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x2, 0x1) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000280)) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x400000, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x200, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f00000001c0)) 14:53:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1, 0x0, 0x0, 0x0}], 0x1, 0x0) 14:53:41 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x20000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1, 0x0, 0x0, 0x0}], 0x1, 0x0) 14:53:41 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2de, 0x10400003) 14:53:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x200000000000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:41 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x200000000000000, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:41 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x3f000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1, 0x0, 0x0, 0x0}], 0x1, 0x0) 14:53:41 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x400080, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2010}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x7c, 0x2f, 0x2, 0x70bd29, 0x4, {0x13}, [@generic="af56d05176c837bad79fa7fe091584ad6f1d999b32017fbe9881231b89e622fbb1c32ae18c5ce7d31f580838545d42e7bf2fb2e0e60a20572c56f6bc55", @typed={0x14, 0x73, @ipv6=@remote}, @typed={0x14, 0x4a, @ipv6=@rand_addr="90ca269fe90500d4ea9d5f5655e7416b"}]}, 0x7c}, 0x1, 0x0, 0x0, 0x40}, 0x40000) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:41 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x40000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x400000000000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:41 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2df, 0x10400003) 14:53:41 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x400000000000000, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1, 0x0, 0x0, 0x0}], 0x1, 0x0) 14:53:41 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2e0, 0x10400003) 14:53:41 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xe0000001, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:41 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3f00000000000000, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x2000000000000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:42 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) ioctl$TIOCEXCL(r0, 0x540c) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = syz_open_pts(r0, 0x440000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000240)=0x0) sched_getscheduler(r2) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x1ff, 0x1f, 0x1, 0x1, 0x0, 0xffffffffffffffff, 0x800, 0x6, 0x401, 0x7f, 0x2eb, 0x2, 0x3, 0x6, 0x2, 0x100000001, 0x7, 0x8001, 0x8001, 0x6, 0x2, 0x4, 0xf30, 0x8001, 0xde7, 0x8, 0x9, 0x7fff, 0x4, 0xfffffffffffffff8, 0x7, 0x0, 0x4, 0x80, 0x9, 0x2, 0x0, 0x2, 0x4, @perf_config_ext={0x2, 0x9}, 0x4000, 0xe08, 0x100, 0x2, 0x800, 0xff, 0x7ff}, r2, 0x4, r0, 0x3) 14:53:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1, 0x0, 0x0, 0x0}], 0x1, 0x0) 14:53:42 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2e1, 0x10400003) 14:53:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xffffff7f, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:42 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2e2, 0x10400003) 14:53:42 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:42 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x8000000000000000, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x3f00000000000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:42 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2e3, 0x10400003) 14:53:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1, 0x0, 0x0, 0x0}], 0x1, 0x0) 14:53:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xaf6fa4b635, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:42 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xffffff7f00000000, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:42 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000280)=0x8, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000004c0)=ANY=[@ANYBLOB="492e35583de9585fdbf69c0033999207000000a680b11ef9a2840ab54b1f947552514214c4446b14b7db580916cc9b7bbe0f394646bb851e1326730546aae33bcbb3cdd295cd8ab80068be5901fc97c913a07b96bfb18c4ab1871fcb7487b71b5b2e20f6267203c5aed8352d8d78df93096a59ed5dd3d143c60328a53b97535ff57b1e2007d7350065503de60330386bef8c0be94c2bfbd97748d2b8d39d76a12ce5ebebe9f5e0bfcccdc00d72317d44cb5ae2427b621bf13a2019bd39c6d085", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000300)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000340)={r1, 0x7, 0x0, 0x7fff, 0x7}, &(0x7f0000000380)=0x18) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r2, 0x100000001}, 0x8) 14:53:42 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2e4, 0x10400003) 14:53:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x8000000000000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1, 0x0, 0x0, 0x0}], 0x1, 0x0) 14:53:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x40030000000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:42 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x422600, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0xffffff7f00000000, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:42 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:42 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2e5, 0x10400003) 14:53:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x100000000000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1, 0x0, 0x0, 0x0}], 0x1, 0x0) 14:53:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x2, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:42 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:42 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000280)={0x2, 0xfffffffffffffc00}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000340)="9e104852c1d11ae37000fe9a700cc95542c80611acacf2a53280a6b250aa7d76ba7b3ea3167b8a7aee8222b8e426ebb1fbf98804687896ba86e9f8d0d685adfdf059cf877b1aa623ba0b0e52190aa56a75efeb0845edf930b1a835a88122f497610a463a2c5aae7f86d402e91cb0f24f1d09a648345a1521cea62f87d7f332faf1b08d8d9e43e8ac4573e3304b7f58c1789580f1672c4656c02dc531b8269da45ff05e1421955341a5520f95ac879d5725b5", 0xb2) mincore(&(0x7f0000fff000/0x1000)=nil, 0x1000, &(0x7f0000000200)=""/128) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000300)) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f00000001c0)={0x3, 0xc2}) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000002c0)) 14:53:43 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2e6, 0x10400003) 14:53:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x200000000000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1, 0x0, 0x0, 0x0}], 0x1, 0x0) 14:53:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x4, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x3f00, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:43 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f00000003c0), &(0x7f0000000400)=0x27c) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x1, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f00000001c0)=0x3, &(0x7f0000000200)=0x4) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) 14:53:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x300000000000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:43 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2e7, 0x10400003) 14:53:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x2, 0x0) 14:53:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x34000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x2000, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:43 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0xfffffffffffffffa, 0x200) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f00000001c0)=""/139) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x400000000000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:43 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2e8, 0x10400003) 14:53:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x3, 0x0) 14:53:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x400300, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x3f00, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:43 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2e9, 0x10400003) 14:53:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x500000000000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:43 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x20000, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xc) getsockname$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) fcntl$getownex(r0, 0x10, &(0x7f00000008c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000840)={0x0, 0x70, 0x8, 0x3, 0x4, 0x4, 0x0, 0x2, 0x80000, 0x2, 0x8, 0x1, 0x80, 0x8, 0xffff, 0x101, 0x9, 0x3, 0x401, 0x0, 0x1, 0x10001, 0x5, 0x0, 0x2, 0x3, 0x9, 0x8000, 0x9f6f, 0xfffffffffffffffd, 0xfc4, 0x770, 0x5, 0x6, 0x4, 0x80000000, 0xa0, 0x5, 0x0, 0x5, 0x7, @perf_bp={&(0x7f0000000800), 0x4}, 0x0, 0x40, 0x1, 0x1, 0x5, 0x6, 0x5}, r3, 0x1, r1, 0x2) sendto$inet(r0, &(0x7f0000000740)="77be460530eb761c9a9ed4051b37c87ef7a5112682171ede5a8074c9097193179eee4a7f141e9e3fa32f71f2267755ec15c511ae9e7ea5839e3dc563287c10e61d32297a72e52b171b3523dbab0bd236c850963e9a4e7956e850a69efcb3580fc877cf7a9be6fd3e870a56ef908a0ddbb9e7863056bcf54e8dc9b1cab50b909113325e246ce093d29338b10988e67123d2b08afd43df12e69ea1d7b5613fb887f275d427314c9d456e8763ec3283291f0ecc5a9266ee2abcbda78b", 0xbb, 0x4000, &(0x7f0000000440)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c0000005e00200b2dbd7000fbdbdf2500000000", @ANYRES32=r2, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x4040840}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000900)={0xfffffffffffffffd, 0x4, 0x218, 0x4040000, 0x9}) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000200)={0x0, {0x2, 0x4e21, @loopback}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x22}}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x108, 0x0, 0x0, 0x0, 0x8000, &(0x7f00000001c0)='veth0\x00', 0x0, 0xffffffffffff8000, 0x7fff}) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000480)=@nfc={0x27, 0x0, 0x1, 0x7}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000500)="9537041e4b9627c29ad1b7151ee11ab726082c941de254dbbb2c81681154cc4f1aa4689fefcd926f46b2a80ddf2acb606993d6831299816de9e95101a03dcbc8ff40164ed5f559c74ba2c3c588cc9a25154ca84a392555e2d61d7bebc9f9c928ecf45d2d2394729d81bf2a52b16a5d9bce35f64fee47f7821e44c3bcc5b717095048b562f87eb7c4d0179d684f7649e280ec28e8baffe074203b6d15c8e15d1812d2628583f3782b701aee9e2efe9afc97c6860dc80ff4bdfbb880114b184c3ae5e8f0ba4a380f74d717a69b4ae846bf8f0de175caf5be02f4", 0xd9}, {&(0x7f0000000600)="8c3503b3a02308b775fb2bab45c2b058ddba78", 0x13}, {&(0x7f0000000640)="b25e8f", 0x3}, {&(0x7f0000000680)="62da70de1e7652b45b43aaec46f6fba15cb58009d185d60c3c1d7a3faad3db3105d7d60b14155dee271a27abf4cf29877755cc9925844c", 0x37}], 0x4}, 0x10) 14:53:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x4, 0x0) 14:53:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x34000, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x1000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:43 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2ea, 0x10400003) 14:53:43 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) listen(r0, 0x5) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_pts(r0, 0x0) r2 = geteuid() getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f00000002c0), &(0x7f0000000300)=0x4) setreuid(r1, r2) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000280)={0xa, 0x0, 0x4}) 14:53:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x600000000000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x5, 0x0) 14:53:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x2000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x400300, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:44 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2eb, 0x10400003) 14:53:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x700000000000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x4000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:44 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2ec, 0x10400003) 14:53:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x6, 0x0) 14:53:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x1000000, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x2000000000000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:44 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2ed, 0x10400003) 14:53:44 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) symlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x7, 0x0) 14:53:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x2000000, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x3f000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x35b6a46faf000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:44 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2ee, 0x10400003) 14:53:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x8, 0x0) 14:53:44 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000240)='\x00'}, 0x30) r1 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x7fff, 0x48c0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x10000, 0xfffffffffffffffd, 0x1000, 0x8, 0x0, 0xfff, 0x48001, 0x4, 0x7, 0x7fff, 0x2, 0x200, 0x90200000000, 0x6, 0x4, 0x1, 0x2, 0x4, 0x1, 0x7, 0x2, 0x401, 0x1ff, 0x56, 0x1ff, 0x401, 0x10001, 0x7fffffff, 0x217, 0x7fffffff, 0x2, 0x9, 0x8000, 0x1, 0x75a85d6b, 0xffffffffffffff95, 0x0, 0xffffffffffff5be2, 0x0, @perf_config_ext={0x8001, 0xfffffffffffff801}, 0x4028, 0x5, 0xf4d, 0x7, 0x400, 0x1, 0x1}, r0, 0x9, r1, 0x2) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x832b, 0x0, 0x0, 0x3}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) 14:53:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x4000000, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0xffffff7f, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x3f00000000000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:44 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2ef, 0x10400003) 14:53:44 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0x28}, 0x28) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0x20000, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0xa00, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x4, 0x70, 0x3, 0x81, 0x1, 0x222, 0x0, 0xb2f, 0x20, 0x4, 0x9, 0x2, 0x4, 0x80000000, 0x7, 0xfffffffffffffc00, 0x100, 0x1, 0x3, 0x8001, 0x8, 0x401, 0xffffffff00000001, 0x0, 0xfffffffffffffffb, 0x9, 0x44443549, 0x7, 0x2fb, 0x8, 0x20, 0x905d, 0xffff, 0x800, 0x7, 0x2e7eaa45, 0x1000, 0x7, 0x0, 0xffc000000, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x800, 0x2, 0x30f, 0x9, 0xd97, 0x6, 0x522a}, r1, 0xc, r2, 0xa) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000380)={'team_slave_1\x00', {0x2, 0x4e24, @multicast2}}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0xfffffffffffffffb) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000340)=0x7, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x9, 0x0) 14:53:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x20000000, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x40030000000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:45 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2f0, 0x10400003) 14:53:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4000000000000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000001c0)=0x1000, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x3f000000, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0xa, 0x0) 14:53:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x100000000000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:45 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2f1, 0x10400003) 14:53:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x8000000000000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0xffffff7f, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0xb, 0x0) 14:53:45 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000200), &(0x7f0000000240)=0x4) inotify_init() clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000640)={0x0, 0xf7}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x5}, &(0x7f0000000880)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x100}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000001340)={0x0, 0x56, "a399259894948becedfa74b6aa0c5e5fa29eb99bb8323e3f3a855c31704728ccb01d9f643024088ee0375ebb4860049645a1aa7276791befb147ff37c91119f22f78254c95b92b8ddd9014f780c03d14ab8bf11621d4"}, &(0x7f00000013c0)=0x5e) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000001400)={0x0, 0xd0d, 0x80000001, 0x0, 0x10000, 0x1ff, 0x2, 0x1, {0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}}, 0x2, 0x338bcffb, 0x3, 0xf8, 0xf92a}}, &(0x7f00000014c0)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000001500)={0x0, @in6={{0xa, 0x4e22, 0x57be, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}}, [0x8, 0x7ff, 0x0, 0x7fffffff, 0x10001, 0x5, 0x5, 0xc03, 0xf80000000, 0x8000, 0x4, 0x1000, 0xed, 0x7b5, 0x9]}, &(0x7f0000001600)=0x100) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000002c00)={0x0, 0x8}, &(0x7f0000002c40)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000002c80)={0x0, 0x0, 0x10001, 0x8000, 0x1, 0x6, 0x5, 0x4, {0x0, @in6={{0xa, 0x4e22, 0x2cb, @dev={0xfe, 0x80, [], 0x26}, 0xb1}}, 0x4, 0x7fff, 0x5, 0x8, 0xfffffffffffffffd}}, &(0x7f0000002d40)=0xb0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000003180)={0x0, 0x8000, 0x3ff, 0x1000, 0x0}, &(0x7f00000031c0)=0x10) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000003500)={0x0, 0x7ff, 0x3, 0xe7c, 0x7fffffff, 0x8, 0x5e, 0x0, {0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x0, 0x3f, 0x0, 0x6}}, &(0x7f00000035c0)=0xb0) sendmmsg$inet_sctp(r2, &(0x7f00000036c0)=[{&(0x7f0000000280)=@in6={0xa, 0x4e24, 0x1, @ipv4={[], [], @empty}, 0x9}, 0x1c, &(0x7f00000005c0)=[{&(0x7f00000002c0)="4af2b93a51669fa4a085b0bc1f697492c6e05394862cc8b78f1e0e7d19b0815c16ca6bf654201bfa308a1cb4a7280cad2b3ba63b8b6df86fdd7c9b65ec03585803275ccb5e267d5e869825fd94bd50891b53dd70839260d45cbc04afd5", 0x5d}, {&(0x7f0000000340)="d5c8f26eae80691af21121b2ebb91022d4b61f1a719633fa0061bcf9f856a7c7d1f7317a4b0ad00cefe80fa2a3e27eaba671a7cf1576ab329a0c049958b169421aa7e8b46286deca3c0db927a7d96f00654b91966cd6a087f77cfb50439d0135215e797b3a78901e20a0c27f3e93e5c967f296e8c60b0b77dc194951af42148b7be08944d5810186314832e35a6c05b7a5313c9e470e02894d24e0d04d411dad7d2a987b799970f7e35a27b0aa75a5b50da75bd407b29e62830fc524f884040741795c80c98f146c7eff577da3a97fe4166bb7a1ae1c26d5ebdf45d8ea093dca70", 0xe1}, {&(0x7f0000000440)="d097a5ba7bda448529787c9d7f535832dfc8d4ade4c37051", 0x18}, {&(0x7f0000000480)="2b0a26aca06bb8e8b6e52ff14c7b02c8ea3fe33f", 0x14}, {&(0x7f00000004c0)="ba220796d400bc7ffa30db23e2fd293ab4071350f2ad7974bd4f120d87fa090e2cd041d70cbac9cfc59adc9e7339fdff54f13e55e691a0d93f0c404756b50609f215faf3a441bafcb12c01b75135abaa6464d7e7cfed3f411e7ab6fc1b7e8de4c2754f5bd347e5c13116af8e36471d5c19b56c2bf8708d93f65bfdd1a9f3fca61e084d88a9f47aee2733189c8f50edb63d398ec52bb8aeecddb70813a03bd4edf80ba4f536726c8730fddbf21293d802577c600d8d4290fbc474a8efd15a0419d75a", 0xc2}], 0x5, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000008400000000000000001000040300ff003000000000000000840000000100000086b471f0a80000001f0000000200000000010000f5050000c30d0000", @ANYRES32=r3, @ANYBLOB="20000000000000008400000008000000ff020000000000000000000000000001180000000000000084000000050000003000000000020000"], 0x80, 0x20000000}, {&(0x7f0000000740)=@in={0x2, 0x4e23, @rand_addr=0x3}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000780)="b1ba14d433b605357023e5261ca68ffaca1e86e320d2c3ccdea464c694e1c843e609f071e87666885ef1b15e5efd762a636dd887575e4bbdc88fb4c270c45122f7d51003e6860c79da705b1506b050cdeaef8d7fa932fb278e3e35b58a166e55af22fe16818edab4650c19ab67747505515198f071dad89ee37a3496a9", 0x7d}], 0x1, &(0x7f0000000940)=[@authinfo={0x18, 0x84, 0x6, {0x1}}, @sndinfo={0x20, 0x84, 0x2, {0x8000, 0x8006, 0xff, 0x5, r4}}, @sndinfo={0x20, 0x84, 0x2, {0xdcb, 0x1, 0x8, 0x1, r5}}, @init={0x18, 0x84, 0x0, {0xffffffff, 0x9, 0x9, 0x68d}}, @init={0x18, 0x84, 0x0, {0xffffffff, 0x100000001, 0x6451, 0x1}}], 0x88}, {&(0x7f0000000a00)=@in={0x2, 0x4e22, @rand_addr=0x100000000}, 0x10, &(0x7f0000000cc0)=[{&(0x7f0000000a40)="e5b8b5b9415a3c00361cfef8e38075b52e32886a19c645effe4a76fa915c4a11bace0aa902642a610316585a9b8c156cef6b4fb9476a4d7e17f045d0dfdea68cf2151c857756b07429d8fa32ff1cbf76da5b747faf5a363768002726b8f834b899e65f8f1aeccf7b008411fe242f4dfb0ded914cc7fd7a7155c174fb1bb892a4b4", 0x81}, {&(0x7f0000000b00)="c30a871d9cce105055ab3a0933", 0xd}, {&(0x7f0000000b40)="55fa671ed604d6807ee698b3b441fe123b4a74d933405b25c3e19f9a3c408ea909", 0x21}, {&(0x7f0000000b80)="b76ea1dfc4c566ed7b0d3318f2c34f03ec14f9ed515063b5a19702a34168522ff4ff85a3793a371c6c67e5f76b7282646851c0c4cd28af1f2ceaad8ca98d7e1c2551a5d1a742b485db404fc876462b3c1b677b08338a1da71469686a98f22c09c1ad8ad6de0506e26897985d0a91df9fd1ec0486f15cbb1ec268120f657f16e576d8490e60d0fc39521687f64942356b05fa101794abbd4af1b9a9fe4dba3db9659bc17198887ab02839b971f5d9bda40fef58857176c1c46c5b5723e03ce4a58c046a970a9e0abd5623f3419d94e769ffd46ba7f64246d0d96a80687c19b9a91cb3509f2b0a", 0xe6}, {&(0x7f0000000c80)="df37fd975a4cb9b7c676b1581dc912e84beb5d4fc0eefb1988718fcc9fe63fa3df1310", 0x23}], 0x5, &(0x7f0000000d40)=[@dstaddrv6={0x20, 0x84, 0x8, @local}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x7fff}}], 0x38, 0x4000040}, {&(0x7f0000000d80)=@in={0x2, 0x4e20, @local}, 0x10, &(0x7f00000012c0)=[{&(0x7f0000000dc0)="7c1363eb9339d672180cf1609f7080301ad0bcb99e49900a4f0fa3171fdc5e0a5f9170bdf25a5701972ea6334bfefbacbeda34401537399bf9cc81329c49f120", 0x40}, {&(0x7f0000000e00)="7d2c8f8dfc3b33df724f4e431e2502d9865f01a111d0d8a208a29022c5b3e06eecf4b628c18f64cf10a45959383064afc02f13922da303a673eb598aba74d66393a5f10e3da9e2b1a3d2383bc9bcee86eae9e2bc887b93770559880b9ee7bce45e05241f0bfa29a6dc3babea13ff5944a54a859cce39e6f6eff7be2c8de38216e550bbea81eba1985ee757ce91b4b9deec2fa98dd562f947da054a1f3bef7f2a8695bf1a9bf42c342cdb0daec504ab331e54244ecff4c3c96adc993a5045e510ed847b746cac5fd0aecf8beb4e1680e9e46a79d28927", 0xd6}, {&(0x7f0000000f00)="9be9e5", 0x3}, {&(0x7f0000000f40)="2ce27d7fe92b46909d4c20ac1d45c1ce335081b7c0447ca462be250f4eff99d3d42291659aee3d90cf2573049c20159cda79f667c6a968a219d7ddc1d1a88676c39d5487b1c03ebb852eb2300e3feb04864094376bae9cd0b39787", 0x5b}, {&(0x7f0000000fc0)="5397e0b7f4b9313a410d6b110bde86937b21603972aaf8f0a6417a0fae6418da9aa8f20cdc469ddb4ae4a5866ad99ff015bf05f3bfd621585d10b19d267ee05519fa6a5c39f643e7c0f390f43db1fce6f27f44887ed8369aa9245b0a54c01572a0a412635ea56b5242be506bba422ec4c7f3e9c29034cad8f1172076c970f517c5d816da15966b1ea95f4331e6f553e46cf936af19", 0x95}, {&(0x7f0000001080)="908b97cd4529d8a406ddf79b3d8742e571734568535bd8e073ecccbcaf1d6628ce26a4ae81745b0704e5079f0cacf88dbdd9bcf17157b864ff3602a35cf4de2a36c90a60a8a345183378876db3ccdadfb55903b8475df2eb78433061e7e49200d0e1d2a40b103a6ed15bc2789aeb3802dd4303fe958297447088d8f5ee2d552a07c23f075afcff22e8519e8dc9ffa6332486b3ca5df2823ddd732f520e7d576db3edec48178d9e52d084acfaaae797b1bc2d2155f67fb611bac8ba", 0xbb}, {&(0x7f0000001140)="23e6ea66667b4dc76b70bc5513e97a8d16e07d5ac82e428f8ad160278ffb451b2ee6e5b9c4aaf3c5e11581ac52eee7b03fc40198f45c21b383f4710a7d6060b265a4049f4e3af01382366683df866b030f775d28ea7f2513bb8d5ee4c92645ca5da5dfb94e4bb27296c75f9d73627bc9b85b5503527fbb30395fb237035cc45a7ced518744988aaca8fe4a1024861fd0618a890678d9eb94f25c991d5cf1e686560239c05d9ea12cb75746a525ade1d010d9916d2ef3512955fc3d04ab44305b30b5a63f01280ee482311844", 0xcc}, {&(0x7f0000001240)="891b92bbd6e8b30cf61d14bec2cb95f490a90fd63e5d918c2f9a09b3a01183dabf3e9528391c9e7826cc895756c540311596348170c4a8407c1509a89a7fae53a10664f35577725ad35ae7921d8f8593727ebd21f86976925a6a24", 0x5b}], 0x8, &(0x7f0000001640)=[@sndinfo={0x20, 0x84, 0x2, {0x1, 0x8, 0xfffffffffffffc01, 0x6, r6}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x2}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x8}}, @sndinfo={0x20, 0x84, 0x2, {0x3, 0x8005, 0xd7d, 0x8001, r7}}, @sndinfo={0x20, 0x84, 0x2, {0x2, 0x202, 0x3, 0x2, r8}}], 0x90, 0x8000}, {&(0x7f0000001700)=@in={0x2, 0x4e22, @local}, 0x10, &(0x7f0000002ac0)=[{&(0x7f0000001740)="d3fcbb2028c492928ca007d7bfc43d58d49f222549aea86dea381604b8d0a91fc67898d2a6d661b87291e3c97845517ba6ee2f5003b0d2a2905d00bb5c1fbfb379ad7d3ead0ad9ca3ceaeaf8f83a88e40fe56ac98c6db50504c69fe82e497de0a1664ff7021e4be7a92d8002272f79e382544b7d", 0x74}, {&(0x7f00000017c0)="de40c2b35f8f903c368e9e49a9b09bbc5ee458c87989df7cda03706ab5ad3ff0d5594f27f96a33a4137eda79cf38ee873ab72dae703a74618e99565e", 0x3c}, {&(0x7f0000001800)="cb3fab20fc51bd73de557882ad9dd8109594706b8015657e6c125926bb973984cba2a43666cedfddbea14c3fe034561a8208242b83ae8276327aa6cc59bb5beffdb528bb0d23402d16c55b6da68828a044aca2ff94988a9361cf2efe8a99b13dbc1353cab5b263", 0x67}, {&(0x7f0000001880)="2d91a3e75e41e8382684b13f7081462848767312dfd01a751a485c2cc2574587975756db815d911847484e28a44aae22e4ed2d43872f72f4b2434824ac4a974e1ba13cbcd8dcfbfb3583286e588db257d74655cf11156b2feaa296ecc235a7", 0x5f}, {&(0x7f0000001900)="03fe12269155aea0ee1d780208c1a5e9ca226a362d3ded533470469706af37d6dfc3acf0782180b2d4619f0c7779d645428e687f8631dffa1647c0e4db1861f112808f0ce34dc1f519580c823dd45da41d3eb19c753f0947eefb9eea0a6b223c7913f4f04f94362a21dc50faf12288c10daa413d9e4474b26f7e4585cf5a55be9bc9b113fa0cec7170e32de3707e98f73c192ee1a9f9d614caed6c0859fc9fd83d9aaea8d594197f0bda", 0xaa}, {&(0x7f00000019c0)="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", 0x1000}, {&(0x7f00000029c0)="fdbe22ae6010aac290953fdb8306b0f4d6865d98ff8ce497ff42d7fc8f8eef850e5ecaafcc92671dbf267a654e1f83a2aeb829398cd567f4648f8e4c69a9d85b7dc9f7f142ed5e43c3aeef260c89ab2c6f787cd62a3ce4a319a53b39f80f7d59f8560752cd9fe4569a627ff62f7f3b449459f18f25cf7840bd13035d7151f4ce100735b3c4bcf45f4bce72d9821e0c47f72dec05ea3e8a5b228123129a66f14bafdbf4ca6850047349f384d0b8c825304601625d74571d9abc959b419bd55e5d31906023816e53c62e47f8eab1eb322546a52f6f07a5", 0xd6}], 0x7, 0x0, 0x0, 0x40000}, {&(0x7f0000002b40)=@in={0x2, 0x4e21, @rand_addr=0x10000}, 0x10, &(0x7f0000002bc0)=[{&(0x7f0000002b80)="48b3478c01", 0x5}], 0x1, &(0x7f0000002d80)=[@sndinfo={0x20, 0x84, 0x2, {0x3, 0x8000, 0x1, 0x7, r9}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x3}}, @dstaddrv6={0x20, 0x84, 0x8, @local}, @sndrcv={0x30, 0x84, 0x1, {0x401, 0x5, 0x0, 0x9, 0x7fffffff, 0x0, 0xff, 0x8, r10}}], 0x88, 0x800}, {&(0x7f0000002e40)=@in={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000002f80)=[{&(0x7f0000002e80)="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", 0xff}], 0x1, &(0x7f0000002fc0)=[@dstaddrv6={0x20, 0x84, 0x8, @remote}, @init={0x18, 0x84, 0x0, {0x7, 0x8001, 0x3, 0xfffffffffffffa52}}], 0x38, 0x840}, {&(0x7f0000003000)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000003140)=[{&(0x7f0000003040)="e2743d42b06940520cec71d2c34f4f50c339f22f72d90e376d07fd31a754cd088f112d010c90eeb65ee10749bda8fa0107f18f5c3ac5e910fbf16a923b262f0f05860389abe987841e2cb77f2be5829ce83437907d3123515edd07f2f475490aea", 0x61}, {&(0x7f00000030c0)="b65ce198cec82bb4535b38f9c13100faff354bb9b3bc017ae3489006c394ff5e33f148158a673484716652bf39d7e1729a57a628a72335d45616c765c79778bbb27e5db3371c28c726787014136bb42bf4d8a65db5bbc4dcd574f7d3e7eda5c7020af4ab9cda45b80a978335", 0x6c}], 0x2, &(0x7f0000003200)=[@authinfo={0x18, 0x84, 0x6, {0x7fffffff}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x6}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @sndrcv={0x30, 0x84, 0x1, {0x3ff, 0x4f2, 0x2, 0x7206, 0xd87, 0x80, 0xc3, 0x7, r11}}, @authinfo={0x18, 0x84, 0x6, {0x6}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x15}}], 0xb0, 0x4000000}, {&(0x7f00000032c0)=@in6={0xa, 0x4e20, 0x3, @loopback, 0x4}, 0x1c, &(0x7f00000034c0)=[{&(0x7f0000003300)="9c4897046fb9f443c0ea9ea629a78b9999ec19f594581f9b22c3223de3e4eefbbe3eb16d28a1c279732c14020cafe32c80ab86c9f64cdf116c38004e84f181a1cb0ae93fa1bfbfe8", 0x48}, {&(0x7f0000003380)="2debcae80f322f50164032a6b1ab3689537a1dccad9a163d3e4a57c056f2d44516de007c032937b01b96d1dd2f72db8666d2eec2745249dd8048e6dea46f70d7df56dfc0db8a5abbcb4e1f4a71b3559dfe8568dfe0564faf88da76cb397a1d3f5b6c7993e940b29e8f37f24f8519e7d1720cf614ea0d0916b4e3b797070281c46c0af95c6158d745a21d0faed1f71db78547de0dc62f22f369d1d8258cb1df156baeb5e3bc5be6e202788b6a6c8f414f0da169af961c6eb94b8e18733ee29d56a83baf7ee4ba7657cf7277b725ea14b8a6353ad48ca629dbd054765f6958", 0xde}, {&(0x7f0000003480)="44d5744a368427c269190c55b59a5b230793b36dd86a320ae723045f3c52ba9c36b828", 0x23}], 0x3, &(0x7f0000003600)=[@authinfo={0x18, 0x84, 0x6, {0x101}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x95}}, @init={0x18, 0x84, 0x0, {0x37ad, 0x81, 0x40}}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @remote}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @sndinfo={0x20, 0x84, 0x2, {0x5, 0x8008, 0x200, 0x7012f514, r12}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x101}}], 0xb8}], 0x9, 0x4008800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) 14:53:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x200000000000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:45 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2f2, 0x10400003) 14:53:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xe000000100000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x40030000000000, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:45 executing program 1: r0 = accept4(0xffffffffffffffff, &(0x7f00000001c0)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f0000000240)=0x80, 0x0) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f0000000300)={{&(0x7f0000000280)=""/48, 0x30}, &(0x7f00000002c0), 0x59}, 0x20) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0xc, 0x0) 14:53:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x400000000000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:45 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2f3, 0x10400003) 14:53:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xffffff7f00000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x100000000000000, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x109481, 0x0) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000280)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x3fd, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000200)={0xfffffff, 0xfffffffffffffc00, 0x4, [], &(0x7f00000001c0)={0xb90bff, 0xfffffffffffffff7, [], @value64=0xfffffffffffffffd}}) 14:53:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x3f00000000000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:45 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2f4, 0x10400003) 14:53:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0xd, 0x0) 14:53:46 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xffffffff00000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x200000000000000, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x8000000000000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:46 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2f5, 0x10400003) 14:53:46 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x7, &(0x7f0000000000)={0x27ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, 0x75b11fd3}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000001c0)={0x7d, 0x0, [0x8, 0x1, 0x3ff, 0x200000000742]}) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000240)) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) fcntl$notify(r0, 0x402, 0x20) 14:53:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0xe, 0x0) 14:53:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x400000000000000, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:46 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000002}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0xffffff7f00000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:46 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2f6, 0x10400003) 14:53:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x2000000000000000, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:46 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000003}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:46 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f0000000040)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f00000001c0)={0x66f, 0x2}) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000)=0x1, 0x4) 14:53:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0xf, 0x0) 14:53:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:46 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2f7, 0x10400003) 14:53:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x3f00000000000000, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:46 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000005}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:46 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2f8, 0x10400003) 14:53:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:46 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x4) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x8000000000000000, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x10, 0x0) 14:53:46 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000007}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:47 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2f9, 0x10400003) 14:53:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x3f00, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x11, 0x0) 14:53:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x400, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000380)='/dev/dmmidi#\x00', 0x0, 0x40000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r2, 0x300, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x6}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4040000}, 0x40000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200200}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x0, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffff8}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x9, 0x10}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x31, 0x1}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000c0}, 0x20040001) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video35\x00', 0x2, 0x0) 14:53:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0xffffff7f00000000, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000008}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:47 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2fa, 0x10400003) 14:53:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x34000, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0xa, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x12, 0x0) 14:53:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000001c0)={0x1f, 0x0, 0x2, 0x80000001}) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000240)=""/14, &(0x7f0000000280)=0xe) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000200)={0x0, r1}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000009}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x400300, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:47 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2fb, 0x10400003) 14:53:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x17, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuacct.usage_all\x00', 0x0, 0x0) bind$pptp(r0, &(0x7f0000000200)={0x18, 0x2, {0x1, @remote}}, 0x1e) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000002c0)={[], 0x9, 0x3, 0x2, 0x9, 0x9, r1}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x13, 0x0) 14:53:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x1000000, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000017}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:47 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2fc, 0x10400003) 14:53:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x2, @multicast1}}]}, 0x48}}, 0x0) 14:53:47 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000001c0)={0x41, 0x0, 0x3}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x14, 0x0) 14:53:47 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2fd, 0x10400003) 14:53:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000018}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4, @multicast1}}]}, 0x48}}, 0x0) 14:53:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x2000000, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f00000001c0)=0x7fff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:48 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2fe, 0x10400003) 14:53:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x15, 0x0) 14:53:48 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe000001a}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:48 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x4000000, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x2000, @multicast1}}]}, 0x48}}, 0x0) 14:53:48 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x2ff, 0x10400003) 14:53:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0x1, 0x0, 0x0) 14:53:48 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe000005d}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:48 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x300, 0x10400003) 14:53:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x16, 0x0) 14:53:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x3f00, @multicast1}}]}, 0x48}}, 0x0) 14:53:48 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x3f000000, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:48 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe000006e}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:48 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) socket$nl_crypto(0x10, 0x3, 0x15) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f00000001c0)={{0x7, 0x7, 0x2, 0x9, '\x00', 0x3}, 0x0, [0x8, 0x9, 0x4213f6f3, 0x2, 0x8, 0x54d, 0x7, 0x8, 0x3169, 0x8, 0x7, 0xb13, 0x8, 0x2, 0x8e6, 0x1000, 0xcaf3, 0x0, 0x100, 0x4, 0x2, 0x7, 0x5, 0x5, 0x81, 0xfffffffffffffff9, 0x8001, 0x1, 0x78, 0x1ff, 0x7fff, 0x3, 0x3, 0x8, 0x400, 0xfa, 0x5, 0x18, 0xffff, 0x46c617e6, 0x400, 0x2, 0xffffffffffffffe0, 0x9, 0xcd1, 0x6, 0x3, 0x10001, 0x5, 0xffffffff, 0x1, 0x400, 0x401, 0x1ff, 0x4, 0x4, 0x1, 0x5b1, 0x5414ebf4, 0x80, 0x8, 0x10001, 0x5, 0x6, 0xffffffffffffffff, 0x4, 0x1, 0x200, 0x0, 0xfffffffffffffffd, 0xfffffffffffffff7, 0x5, 0x3, 0x5, 0x6, 0x100, 0x9, 0x704, 0x1, 0x4, 0xfffffffffffffff7, 0x3, 0xfff, 0x400, 0x400, 0x3, 0x6, 0x80000000, 0x2, 0x6, 0x3ff, 0x545, 0x9, 0x8, 0x1a77, 0x6, 0x94, 0xfffffffffffff2c5, 0x5, 0x8, 0x7, 0x83b3, 0x1, 0x3, 0x4, 0x0, 0x1, 0x2, 0x1, 0x138, 0x0, 0x69, 0x9, 0x1, 0x100000001, 0x80, 0x5, 0x11cd, 0xfff, 0x3, 0x7f, 0x7fff, 0x9891, 0xfffffffffffffeff, 0x5c7, 0x3, 0x5, 0x5]}) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/attr/current\x00', 0x2, 0x0) 14:53:48 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x301, 0x10400003) 14:53:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x34000, @multicast1}}]}, 0x48}}, 0x0) 14:53:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x17, 0x0) 14:53:48 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0xffffff7f, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:48 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000300}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:48 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x302, 0x10400003) 14:53:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x400300, @multicast1}}]}, 0x48}}, 0x0) 14:53:48 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x1000001, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000200)=0x7, 0x4) clock_adjtime(0x1000000000000, &(0x7f0000000000)={0x27ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e2c0000000}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:48 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x40030000000000, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:48 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x303, 0x10400003) 14:53:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x18, 0x0) 14:53:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x1000000, @multicast1}}]}, 0x48}}, 0x0) 14:53:49 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:49 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) bind$bt_l2cap(r0, &(0x7f00000001c0)={0x1f, 0x5, {0x40000000000000, 0x9, 0x101, 0x4, 0x7f, 0x200}, 0x7, 0x6}, 0xe) 14:53:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x100000000000000, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:49 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x304, 0x10400003) 14:53:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x19, 0x0) 14:53:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x200000000000000, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x2000000, @multicast1}}]}, 0x48}}, 0x0) 14:53:49 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:49 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x1, 0x10000) 14:53:49 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x305, 0x10400003) 14:53:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x400000000000000, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1a, 0x0) 14:53:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4000000, @multicast1}}]}, 0x48}}, 0x0) 14:53:49 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:49 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x306, 0x10400003) 14:53:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x3f00000000000000, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:49 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x200000, 0x6) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000240)=""/26) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) ioctl$NBD_CLEAR_QUE(r0, 0xab05) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000001c0)) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000280)=0x1, 0x4) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) 14:53:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x20000000, @multicast1}}]}, 0x48}}, 0x0) 14:53:49 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:49 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x307, 0x10400003) 14:53:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1b, 0x0) 14:53:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x8000000000000000, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:50 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x3f, @rand_addr="9ccaba9999468c6aefc1e534793ec22e", 0x9}, @in6={0xa, 0x4e24, 0x0, @rand_addr="a777599c1bfbd09ec2abafc7758970ef", 0x5}, @in={0x2, 0x4e24, @multicast1}], 0x48) 14:53:50 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x308, 0x10400003) 14:53:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1c, 0x0) 14:53:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x3f000000, @multicast1}}]}, 0x48}}, 0x0) 14:53:50 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0xffffff7f00000000, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:50 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x309, 0x10400003) 14:53:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0xffffff7f, @multicast1}}]}, 0x48}}, 0x0) 14:53:50 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff, 0x0, 0x0, 0x0, 0x0, 0x2000}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:50 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1d, 0x0) 14:53:50 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x30a, 0x10400003) 14:53:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x40030000000000, @multicast1}}]}, 0x48}}, 0x0) 14:53:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:50 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1e, 0x0) 14:53:50 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x80) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f00000004c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x41}, 0xc, &(0x7f0000000480)={&(0x7f0000000280)={0x1e0, r1, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xecf}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0xac, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8e47}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}]}, @TIPC_NLA_BEARER={0xcc, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x3, @mcast1, 0x6}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x10000}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x3, @loopback, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x7, @ipv4={[], [], @loopback}, 0x10001}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x897c}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x7, @loopback, 0x6}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast2}}}}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x4000}, 0x11) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:50 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x30b, 0x10400003) 14:53:50 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x30c, 0x10400003) 14:53:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x100000000000000, @multicast1}}]}, 0x48}}, 0x0) 14:53:50 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x21, 0x0) 14:53:50 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f00000001c0)) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 14:53:50 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x30d, 0x10400003) 14:53:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x200000000000000, @multicast1}}]}, 0x48}}, 0x0) 14:53:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x22, 0x0) 14:53:51 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x34000, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:51 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:51 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x30e, 0x10400003) 14:53:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x400400, 0x100) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x400000000000000, @multicast1}}]}, 0x48}}, 0x0) 14:53:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x23, 0x0) 14:53:51 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400300, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:51 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:51 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x30f, 0x10400003) 14:53:51 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x4000400000000000, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f00000001c0)=0x5) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@ipmr_getroute={0x1c, 0x1a, 0x8, 0x70bd2b, 0x25dfdbfb, {0x80, 0x80, 0x80, 0x0, 0xfc, 0x4, 0xc8, 0x7, 0x1200}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x2000000000000000, @multicast1}}]}, 0x48}}, 0x0) 14:53:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x24, 0x0) 14:53:51 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:51 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:51 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x310, 0x10400003) 14:53:51 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x311, 0x10400003) 14:53:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x25, 0x0) 14:53:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x3f00000000000000, @multicast1}}]}, 0x48}}, 0x0) 14:53:51 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2000000, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:51 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:51 executing program 1: r0 = socket$inet6(0xa, 0xa, 0x10000) lseek(r0, 0x0, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:51 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x312, 0x10400003) 14:53:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x26, 0x0) 14:53:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x8000000000000000, @multicast1}}]}, 0x48}}, 0x0) 14:53:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4000000, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:52 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f00000001c0)) 14:53:52 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x313, 0x10400003) 14:53:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x27, 0x0) 14:53:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0xffffff7f00000000, @multicast1}}]}, 0x48}}, 0x0) 14:53:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f000000, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:52 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x314, 0x10400003) 14:53:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000002}}]}, 0x48}}, 0x0) 14:53:52 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0xfffffffffffffff9, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r0, 0x808c563d, &(0x7f0000000200)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000500)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r1, 0x400, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x4000) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f0000000000)={{0xa, 0x4e22, 0x6, @local}, {0xa, 0x4e24, 0xfffffffffffffffb, @mcast2, 0x3}, 0x7ff, [0x6, 0x56, 0x1, 0x1, 0xed, 0x0, 0x800, 0x7]}, 0x5c) 14:53:52 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x315, 0x10400003) 14:53:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x28, 0x0) 14:53:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:52 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5b4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff, 0x661d}) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000005}}]}, 0x48}}, 0x0) 14:53:52 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x316, 0x10400003) 14:53:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x40030000000000, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x29, 0x0) 14:53:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000007}}]}, 0x48}}, 0x0) 14:53:52 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x317, 0x10400003) 14:53:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x2a, 0x0) 14:53:52 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x101180) getsockopt$inet6_udp_int(r0, 0x11, 0x6e, &(0x7f0000000200), &(0x7f0000000240)=0x4) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x100000000000000, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:53 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:53 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x318, 0x10400003) 14:53:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000008}}]}, 0x48}}, 0x0) 14:53:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x200000000000000, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x2b, 0x0) 14:53:53 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:53 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x319, 0x10400003) 14:53:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x2c, 0x0) 14:53:53 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x438, 0x2000) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f0000000200)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, 0xf, 0x3, 0x5, [@bcast, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) 14:53:53 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31a, 0x10400003) 14:53:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000009}}]}, 0x48}}, 0x0) 14:53:53 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400000000000000, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x2d, 0x0) 14:53:53 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31b, 0x10400003) 14:53:53 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:53 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) 14:53:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000017}}]}, 0x48}}, 0x0) 14:53:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3f00000000000000, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x2e, 0x0) 14:53:53 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31c, 0x10400003) 14:53:53 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:53 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8000000000000000, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:54 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31d, 0x10400003) 14:53:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000018}}]}, 0x48}}, 0x0) 14:53:54 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/53, 0x35}, {&(0x7f0000000180)=""/126, 0xffffffffffffffdf}, {&(0x7f0000001140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/14, 0xe}], 0x4, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}, {0x0}], 0x2}, 0x8005) write$P9_RLOCK(r4, &(0x7f00000002c0)={0x8, 0x35, 0x1, 0x2}, 0x8) write$P9_RATTACH(r4, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x0, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x0, 0x0, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x0, 0x2, 0x3, 0x4, 0x0, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x0, 0x3, 0x7ff, 0x0, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x0, 0x3ff, 0x0, 0x9, 0x100000000, 0x80000000, 0x9, 0x9, 0x8, 0x8, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x0, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x0, 0x5, 0x1, 0x4, 0x7ff, 0x0, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x0, 0xfffffffffffffeff, 0x1326d155, 0x0, 0x3ff, 0x1, 0x0, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x0, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x0, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x0, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x0, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x5830, 0x0, 0x5, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x6b63, 0x4b, 0x9c6, 0x0, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x0, 0x0, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x0, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x0, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) 14:53:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x2f, 0x0) 14:53:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff7f00000000, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:54 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31e, 0x10400003) 14:53:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe000001a}}]}, 0x48}}, 0x0) 14:53:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x30, 0x0) 14:53:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x5, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000300}}]}, 0x48}}, 0x0) 14:53:54 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x37) 14:53:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getdents(r0, &(0x7f00000001c0)=""/83, 0x53) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x31, 0x0) 14:53:54 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x17, 0x9, 0x10000e0}]}, 0x20}}, 0x0) 14:53:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:54 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x1040031f) 14:53:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:54 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10401f03) 14:53:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x5, 0x10000e0}]}, 0x20}}, 0x0) 14:53:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x32, 0x0) 14:53:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:55 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:55 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-control\x00', 0x401fe, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000200)={0x2000000000000000, 0x1, {0x1, 0x2, 0x800, 0x0, 0x2}}) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000440)) fcntl$notify(r0, 0x402, 0x4) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x402, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800111}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="6cc50000", @ANYRES16=r3, @ANYBLOB="010200000080fcdbdf250a000000080006008f7b00001c000100080004004e22000008000b0073697000080001000a000000040001002c000100080002002900000008000b0073697000080002002f0000000800060073680000080001000a00000008000500060000000c000300080007004e2100002400010008000200ff000000080004004e20000008000900240000000800080002000000"], 0xa0}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:55 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') accept4$rose(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c, 0x80000) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 14:53:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x7, 0x10000e0}]}, 0x20}}, 0x0) 14:53:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x33, 0x0) 14:53:55 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:55 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xef}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x348, 0x10400007) pipe2(&(0x7f0000000040), 0x4000) 14:53:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x8, 0x10000e0}]}, 0x20}}, 0x0) 14:53:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x34, 0x0) 14:53:55 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000080)=0xc483) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') 14:53:55 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:55 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f00000001c0), &(0x7f0000000240)=0x60, 0x80800) sendmmsg(r0, &(0x7f00000007c0)=[{{&(0x7f0000000280)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000300)="5eb5ffcafa6a3e886186d9a58970ef3cfd76810a21b60aad6d25de93e60a92a76a102bc4386d4aacc85780e47a8ed1156973261a5980121aaf7eb97bba4f17037e074e5b822dd8fc3dbf92e9ab6175e67eb9044ea314b5207371eae69326e6de289aeb10220a4404608100b870cfc36a46d4b06d0982107d2e0855bcd8a9c5be15ca37088e9c3b4ed564cd95fd8d547753654280b9bad1b208c65fa24591e04308d7978bf6f249af81e2a0ece7a4133e505f6a330058fa76690fbe68c4a9a92dfca579", 0xc3}, {&(0x7f0000000400)="3ab0ab4dda2228dd2b0d3b0c23187c268047fb8b09d41ac21807c9cd041bd40f5b967f0e89377f9867748d52bb35d27769ff7da72febc0a30eddf349adc840f1a6729c125b8ca1a6b64df284e032a5c48f14bba72b36f8ef58fcba6f102b1627f66a6f2743b94f8043d6cfe3d03a6a52421aca27184d57b6434e7c193d4ad68e4d730464cf6b6aae58b093fbcd91a22019b820f8b3bd0f33aadf47e261b5e53f0ae0f0ec7a79d1d8cdcffc98524109fcf489a58397c7376d2009f58846ab9210be8ca8c7afe1675b69ee4f6b8048fbbf8e28d9f29852", 0xd6}, {&(0x7f0000000500)="66e737a5c8979bc94bf6622bef0c29a34edd60d0c19ad19686f4446accea8a86e0650b36", 0x24}, {&(0x7f0000000540)="5adeb0e27a202cf11d", 0x9}, {&(0x7f0000000580)="e489112bb43abcd0e8ccd12a7784cb0da95ba7359ff6fc5305525ce22acc4e9e7e2a2dfc674e6f3fb32ca65627acd212afefce846066190d153e9f314aa7b33f36406e298220c17f4362c4c659321d3e91bd56b0fdda9753e188ca9356fe199c9d29cb8a72c4c116011283b2cf0a6f380c84eda483406277113837e30473ca4b1b7702567ae80de5f5a0c36b71b76593c6c8", 0x92}, {&(0x7f0000000640)="7a3ef99d3c2eff6fa856c8ed836bf0ec7705ce7f6083647f37e0275c8aae53a9bde12568115609838a7c1ba29f2ba52b6d0b62436a307f5ee8f69dc70375d4bccbe76cdc43b35d70a220ec8549dc4cbb3dbde149bf15f307cbe8c970f3ccded5f608f4fdda9baef5ccb416794065cf8789e6069f52caf1b032d9b19a72264c798a9f8966e65925a2caea0d8e621579e7a8bd5bf54ae33d2633a4e529741d77abe830102b9bd1b994", 0xa8}, {&(0x7f0000000700)="46b048c8fac975d876dae8495e474c2c67df16a9da2d6d9ba26c40efd3953f40570de4d7f8f965a128fc4ae29a20cc1eb772392621f2d24b4d80abea27", 0x3d}], 0x7}, 0x8}], 0x1, 0x10) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x17, 0x10000e0}]}, 0x20}}, 0x0) 14:53:55 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40001, 0x88) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 14:53:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x35, 0x0) 14:53:55 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:55 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x18, 0x10000e0}]}, 0x20}}, 0x0) 14:53:55 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000340)={&(0x7f0000000040), 0xc, &(0x7f0000000300)={&(0x7f00000000c0)={0x240, r1, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x57f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5fd3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x97}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_LINK={0x11c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x57}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8c2b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbf0}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffff000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x34}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}]}]}, 0x240}, 0x1, 0x0, 0x0, 0x40004}, 0x20000880) 14:53:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:56 executing program 1: eventfd(0x3) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x33435) ioctl$TCFLSH(r0, 0x540b, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) 14:53:56 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x36, 0x0) 14:53:56 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x1a, 0x10000e0}]}, 0x20}}, 0x0) 14:53:56 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) clock_gettime(0x0, &(0x7f00000005c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000000580)=[{{&(0x7f0000000040)=@l2, 0x80, &(0x7f00000004c0)=[{&(0x7f00000000c0)=""/75, 0x4b}, {&(0x7f0000000140)=""/105, 0x69}, {&(0x7f00000001c0)=""/86, 0x56}, {&(0x7f0000000240)=""/36, 0x24}, {&(0x7f0000000280)=""/30, 0x1e}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/66, 0x42}, {&(0x7f0000000340)=""/183, 0xb7}, {&(0x7f0000000400)=""/178, 0xb2}], 0x9}, 0x800}], 0x1, 0x2, &(0x7f0000000600)={r1, r2+30000000}) 14:53:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:56 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:56 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x2}]}, 0x20}}, 0x0) 14:53:56 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f00000001c0)={0x9, 0x401}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000002c0)=0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x3ff, 0x80000001, 0x0, 0x2, 0x0, 0xf53, 0x1, 0x4, 0x1ff, 0xffffffff, 0x200, 0x8, 0x0, 0x9, 0x0, 0x0, 0x8, 0x7f, 0x6, 0x8001, 0x0, 0xfff, 0x5, 0x4, 0x8001, 0x180, 0xffffffffffff8000, 0x1ff, 0x10001, 0x7, 0x7fffffff, 0x5, 0x9, 0x3ff, 0x1, 0x3, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000200), 0x8}, 0x1000, 0x4fe, 0x40, 0xf, 0x4, 0x400, 0x1}, r2, 0xb, r1, 0x8) 14:53:56 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000040)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000140)={0x1, 0x4, 0x40, 0x6, 0x8, 0x275a, 0x8001, 0x400, 0x81, 0xff}) preadv(r0, &(0x7f0000000040), 0x100001f0, 0x0) 14:53:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x37, 0x0) 14:53:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) socket$rds(0x15, 0x5, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:56 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x26) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000080), 0x1) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) setsockopt$inet_tcp_buf(r1, 0x6, 0x2b, &(0x7f0000000040)="5936162be485d7e2f4544c4da6087e504ab309fb0a51f6bfed05ec3e14669bce59c3e77b90bcee01", 0x28) 14:53:56 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x4}]}, 0x20}}, 0x0) 14:53:56 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x38, 0x0) 14:53:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:56 executing program 2: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000600)='/dev/video0\x00', 0x2, 0x0) preadv(r0, &(0x7f00000007c0)=[{&(0x7f00000033c0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/118, 0x76}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x4, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000440)=[{&(0x7f0000000040)=""/89, 0x59}, {&(0x7f00000000c0)=""/198, 0x4a5}, {&(0x7f00000004c0)=""/19, 0x13}, {&(0x7f0000000200)=""/170, 0xaa}, {&(0x7f00000002c0)=""/199, 0xc7}, {&(0x7f00000003c0)=""/128, 0x80}], 0x6, 0x10400003) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000500)={{0x7fff, 0x40}, {0x8, 0xe904}, 0xffffffffffffffc1, 0x4, 0x3}) 14:53:56 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x3f00}]}, 0x20}}, 0x0) 14:53:56 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x39, 0x0) 14:53:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)=0x0) ptrace$cont(0x1f, r0, 0xfffffffffffffffa, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) syz_open_procfs(r0, &(0x7f0000000200)='cgroup\x00') msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x7) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getgroups(0x8, &(0x7f00000001c0)=[0xee01, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xee00, 0xffffffffffffffff]) setfsgid(r0) 14:53:57 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 14:53:57 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x34000}]}, 0x20}}, 0x0) 14:53:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x3a, 0x0) 14:53:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:57 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:57 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) bind$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @hyper}, 0x10) 14:53:57 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x3b, 0x0) 14:53:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x400300}]}, 0x20}}, 0x0) 14:53:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:57 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000000c0)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) signalfd4(r1, &(0x7f0000000040)={0x2}, 0x8, 0x800) 14:53:57 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) openat$ashmem(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) r1 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000140)=""/53, 0x35}, {&(0x7f0000000180)=""/126, 0xffffffffffffffdf}, {&(0x7f0000001140)=""/4096, 0x1000}, {&(0x7f0000000200)=""/14, 0xe}], 0x4, 0x0) write$uinput_user_dev(r1, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) openat$rtc(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x40c392f5) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) r4 = dup2(r2, r2) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x7) sendmsg$alg(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000000)="a7ceec29", 0x4}, {0x0}], 0x2}, 0x8005) write$P9_RLOCK(r4, &(0x7f00000002c0)={0x8, 0x35, 0x1, 0x2}, 0x8) write$P9_RATTACH(r4, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz1\x00', {0x4, 0x3, 0x0, 0xd1cd}, 0x0, [0x10001, 0x3, 0x5, 0x800000000000000, 0x7, 0x942, 0x40, 0x9, 0x1, 0x0, 0x4, 0x40400000, 0x1, 0x0, 0x7f, 0xfffffffffffffffa, 0x2, 0x0, 0x0, 0x101, 0x7, 0x0, 0x3, 0x8000, 0x4, 0x20, 0x0, 0x2, 0x3, 0x4, 0x0, 0x779, 0x6, 0x7, 0xa3f, 0x7, 0x20, 0x14, 0x8, 0x1, 0x0, 0x3, 0x7ff, 0x0, 0xc72, 0x10001, 0x5, 0xacdf, 0x0, 0x0, 0x3ff, 0x0, 0x9, 0x100000000, 0x80000000, 0x9, 0x9, 0x8, 0x8, 0x1, 0x6, 0xa3, 0x1, 0x63], [0x2, 0xfff, 0x10000, 0x8, 0x0, 0x4, 0x7, 0x0, 0x0, 0x7, 0x0, 0x8000, 0x7f, 0x5164, 0x3, 0x20000, 0x3, 0x3, 0x8, 0x200, 0x8001, 0x4, 0x0, 0xffff, 0x7fff, 0x0, 0x5, 0xffffffff00000000, 0x1000, 0x2, 0x1eb4d8e0, 0x0, 0x5, 0x1, 0x4, 0x7ff, 0x0, 0x1e3ebc6d, 0x27b, 0x9, 0x2, 0x5, 0x5, 0x9f57, 0x2, 0x0, 0x8, 0x10001, 0x5, 0x3cfe50cc, 0x0, 0xfffffffffffffeff, 0x1326d155, 0x0, 0x3ff, 0x1, 0x0, 0x7fffffff, 0x0, 0x80000001, 0xd6, 0x7, 0x4, 0x7], [0x1, 0x7, 0xa1ce, 0x6, 0x8, 0x0, 0x5, 0x80, 0x2, 0x100000000, 0x6, 0x8, 0x0, 0x2d6f, 0x6, 0x7, 0x5f, 0x4, 0x4658, 0xfff, 0xcc54, 0x6, 0x0, 0xfffffffffffff46d, 0x9, 0x6, 0x1, 0x0, 0x1, 0x9, 0x7, 0x2, 0xb3f2, 0x8, 0xa5, 0x80000001, 0xc95, 0x1f, 0x8001, 0x2, 0x0, 0xff, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0xb8d, 0x2, 0x1f, 0x8, 0x0, 0x4, 0xfffffffffffffbff, 0x7f, 0x4, 0x0, 0xfffffffffffffff9, 0x7, 0x8000, 0x5, 0x2, 0xffffffffffff8000, 0x245, 0x7], [0x8, 0x1, 0x5, 0x0, 0x5830, 0x0, 0x5, 0x0, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x6b63, 0x4b, 0x9c6, 0x0, 0x10000, 0x3, 0x1, 0x803a, 0x1, 0x0, 0x0, 0x2, 0x136f, 0xfd, 0x8000, 0x7, 0x8, 0x0, 0x4, 0x4, 0x9, 0x9f55, 0x98, 0x10001, 0x0, 0xfffffffffffffffd, 0x7f, 0xd9, 0x4e47, 0x0, 0x2, 0x7b0, 0x3, 0x5, 0xac, 0x0, 0x7be0, 0xe8b0, 0x140a, 0x75a21db9, 0xe0000000000000, 0x8e, 0x4, 0x0, 0x4, 0xd8, 0xfff, 0xfffffffffffff663, 0x6, 0xfffffffffffffff7]}, 0x45c) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd) 14:53:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x3c, 0x0) 14:53:57 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:57 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x1000000}]}, 0x20}}, 0x0) 14:53:57 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x4) faccessat(r0, &(0x7f0000000080)='./file0\x00', 0x20, 0x1000) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 14:53:58 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x3d, 0x0) 14:53:58 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x6a080, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000100)={r0}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') bind$vsock_dgram(r2, &(0x7f00000000c0)={0x28, 0x0, 0x2710, @reserved}, 0x10) preadv(r2, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000240)={{0x0, @name="3202f32436cc58be7f8443671ba225a79ab1707ed3762c854ae02a5242962231"}, 0x8, 0x5, 0x2}) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000280)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f00000002c0)={0x8}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000003c0)=ANY=[@ANYBLOB="72617700000000000000000029110000000000fc02000000000000806d8c4dd873d1a4e00000040000000000000000000000000000000000001000000000000000000000011d0000000000000000000000000000000000e15ea12808000000000000000000000000000000000000e9f063821eee3dbe01"], 0x68) getsockname$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000380)) 14:53:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x2000000}]}, 0x20}}, 0x0) 14:53:58 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x3e, 0x0) 14:53:58 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) socket$inet(0x2, 0x80003, 0x5) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040), 0x4) preadv(r0, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/18, 0x12}, {&(0x7f00000013c0)=""/4096, 0xfffffffffffffd05}, {&(0x7f0000000100)=""/13, 0xd}, {&(0x7f0000000140)=""/24, 0x18}, {&(0x7f0000000180)=""/93, 0x5d}], 0x5, 0x10400005) 14:53:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x4000000}]}, 0x20}}, 0x0) 14:53:58 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:58 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 14:53:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xe000000100000000, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x41, 0x0) 14:53:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x3f000000}]}, 0x20}}, 0x0) 14:53:58 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x24}], 0x1, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/245, 0xf5}, {&(0x7f0000000140)=""/248, 0x8a}, {&(0x7f0000000240)=""/77, 0xfffffffffffffe1f}], 0x3, 0x10400003) 14:53:58 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:58 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000001c0)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:58 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x42, 0x0) 14:53:59 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0xf}}, 0x20) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) setxattr$security_smack_entry(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='net/ip6_mr_vif\x00', 0xf, 0x1) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video0\x00', 0x2, 0x0) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000280)) 14:53:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0xffffff7f}]}, 0x20}}, 0x0) 14:53:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:59 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000000)={0x27ff}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000001c0)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) 14:53:59 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000040)=""/27, &(0x7f0000000080)=0x1b) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 14:53:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x301, 0x0) 14:53:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x40030000000000}]}, 0x20}}, 0x0) 14:53:59 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:59 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') pwritev(r0, &(0x7f00000002c0)=[{&(0x7f00000013c0)="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", 0x1000}, {&(0x7f0000000040)="31425d8f276995051c2f9a690b91690147e79e52e6be487c6cc41496cf69e9f9fd4985693a1dc50f4079c33c1f58029b10278a4bb958508822c1ad369591c3cc8361c77f7f9bffc5ecbecc472705d84107d1c683c1f22b02ae279b252c4238bbeb1fdbc5798cd1febfd6548f0ba86eda9cb500b501655973d9040f992e64d77e54134b80e446feffbb4867230ecdff8f5a60817f571b647f39005193e2d229963cc8a43421afbab0218977b99021a947357ee953c534a4b62d4c2b4bc9aaad25d07ddec0951944c36c4b30f989aa8ff0ffbf96a3fbc588beac6ea9105d5a568c119d", 0xe2}, {&(0x7f0000000140)="567de4cad417669035fd5fb7c0be8213cf7773860e5860b4d6c410ca808fc802f675d6e6685d2da851d20ef0cc75a40d37ee0690554f41afa8b0bc474b44ee9c5f8ba6043735bdee6928d6f75bd7d43d1c1f810f636721a8522c53815859", 0x5e}, {&(0x7f00000001c0)="9816743c8875fde1afb73469207d1fd6d51872874f6876890ede562392f2a09e8dde03819e9d523950ea5b34c62e26f46fa01e5cdc02cc60801b8bc8472f54a83d87d647f9be007544d9c0a12321126514b7fddfd20ff129ae17affac3bebd67221436d3613b3b8d91e8e4833e83b2a6499fe954edbb84681da5a3db7e4cf3e1dc146c304272d12a97426a5adf622dd46f0bfaf4fbba37735676f09383857058ef47fadcd5a0ba3bdecb94e748948dfc7d2d4767409984c2cb7594d355bf910d181eecb5ae571b01bb1065", 0xcb}], 0x4, 0x31) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 14:53:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 948.576530][T30960] FAULT_INJECTION: forcing a failure. [ 948.576530][T30960] name failslab, interval 1, probability 0, space 0, times 0 [ 948.593678][T30960] CPU: 0 PID: 30960 Comm: syz-executor.1 Not tainted 5.1.0-rc5+ #72 [ 948.601688][T30960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.611764][T30960] Call Trace: [ 948.615083][T30960] dump_stack+0x172/0x1f0 [ 948.619443][T30960] should_fail.cold+0xa/0x15 [ 948.624056][T30960] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 948.629885][T30960] ? ___might_sleep+0x163/0x280 [ 948.634752][T30960] __should_failslab+0x121/0x190 [ 948.639701][T30960] should_failslab+0x9/0x14 [ 948.644241][T30960] kmem_cache_alloc_node+0x264/0x710 [ 948.649545][T30960] ? ___might_sleep+0x163/0x280 [ 948.654411][T30960] __alloc_skb+0xd5/0x5e0 [ 948.658759][T30960] ? skb_trim+0x190/0x190 [ 948.663112][T30960] pfkey_sendmsg+0x146/0xbe0 [ 948.667722][T30960] ? apparmor_socket_sendmsg+0x2a/0x30 14:53:59 executing program 2: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) ioprio_set$uid(0x3, r0, 0x8) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x2) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x200, 0x0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000000000000000000000000000600000000000000", @ANYRES32=r1, @ANYBLOB="000000000100"/28, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00#\x00'/28, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\t\x00'/28, @ANYRES32=r1, @ANYBLOB="000000000200"/28, @ANYRES32=r1, @ANYBLOB="000000000300"/28, @ANYRES32=r1, @ANYBLOB="00000000250000000000000000000000000000000000b5e8767d84b0e86ad13cd2f88d7d74497d08bf49b78183a509763602b0d67212daa1d4d83ee4f864f243ba5ba39180b14c000000000000"]) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000000c0)=0x505229a9) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r2, &(0x7f0000000700), 0x31f, 0x10400003) [ 948.673195][T30960] ? pfkey_send_new_mapping+0x1220/0x1220 [ 948.678939][T30960] sock_sendmsg+0xdd/0x130 [ 948.683719][T30960] ___sys_sendmsg+0x806/0x930 [ 948.688410][T30960] ? copy_msghdr_from_user+0x430/0x430 [ 948.693891][T30960] ? kasan_check_read+0x11/0x20 [ 948.699021][T30960] ? __fget+0x381/0x550 [ 948.703198][T30960] ? ksys_dup3+0x3e0/0x3e0 [ 948.707641][T30960] ? __fget_light+0x1a9/0x230 [ 948.712341][T30960] ? __fdget+0x1b/0x20 [ 948.716417][T30960] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 948.722670][T30960] __sys_sendmsg+0x105/0x1d0 [ 948.727279][T30960] ? __ia32_sys_shutdown+0x80/0x80 [ 948.732396][T30960] ? fput_many+0x12c/0x1a0 [ 948.736832][T30960] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 948.736854][T30960] ? do_syscall_64+0x26/0x610 [ 948.746990][T30960] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.747004][T30960] ? do_syscall_64+0x26/0x610 [ 948.747027][T30960] __x64_sys_sendmsg+0x78/0xb0 [ 948.747045][T30960] do_syscall_64+0x103/0x610 [ 948.747064][T30960] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 948.747076][T30960] RIP: 0033:0x458c29 [ 948.747091][T30960] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 948.747100][T30960] RSP: 002b:00007fe7337b2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 948.747115][T30960] RAX: ffffffffffffffda RBX: 00007fe7337b2c90 RCX: 0000000000458c29 [ 948.747125][T30960] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 14:53:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x501, 0x0) 14:53:59 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) getpgid(0xffffffffffffffff) r0 = getpgid(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/if_inet6\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 948.747134][T30960] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 948.747143][T30960] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe7337b36d4 [ 948.747158][T30960] R13: 00000000004c64af R14: 00000000004dadf0 R15: 0000000000000004 14:53:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x100000000000000}]}, 0x20}}, 0x0) 14:53:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:53:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:53:59 executing program 1 (fault-call:1 fault-nth:1): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 949.057226][T30988] FAULT_INJECTION: forcing a failure. [ 949.057226][T30988] name failslab, interval 1, probability 0, space 0, times 0 [ 949.070691][T30988] CPU: 1 PID: 30988 Comm: syz-executor.1 Not tainted 5.1.0-rc5+ #72 [ 949.078697][T30988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.088760][T30988] Call Trace: [ 949.092077][T30988] dump_stack+0x172/0x1f0 [ 949.096426][T30988] should_fail.cold+0xa/0x15 [ 949.101047][T30988] ? fault_create_debugfs_attr+0x1e0/0x1e0 14:54:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0xff04, 0x0) [ 949.106869][T30988] ? ___might_sleep+0x163/0x280 [ 949.106891][T30988] __should_failslab+0x121/0x190 [ 949.106911][T30988] should_failslab+0x9/0x14 [ 949.116694][T30988] kmem_cache_alloc_node_trace+0x270/0x720 [ 949.116726][T30988] __kmalloc_node_track_caller+0x3d/0x70 [ 949.116754][T30988] __kmalloc_reserve.isra.0+0x40/0xf0 [ 949.116774][T30988] __alloc_skb+0x10b/0x5e0 [ 949.142464][T30988] ? skb_trim+0x190/0x190 [ 949.146822][T30988] pfkey_sendmsg+0x146/0xbe0 [ 949.151435][T30988] ? apparmor_socket_sendmsg+0x2a/0x30 [ 949.156914][T30988] ? pfkey_send_new_mapping+0x1220/0x1220 [ 949.162653][T30988] sock_sendmsg+0xdd/0x130 [ 949.167079][T30988] ___sys_sendmsg+0x806/0x930 [ 949.171762][T30988] ? copy_msghdr_from_user+0x430/0x430 [ 949.177213][T30988] ? kasan_check_read+0x11/0x20 [ 949.182052][T30988] ? __fget+0x381/0x550 [ 949.186194][T30988] ? ksys_dup3+0x3e0/0x3e0 [ 949.190607][T30988] ? __fget_light+0x1a9/0x230 [ 949.195268][T30988] ? __fdget+0x1b/0x20 [ 949.199319][T30988] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 949.205548][T30988] __sys_sendmsg+0x105/0x1d0 [ 949.210127][T30988] ? __ia32_sys_shutdown+0x80/0x80 [ 949.215223][T30988] ? fput_many+0x12c/0x1a0 [ 949.219634][T30988] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 949.225081][T30988] ? do_syscall_64+0x26/0x610 [ 949.229774][T30988] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.235844][T30988] ? do_syscall_64+0x26/0x610 [ 949.240516][T30988] __x64_sys_sendmsg+0x78/0xb0 [ 949.245281][T30988] do_syscall_64+0x103/0x610 [ 949.249884][T30988] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.255789][T30988] RIP: 0033:0x458c29 [ 949.259671][T30988] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 949.279258][T30988] RSP: 002b:00007fe7337b2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 949.287649][T30988] RAX: ffffffffffffffda RBX: 00007fe7337b2c90 RCX: 0000000000458c29 [ 949.295602][T30988] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 14:54:00 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x70f6, 0x0) sendmsg$rds(r0, &(0x7f00000007c0)={&(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/240, 0xf0}], 0x1, &(0x7f00000005c0)=[@mask_fadd={0x58, 0x114, 0x8, {{0x0, 0x2}, &(0x7f0000000200)=0x7f, &(0x7f0000000240)=0x800, 0x2, 0xd8a, 0x2, 0x1, 0x61, 0x3}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x5}, @mask_cswp={0x58, 0x114, 0x9, {{0x3, 0x211}, &(0x7f0000000280)=0x6, &(0x7f00000002c0)=0x40, 0x1f, 0x6, 0x5, 0x1000, 0x1, 0xac}}, @fadd={0x58, 0x114, 0x6, {{0x2, 0x1c4}, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x6, 0x8, 0x1, 0x9, 0x3, 0x42, 0x6634d905}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000380)=""/209, 0xd1}, &(0x7f0000000480)}}, @fadd={0x58, 0x114, 0x6, {{0x7f, 0xd86}, &(0x7f00000004c0)=0x2bf6, &(0x7f0000000500)=0xb8, 0xfff, 0x81, 0x7, 0xfffffffffffffff8, 0x0, 0x2}}, @mask_cswp={0x58, 0x114, 0x9, {{0x3, 0x72ec}, &(0x7f0000000540), &(0x7f0000000580)=0xfffffffffffffffd, 0xffffffffffff0000, 0x7f, 0x5, 0x9, 0x48, 0x5}}], 0x200}, 0x1) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0xff07, 0x0) [ 949.303557][T30988] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 949.311509][T30988] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe7337b36d4 [ 949.319461][T30988] R13: 00000000004c64af R14: 00000000004dadf0 R15: 0000000000000004 14:54:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x200000000000000}]}, 0x20}}, 0x0) 14:54:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0xf}}, 0x0) 14:54:00 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:00 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:00 executing program 1 (fault-call:1 fault-nth:2): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x34000, 0x0) 14:54:00 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00'/15) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) [ 949.618609][T31016] FAULT_INJECTION: forcing a failure. [ 949.618609][T31016] name failslab, interval 1, probability 0, space 0, times 0 [ 949.672249][T31016] CPU: 1 PID: 31016 Comm: syz-executor.1 Not tainted 5.1.0-rc5+ #72 [ 949.680273][T31016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.690336][T31016] Call Trace: [ 949.693655][T31016] dump_stack+0x172/0x1f0 [ 949.698023][T31016] should_fail.cold+0xa/0x15 [ 949.702639][T31016] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 949.708552][T31016] ? ___might_sleep+0x163/0x280 [ 949.713423][T31016] __should_failslab+0x121/0x190 [ 949.718389][T31016] should_failslab+0x9/0x14 [ 949.722909][T31016] kmem_cache_alloc+0x2b2/0x6f0 [ 949.727794][T31016] skb_clone+0x150/0x3b0 [ 949.732054][T31016] pfkey_process+0xcf/0x810 [ 949.736573][T31016] ? __mutex_lock+0x3cd/0x1310 [ 949.741349][T31016] ? pfkey_send_migrate+0x15c0/0x15c0 [ 949.746733][T31016] ? pfkey_sendmsg+0x3fd/0xbe0 [ 949.751517][T31016] ? mutex_trylock+0x1e0/0x1e0 [ 949.756292][T31016] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 949.762031][T31016] ? iov_iter_advance+0x295/0xf70 [ 949.767085][T31016] ? _copy_from_iter_full+0x25d/0x900 14:54:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0xc0}}, 0x0) 14:54:00 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x3, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x400000000000000}]}, 0x20}}, 0x0) [ 949.772472][T31016] ? __phys_addr_symbol+0x30/0x70 [ 949.777506][T31016] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 949.777535][T31016] pfkey_sendmsg+0x40b/0xbe0 [ 949.777559][T31016] ? pfkey_send_new_mapping+0x1220/0x1220 [ 949.787857][T31016] sock_sendmsg+0xdd/0x130 [ 949.787878][T31016] ___sys_sendmsg+0x806/0x930 [ 949.787900][T31016] ? copy_msghdr_from_user+0x430/0x430 [ 949.787930][T31016] ? kasan_check_read+0x11/0x20 [ 949.787952][T31016] ? __fget+0x381/0x550 [ 949.798080][T31016] ? ksys_dup3+0x3e0/0x3e0 [ 949.798109][T31016] ? __fget_light+0x1a9/0x230 [ 949.798128][T31016] ? __fdget+0x1b/0x20 [ 949.798145][T31016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 949.798168][T31016] __sys_sendmsg+0x105/0x1d0 [ 949.798187][T31016] ? __ia32_sys_shutdown+0x80/0x80 [ 949.798200][T31016] ? fput_many+0x12c/0x1a0 [ 949.798229][T31016] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 949.808345][T31016] ? do_syscall_64+0x26/0x610 [ 949.808362][T31016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.808376][T31016] ? do_syscall_64+0x26/0x610 14:54:00 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000040)={0xfffffffffffffc00, 0x800, 0x40, 0x2, 0x3, 0x8, 0x8}) [ 949.808400][T31016] __x64_sys_sendmsg+0x78/0xb0 [ 949.808419][T31016] do_syscall_64+0x103/0x610 [ 949.808440][T31016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.808453][T31016] RIP: 0033:0x458c29 [ 949.808469][T31016] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 949.808478][T31016] RSP: 002b:00007fe7337b2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 14:54:00 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') getsockopt$inet6_dccp_buf(r0, 0x21, 0xffffffffffffffff, &(0x7f0000000280)=""/163, &(0x7f0000000180)=0xa3) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0xad}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000080)={r1}) pwrite64(r0, &(0x7f00000001c0)="1b93ff55bf589a302186d39deb3628291ee0b9ac9525e0f536041f8f81d476e88acc52b5975ed5d79cdf987c932e506df27b67518562ad401d617c4b856247c1314f3c69dd07c86d8147a65c7a89544e1de80aaca3f340007bc5d5f4b3c83217a1f18848648ea99c075797a61359147b0030b4506658234965f3b4f1527ce4be492f722eee93a88e85852872b3644a9ba8bf773c3a3f76cab9aecbdc17eece628245b87037567d845733b9ac208d", 0xae, 0x0) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) [ 949.808493][T31016] RAX: ffffffffffffffda RBX: 00007fe7337b2c90 RCX: 0000000000458c29 [ 949.808503][T31016] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 949.808511][T31016] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 949.808527][T31016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe7337b36d4 [ 949.817515][T31016] R13: 00000000004c64af R14: 00000000004dadf0 R15: 0000000000000004 14:54:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x200001c1, 0x0) 14:54:00 executing program 1 (fault-call:1 fault-nth:3): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x33fe0}}, 0x0) 14:54:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x3f00000000000000}]}, 0x20}}, 0x0) 14:54:01 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x8, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:01 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0xa000, 0x0) bind$rds(r0, &(0x7f00000000c0)={0x2, 0x4e24, @remote}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') sendfile(r1, r1, &(0x7f0000000040), 0x7f) preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) [ 950.175196][T31045] FAULT_INJECTION: forcing a failure. [ 950.175196][T31045] name failslab, interval 1, probability 0, space 0, times 0 [ 950.208901][T31045] CPU: 0 PID: 31045 Comm: syz-executor.1 Not tainted 5.1.0-rc5+ #72 14:54:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x7ffff000, 0x0) [ 950.216923][T31045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.226984][T31045] Call Trace: [ 950.230298][T31045] dump_stack+0x172/0x1f0 [ 950.234658][T31045] should_fail.cold+0xa/0x15 [ 950.239277][T31045] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 950.245101][T31045] ? ___might_sleep+0x163/0x280 [ 950.245125][T31045] __should_failslab+0x121/0x190 [ 950.245142][T31045] should_failslab+0x9/0x14 [ 950.245169][T31045] kmem_cache_alloc_node+0x264/0x710 [ 950.254963][T31045] __alloc_skb+0xd5/0x5e0 [ 950.254982][T31045] ? skb_trim+0x190/0x190 [ 950.255000][T31045] ? __phys_addr_symbol+0x30/0x70 [ 950.255016][T31045] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 950.255044][T31045] pfkey_sendmsg+0x445/0xbe0 [ 950.255067][T31045] ? pfkey_send_new_mapping+0x1220/0x1220 [ 950.255085][T31045] sock_sendmsg+0xdd/0x130 [ 950.255105][T31045] ___sys_sendmsg+0x806/0x930 [ 950.284327][T31045] ? copy_msghdr_from_user+0x430/0x430 [ 950.284360][T31045] ? kasan_check_read+0x11/0x20 [ 950.284382][T31045] ? __fget+0x381/0x550 [ 950.284405][T31045] ? ksys_dup3+0x3e0/0x3e0 14:54:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0xfffffdef, 0x0) [ 950.284431][T31045] ? __fget_light+0x1a9/0x230 [ 950.284451][T31045] ? __fdget+0x1b/0x20 [ 950.294944][T31045] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 950.294969][T31045] __sys_sendmsg+0x105/0x1d0 [ 950.294988][T31045] ? __ia32_sys_shutdown+0x80/0x80 [ 950.295000][T31045] ? fput_many+0x12c/0x1a0 [ 950.295031][T31045] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 950.295047][T31045] ? do_syscall_64+0x26/0x610 [ 950.295062][T31045] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.295076][T31045] ? do_syscall_64+0x26/0x610 14:54:01 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='n\xee\x93%)\xf2H\x1d\xcc\xce\xb0\xaa{\x92f') preadv(r0, &(0x7f0000000700), 0x1000001a, 0x0) [ 950.295095][T31045] __x64_sys_sendmsg+0x78/0xb0 [ 950.295116][T31045] do_syscall_64+0x103/0x610 [ 950.382265][T31045] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.388170][T31045] RIP: 0033:0x458c29 [ 950.392077][T31045] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 950.411696][T31045] RSP: 002b:00007fe7337b2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 950.420116][T31045] RAX: ffffffffffffffda RBX: 00007fe7337b2c90 RCX: 0000000000458c29 [ 950.428097][T31045] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 950.436079][T31045] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 950.444068][T31045] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe7337b36d4 [ 950.452049][T31045] R13: 00000000004c64af R14: 00000000004dadf0 R15: 0000000000000004 14:54:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x8000000000000000}]}, 0x20}}, 0x0) 14:54:01 executing program 1 (fault-call:1 fault-nth:4): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x20000108}}, 0x0) 14:54:01 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) write$FUSE_IOCTL(r1, &(0x7f0000000040)={0xfffffffffffffed7, 0xfffffffffffffffd, 0x2, {0x3, 0x0, 0x7, 0x1f}}, 0x20) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e21, 0xfffffffffffffbff, @remote, 0xff}}, 0x0, 0x1, 0x0, "c6b103c83b3cba83ea46c9480153d869fb466bda09e0725017afbfba1a5373a91675529efd5b9326d5d192fe75a631f1b611fbe62e2319bfa46ab9dce044b1194078476974c7aad787f5f25e2e744c6e"}, 0xd8) 14:54:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0xffffff1f, 0x0) 14:54:01 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x9, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:01 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x1295, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000280)={0xfffffffffffffffe, 0x9, 0xfffffffffffffffe, 0x1f, 0x2, 0x10001}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x9}}, 0xa326, 0x1}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={r1, 0x80000001}, &(0x7f0000000200)=0x8) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000240)=0x101, 0x4) getrandom(&(0x7f0000000040)=""/128, 0x80, 0x1) [ 950.704635][T31083] FAULT_INJECTION: forcing a failure. [ 950.704635][T31083] name failslab, interval 1, probability 0, space 0, times 0 [ 950.732666][T31083] CPU: 0 PID: 31083 Comm: syz-executor.1 Not tainted 5.1.0-rc5+ #72 [ 950.740705][T31083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.750772][T31083] Call Trace: 14:54:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0xffffff80, 0x0) [ 950.754092][T31083] dump_stack+0x172/0x1f0 [ 950.758449][T31083] should_fail.cold+0xa/0x15 [ 950.763062][T31083] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 950.768892][T31083] ? ___might_sleep+0x163/0x280 [ 950.773758][T31083] __should_failslab+0x121/0x190 [ 950.778712][T31083] should_failslab+0x9/0x14 [ 950.783234][T31083] kmem_cache_alloc_node_trace+0x270/0x720 [ 950.789063][T31083] __kmalloc_node_track_caller+0x3d/0x70 [ 950.794720][T31083] __kmalloc_reserve.isra.0+0x40/0xf0 [ 950.800108][T31083] __alloc_skb+0x10b/0x5e0 [ 950.804535][T31083] ? skb_trim+0x190/0x190 [ 950.804554][T31083] ? __phys_addr_symbol+0x30/0x70 [ 950.804569][T31083] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 950.804595][T31083] pfkey_sendmsg+0x445/0xbe0 [ 950.804618][T31083] ? pfkey_send_new_mapping+0x1220/0x1220 [ 950.829970][T31083] sock_sendmsg+0xdd/0x130 [ 950.834408][T31083] ___sys_sendmsg+0x806/0x930 [ 950.839107][T31083] ? copy_msghdr_from_user+0x430/0x430 [ 950.844595][T31083] ? kasan_check_read+0x11/0x20 [ 950.849466][T31083] ? __fget+0x381/0x550 14:54:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0xffffff82, 0x0) [ 950.853654][T31083] ? ksys_dup3+0x3e0/0x3e0 [ 950.858093][T31083] ? __fget_light+0x1a9/0x230 [ 950.862783][T31083] ? __fdget+0x1b/0x20 [ 950.866862][T31083] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 950.873126][T31083] __sys_sendmsg+0x105/0x1d0 [ 950.877732][T31083] ? __ia32_sys_shutdown+0x80/0x80 [ 950.882850][T31083] ? fput_many+0x12c/0x1a0 [ 950.887300][T31083] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 950.892776][T31083] ? do_syscall_64+0x26/0x610 [ 950.897469][T31083] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 14:54:01 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000040)=""/79, 0x4f}, {&(0x7f00000000c0)=""/133, 0x85}, {&(0x7f0000000180)=""/119, 0x77}, {&(0x7f0000000200)=""/113, 0x71}, {&(0x7f0000000280)=""/112, 0x70}], 0x5, 0x10400003) [ 950.903555][T31083] ? do_syscall_64+0x26/0x610 [ 950.908254][T31083] __x64_sys_sendmsg+0x78/0xb0 [ 950.913037][T31083] do_syscall_64+0x103/0x610 [ 950.917657][T31083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.923586][T31083] RIP: 0033:0x458c29 [ 950.927489][T31083] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 950.947107][T31083] RSP: 002b:00007fe7337b2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 14:54:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0xffffffc0, 0x0) [ 950.955537][T31083] RAX: ffffffffffffffda RBX: 00007fe7337b2c90 RCX: 0000000000458c29 [ 950.963528][T31083] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 950.971518][T31083] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 950.979579][T31083] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe7337b36d4 [ 950.987562][T31083] R13: 00000000004c64af R14: 00000000004dadf0 R15: 0000000000000004 14:54:01 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0xffffff7f00000000}]}, 0x20}}, 0x0) 14:54:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x7ffff000}}, 0x0) 14:54:02 executing program 1 (fault-call:1 fault-nth:5): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:02 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0xa, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000180)={0x5, 0x7, 0x4, @remote, 'vcan0\x00'}) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000100)="ca3b9dd7a81f98e6a222e5f72475a544d0f724fba4ce74da9daf8bd6d9a31494a2e6f46ac6b12dddc696828358272a1aedd5d19f49857f1a85915b06b1e01580ccb6c5c78207d96ac6afd9c539c90ad61628278c990825fee9aa76e62b83a55b9727432e9849ee892d5b2427cfe57cb439773f58337b") preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x10000, 0x4) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000080)={0x6, 0x0, 0x1, 0x7fffffff, 0x4, 0x47, 0x1, 0x5, 0xfffffffffffffffd, 0x8}) 14:54:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0xffffffc2, 0x0) [ 951.249178][T31120] FAULT_INJECTION: forcing a failure. [ 951.249178][T31120] name failslab, interval 1, probability 0, space 0, times 0 [ 951.309367][T31120] CPU: 1 PID: 31120 Comm: syz-executor.1 Not tainted 5.1.0-rc5+ #72 [ 951.317412][T31120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.328192][T31120] Call Trace: [ 951.331512][T31120] dump_stack+0x172/0x1f0 [ 951.335871][T31120] should_fail.cold+0xa/0x15 [ 951.340492][T31120] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 951.346322][T31120] ? ___might_sleep+0x163/0x280 [ 951.351196][T31120] __should_failslab+0x121/0x190 [ 951.356145][T31120] should_failslab+0x9/0x14 [ 951.356163][T31120] kmem_cache_alloc+0x2b2/0x6f0 [ 951.356182][T31120] ? pfkey_broadcast+0x3b3/0x660 [ 951.356209][T31120] skb_clone+0x150/0x3b0 [ 951.356239][T31120] pfkey_broadcast_one+0xc5/0x380 [ 951.365619][T31120] pfkey_broadcast+0x3f6/0x660 [ 951.365641][T31120] pfkey_sendmsg+0x95d/0xbe0 [ 951.365664][T31120] ? pfkey_send_new_mapping+0x1220/0x1220 [ 951.365686][T31120] sock_sendmsg+0xdd/0x130 [ 951.399317][T31120] ___sys_sendmsg+0x806/0x930 [ 951.404021][T31120] ? copy_msghdr_from_user+0x430/0x430 [ 951.409507][T31120] ? kasan_check_read+0x11/0x20 [ 951.414380][T31120] ? __fget+0x381/0x550 [ 951.418597][T31120] ? ksys_dup3+0x3e0/0x3e0 [ 951.423042][T31120] ? __fget_light+0x1a9/0x230 [ 951.427739][T31120] ? __fdget+0x1b/0x20 [ 951.431814][T31120] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 951.431840][T31120] __sys_sendmsg+0x105/0x1d0 [ 951.431860][T31120] ? __ia32_sys_shutdown+0x80/0x80 [ 951.431872][T31120] ? fput_many+0x12c/0x1a0 [ 951.431907][T31120] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 951.448362][T31120] ? do_syscall_64+0x26/0x610 [ 951.448381][T31120] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.448396][T31120] ? do_syscall_64+0x26/0x610 [ 951.448428][T31120] __x64_sys_sendmsg+0x78/0xb0 [ 951.478470][T31120] do_syscall_64+0x103/0x610 [ 951.483076][T31120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.488975][T31120] RIP: 0033:0x458c29 14:54:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x2}]}, 0x20}}, 0x0) 14:54:02 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)=',*\x00'}, 0x10) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000140)="8fb0c5428470e501da43c77b63b59dc98e5a3d028f234443816700118080bd11017b3586df438d4f8090f309eb89c255ec58afe6f59b5927b2a359beab57729697c37f3dca92333169e8811288064290a4a99c8689b34ae1036cfcf7202a6c93658793a7019185bc441620ca48930388cfd3fb096b9163b8d017fa4c29079b7ba64be32fe807070aef06547ad6426a04ebf14d78b188c306370cfe2a2f18f4ce047363471500f1", 0xa7}, {&(0x7f0000000200)="df2511", 0x3}, {&(0x7f0000000240)="8b15c317213c9554cbe326e9ea7e94a768779146155a0a946f14f5156b4e1ae0c268d91cc094b2498fc38557e5befba20846841002ba52b7519fb68b7f1d55373ca5a98d6c1f6f60d71afad7532828a1955c8c63227a282819f619d7b4306b9b3dcf1470b9fa70cbdc9b72c23dcc24fde543092eaff365c0ef3dddcb4c1e5765309962d7a8c53bb1c526d5c4010f84672360324d96807133cac637fca49fc23847c5a046d44d168b5993036fe759a58c1624c32218e5bafbc219ecc8aee5f2ef9a", 0xc1}, {&(0x7f0000000340)="56da56be854eed37f2701f9d91f5d2e4b3e1788f3c767391746c3534c595d4108b0d2fd6f06bba8df1159b9d7f365545892c75604cff5c26bc05bae3bd4eb69acf84bea6f21328638f46e977f19a657a6f914e80f0677f7de0", 0x59}, {&(0x7f00000003c0)="e15a9b1e72f66df9761e6da9ee9f3f42261152f5b45f5ba0456a5d2cc61767f6ad5fe9c84c925037c12a83b46194d403cfcc35b65cba93c397c6a4e962168c2439810d0da20606e632120abbc925b511d4640feec3616126c2b343cee019f438c8bbd598620f70e9b5e263c85c3293b603439078ee1718a6c6f1", 0x7a}, {&(0x7f0000000440)="ba78e98d9b14cb", 0x7}, {&(0x7f0000000480)="f2a70a9d0998d84751e90c0725b6b94ff0cf200f6624842333e7532652455c283b63c32a6d496bf6f36ad0c5d19de42ad74f7858d8c0b5c50cf541dcc87f0d082a3296341ee9e602ccf745d29fa3be3f99bf727d429434a640471cbddff9d30d79cc48f67c5129991f6b50f6b82b554002bd13de70f693cfb84beca3d10bd34a1f98eab3a8857ca602c5c48a83257a015cffca9843ec58a32b34748a047e786593ad44958d45bae66c6910a7ffc93e93b73ba14f94e027555f1893e456f2f20e5fa7beaf8f67f7bdf49ccbc82368ac9a75fa27277609e406777aae80d08275aaf0ea470b288cdcbbfd7e4cccd853b5c6c2886c", 0xf3}, {&(0x7f0000000580)="b26ad05cadd0fd985d78f0c1c0c87e12305c0e4519ff3746f8510ce8c1e1513904738421fd7dc02027852b8c41e24d3349820877f081d546ab1d1778408e768ca1d1278dcda86e96d996effd243c5ae8451ce86c288f7249f140d3f06a92d9bdac1f4a92988ba7ecb94a982dc2e1659c39c0bc640b3ed5c4b3cecf92b911a5624318335f5daa4c938214c550ab4ad0e0163160ae1dd157b2836286960c7c2815bab06b9899d515905450f1c8ba588a5987f622628ab91330f4d8b2920a6a5293ff9ea3ba20aa768387e585ca6304dfdaca9e46fa7e0d53e74173ffc6263c90b9c3719f4f37ea", 0xe6}, {&(0x7f0000000680)="a5109467d0151549272c88cca4352fde16f05b4774d140f4d2685c6815196aa4ed88ec0b21cf77bab5399c91632db72b210fb666aa2b949e54968f5327a13d4cde841ff37cab77ee1548e831ec4121814e47dfcf10c36627814bc34d89e4e5b694d3f9dc09eba92057d56a1e459686af805ce0280e4414612fa98480f45f9b3ce4e8dd8e742ab104fd085699be42603ba919b83c2906eabf6ca8108b5e8432edee3192bc265a1159368304242f4830bd59633ea9840a85a62226a28ae55165bbae951dcb2a660e1887a7b16b3878d3cfee106446fc", 0xd5}], 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000080)='n\x11#/ap\xb6\xf6\xd7\xa7\\\x1e\xdb(\x146\xef\x8b\xc2d\xfb_\xee\xfb2') getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f0000000900)=""/134, &(0x7f00000009c0)=0x86) preadv(r2, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:02 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfffffffffffffff2}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) [ 951.492921][T31120] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 951.512536][T31120] RSP: 002b:00007fe7337b2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 951.520968][T31120] RAX: ffffffffffffffda RBX: 00007fe7337b2c90 RCX: 0000000000458c29 [ 951.528956][T31120] RDX: 0000000000000000 RSI: 0000000020000040 RDI: 0000000000000003 [ 951.528966][T31120] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 951.528975][T31120] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe7337b36d4 14:54:02 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x17, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0xfffffdef}}, 0x0) [ 951.528984][T31120] R13: 00000000004c64af R14: 00000000004dadf0 R15: 0000000000000004 14:54:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0xffffffe0, 0x0) 14:54:02 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2c, 0x1, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:02 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xff, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000080)=0x7, 0x1) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000180)) preadv(r0, &(0x7f0000001380)=[{&(0x7f00000000c0)=""/148, 0xfffffffffffffd58}], 0x1000000000000130, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:02 executing program 1 (fault-call:1 fault-nth:6): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x2}, 0x0) 14:54:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x4}]}, 0x20}}, 0x0) 14:54:02 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) r0 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x2c0801) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000300)={0x3, &(0x7f00000002c0)=[{0xac, 0x1fd1, 0xfffffffffffffe01, 0x2}, {0x9, 0x101, 0xff, 0x9d}, {0x214, 0x4, 0x6, 0x9}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x60040, 0x0) fcntl$getflags(r1, 0x408) r2 = gettid() r3 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000000c0)="6c50a2", 0x3, r3}, 0x68) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8002, 0x0) r4 = syz_open_procfs(r2, &(0x7f00000001c0)='maps\x00') preadv(r4, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:02 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x2, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x2) 14:54:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x5}, 0x0) 14:54:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:02 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x3f00}]}, 0x20}}, 0x0) 14:54:03 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') 14:54:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x3, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x7}, 0x0) 14:54:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x2, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x34000}]}, 0x20}}, 0x0) 14:54:03 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = fcntl$getown(0xffffffffffffffff, 0x9) sched_rr_get_interval(r0, &(0x7f0000000180)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000140)=[{&(0x7f0000000040)=""/40, 0x28}, {&(0x7f0000000080)=""/144, 0x90}], 0x2, 0x10400003) 14:54:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x3) 14:54:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x5, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x400300}]}, 0x20}}, 0x0) 14:54:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x8}, 0x0) 14:54:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x4) 14:54:03 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) syncfs(r0) 14:54:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x4, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x7, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x1000000}]}, 0x20}}, 0x0) 14:54:03 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) 14:54:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x9}, 0x0) 14:54:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x5) 14:54:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x8, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x2000, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x2000000}]}, 0x20}}, 0x0) 14:54:03 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x9, 0x200c0) setsockopt$inet_mreqsrc(r0, 0x0, 0x2f, &(0x7f0000000080)={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @loopback}, 0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x17}, 0x0) 14:54:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x9, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x3f00, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x4000000}]}, 0x20}}, 0x0) 14:54:03 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000040)=0x76) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x6) 14:54:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x18}, 0x0) 14:54:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x3f000000}]}, 0x20}}, 0x0) 14:54:04 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000180)=0x14) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x80000001}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r1, 0x6}, &(0x7f0000000100)=0x8) 14:54:04 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x17, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x34000, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x7) 14:54:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1a}, 0x0) 14:54:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0xffffff7f}]}, 0x20}}, 0x0) 14:54:04 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:04 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x18, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x400300, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x9) 14:54:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x300}, 0x0) 14:54:04 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000080)={0x0, @broadcast}) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) 14:54:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x40030000000000}]}, 0x20}}, 0x0) 14:54:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x1000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:04 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1a, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:04 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f00000001c0)={0x7}, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) read(r0, &(0x7f00000000c0)=""/170, 0xaa) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0xffffff1f}, 0x0) 14:54:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xa) 14:54:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x2000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:04 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x5d, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:04 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x100000000000000}]}, 0x20}}, 0x0) 14:54:04 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x2}, 0x0) 14:54:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xe) 14:54:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x6e, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x200000000000000}]}, 0x20}}, 0x0) 14:54:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x4000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xf) 14:54:05 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xca}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000040)={0xa, 0x3, 0x0, 0xa7}, 0xa) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x4}, 0x0) 14:54:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x400000000000000}]}, 0x20}}, 0x0) 14:54:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x11) 14:54:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x20000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x300, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:05 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x0, 0x10400003) 14:54:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xfc) 14:54:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x2000}, 0x0) 14:54:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x3f000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x3f00000000000000}]}, 0x20}}, 0x0) 14:54:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0xffffff1f, 0x0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:05 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000140)=0xc) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x8000, 0x0) ioctl$BLKROSET(r1, 0x125d, &(0x7f00000000c0)=0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r2, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000040)='net/ip6_mr_vif\x00') 14:54:05 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x3f00}, 0x0) 14:54:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x12c) 14:54:05 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x8000000000000000}]}, 0x20}}, 0x0) 14:54:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xffffff7f, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x2, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:05 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) syz_open_procfs(r0, &(0x7f0000000080)='net/snmp\x00') socket$bt_hidp(0x1f, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x14c) 14:54:05 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r2 = geteuid() r3 = gettid() sendmsg$nl_generic(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x190000}, 0xc, &(0x7f0000000100)={&(0x7f00000013c0)={0x1704, 0x3f, 0x4, 0x70bd2d, 0x25dfdbfb, {0x1}, [@nested={0x24, 0x64, [@typed={0x4, 0x34}, @typed={0x14, 0x6, @ipv6=@empty}, @typed={0x8, 0x23, @pid=r1}]}, @generic="e3fed41a5de4cde6b44dad8c7e36e3b6eacfe065b5a050990ca67ab37df02f007a82ae9907a070bff03699709c2c3afdc4e68199253a0cc59d3917fc3e514e218fcf7d4c256c8c080c6077fe913bbcfbbcbd061ef71eb2609764be4de9e7802fa28b3ca1861117fe1ad3df6bbbaca7e2d75fa7f79b1fffd7cecd0bb7dbb0dcfe534ed2ab19648765039f0cbdeefed35e705088be92b918945fc016ee1517d2a4394f90bd18a4c6e601844dd61b8ef1929b1199c8acee420cb9fb81926958fb3246f8cb026d024e02ef48726dfddd3b739f055bdda490b6f8e21e9f4d2657c3a43e6f4b146428d45315b0f48ad12c0f49b1376e5dfd", @generic="eec25151a9e8d94121486ce31e2ed39eb34c6a7d425c8d08e9de00ceb90cb08bb3b85c4857d3f2c613327a78fe79233cd2d7ddbdc7c7f25dc0c7496d29f960c57d3a958a1fa0b30b8ac5735f4a82dcd628ca3cdc1d595f7c5e1868102a012a2ae104edcab8fb93fc762e8a502e14cedb0c9338bf214ec2d2906ed40e924244140719e5893d0bc7fde2e9507cd9ff85024477bed0bf16d7da728a65e88f5a9bac1e382949b2fe969bdd58d63db2cce625b668", @typed={0xb0, 0x65, @binary="5fa8419c886d4cdbee0bdecd89b98407b033441d1e458cd169318f4feea20b3b45d6412eea5d3018bcf3903808a8c8c4151f22c1fcfd6bcb119fd22150cf824edec14859a4b4c4bcc4fac725fcbce385a30cf1491445aa4447a3e37271a6ae4e2e1cb5ed7f9afdc9a736a57b64bbc16f221d2efb793741f2619ef6d481310af66f5e2d5007eed7c06c1c8c98995830888c6482f5aebf972bc8b4c87e038563880d9a1b578e53b68a4e437b"}, @nested={0x1050, 0x1b, [@typed={0x8, 0x4, @uid=r2}, @typed={0x44, 0x68, @binary="08dcaf0202344ba08982b677098ce3638376b6e5c5223b5b74fd210d3867a9efd78b551b63a80d9636ba856efa5258e377cd5b652c7d8974b626739e8147"}, @generic="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"]}, @typed={0xc, 0x6d, @u64=0x1}, @typed={0x8, 0xe, @fd=r0}, @nested={0x348, 0x7e, [@generic="b118b5dda74e859cc4574e3b13bbeee1611db451520743fb52f229b346561c3e5df6190e349302d4563a8003fec8bf07aeab1499b54f9bd96b7138d5cdb62d143fcc0718ef47246990401ece09eaaa60ed736befaa22c3ce971237ce90d474d76a1b47a6961bda416b6396871314c5589ea2b4380ff2a648caa23f7937954607faff3ef5d9b9178783d6c9c018bce0d1ba3ba0e8542628ff5d87895d252799b5e22a89e8639c54c5eca140eee1c8c8b2a14b4472b6d58fe193b8d332bd2d6dab968367ab519ff0ae4594d52144900a31b1032095a9785ac43ec8e5a4cc6378165ed685d68b384f9ba4194e1b59a1f6d0f99b66eeb7624e4c", @generic="51df52df342af8299626dfac8cf157d47eabfc46ebbb5bd6407675f3f677ba746a46a66211604580a0dc793ffdb5a794d88a3c5ba189488135cfde282a9f96407c9ba3d282558657690371ff8769114fe0c1eba3ce6e1c3242419def242d1507383173d3110cf9c1b34e1a11dca7b564cc01dfe98ffff1e7408fde66ecc77a381c024a15e4c4413fb88db0fbec4d3b6fd1bf0ccfd82f", @generic="855f8a2cc51b101cfb2c12da4ab91b6c2ca41e432c69ceb08e504c6e7e9cf17a7cc8c200085df5ca333cd96f9156607ae2c5ca3ed41bd386ea58bfecea36ac411ae4b0c94f7a06fd332e6103c1a0b305d9fda5287d4325b261366356306f8f26fe4d70c72824a71c56ec9381682103f063f5838ec6663dd01d95d2f00d25a87b9c845240dd3b088c8d3928e369", @typed={0x8, 0x5a, @pid=r3}, @generic="747ad80569c1925d089d836768d11ecb0b9e65ea22c8077d90957ec9cec99efb189ae70477648a6b7156e354e623f9d990c73ab37b7b501bf41f54342ec14a13bb921563ced068aa231d1d468519001cd392b2bc27477e37e5c252c48fd9daf508298a675e85103d87ec210ea536b01e", @typed={0x8, 0x68, @fd=r0}, @generic="c58ef073b65563375f850327b68ac643889657092d639ee508dff9947812458f706c880e95e013950a1b305fbaeb282b85fb326c339f183a1fba14ff1b3e6288072c01fc03b007a14ad9fbec4580ba58f2c353125c68681388e51e9e34ccac93bac5f2d716469999fafe8b41687375d1f91b8d3398d4b25c4d1c986bdae6897c9e94ed466c96e911db85b5f63a56a265b2a8c4157c1fb8ddecfefe6e7c02cebfd62e59eaba41b919e6"]}, @generic="a8c1f85fc5dbc426d85c4ce33668b7429eb0bd646f4f84bdb26eefe697c15630b47aaf61268cfa8fca0b63a9f2e77ebea78e064ecffbfcbc525267c419dab844a84ae743dd6708b0f378ae65d2282bbb8f2ad779f1bcc5cef630741d1b8ddab699f90f6af7dfa0cc1a6bba30383f6e9227a87106d366fc44d1a79cbbe753f4dd58b952fe1c2067755bd050e55517eb098e521ab6b1e4855f324fb034354bccef4ad559ceb5ac4b44296c7fb7309a256a6be17234d5bb85531aba5e3347c4be8e2f8b2d2775809030ab"]}, 0x1704}, 0x1, 0x0, 0x0, 0x800}, 0x4) preadv(r0, &(0x7f0000000700), 0x0, 0x0) 14:54:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x40030000000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x34000}, 0x0) 14:54:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0xffffff7f00000000}]}, 0x20}}, 0x0) 14:54:06 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x3, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:06 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x1f4) 14:54:06 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfeeb}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x10002, 0x0) preadv(r0, &(0x7f0000000180)=[{&(0x7f00000001c0)=""/122, 0x7a}, {&(0x7f00000000c0)=""/86, 0x56}], 0x2, 0x10400003) 14:54:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x100000000000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:06 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x4, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x2}]}, 0x20}}, 0x0) 14:54:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x400300}, 0x0) 14:54:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x300) 14:54:06 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f00000000c0)) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x800, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:06 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x5, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x1000000}, 0x0) 14:54:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x200000000000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x4}]}, 0x20}}, 0x0) 14:54:06 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_dev$media(&(0x7f0000000cc0)='/dev/media#\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000d00)={0x0, 0x10000000, 0x5, [0x1f, 0x7, 0x3, 0xf3c, 0xfb6]}, &(0x7f0000000d40)=0x12) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000d80)={r1, @in={{0x2, 0x4e22, @remote}}, 0x5, 0x10001, 0x3, 0x4, 0x1}, &(0x7f0000000e40)=0x98) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) recvfrom(r2, &(0x7f0000000080)=""/120, 0x78, 0x2000, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r3, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x3e8) 14:54:06 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000080)=""/64}, {&(0x7f00000000c0)=""/119}, {&(0x7f0000000140)=""/11}, {&(0x7f0000000180)=""/190}, {&(0x7f0000000240)=""/39}], 0x1, 0xe004655) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000300)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x9, &(0x7f0000000340)=""/179) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000700), 0x100000000000023e, 0x0) connect$rds(r1, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 14:54:06 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x2000000}, 0x0) 14:54:06 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x3f00}]}, 0x20}}, 0x0) 14:54:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x400000000000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:06 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x6, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x500) 14:54:06 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x80, 0x0) ioctl$SIOCRSACCEPT(r0, 0x89e3) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x8, @local, 0x2}}, [0x31cc, 0x400, 0x7, 0xc5, 0x3f, 0x81, 0x2, 0x8001, 0x7ff, 0x5, 0x1f, 0x100000000, 0x4, 0x7ab9, 0x6]}, &(0x7f0000000140)=0x100) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000180)={r2, 0x0, 0x100}, &(0x7f00000001c0)=0x8) 14:54:06 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x200, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0x80000001, 0x0, 0x10000, 0x10000}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000100)={r1, 0x5}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r2, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000040)=0x3) 14:54:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x600) 14:54:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x2000000000000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:07 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x34000}]}, 0x20}}, 0x0) 14:54:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x4000000}, 0x0) 14:54:07 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x7, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:07 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') fcntl$setsig(r0, 0xa, 0x13) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x700) 14:54:07 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x6, 0x0, 0x0, 0x100000001}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000080)={r1, 0x80000000}) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) setxattr$security_capability(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v1={0x1000000, [{0x64d, 0x2}]}, 0xc, 0x3) sync_file_range(r0, 0x9, 0x0, 0x2) 14:54:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x3f00000000000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:07 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x400300}]}, 0x20}}, 0x0) 14:54:07 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x300, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x20000000}, 0x0) 14:54:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x900) 14:54:07 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') fdatasync(r0) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x8000000000000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:07 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x1000000}]}, 0x20}}, 0x0) 14:54:07 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x500, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x3f000000}, 0x0) 14:54:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xa00) 14:54:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0xffffff7f00000000, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:07 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000200)=0x0) ptrace$setopts(0x4206, r0, 0x3, 0x40) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f0000000280)='n\xde\x8d4_vif\x00\x00\x00\x00\x00\x00\x00') openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000080)=ANY=[@ANYBLOB="c708000000000000ff01000000000000010000000900000006000000000000008100000000000000a700000000000000090000000000000000000000000000000000000000000000001000000000000000000000000000000900000000000000000000000100000081000000000000000000000000000000000000000000000000200000000000000000000000000000a976ac2700000000020000000000000007000000000000000000000000000000000000000093318421ac47000000800000000000000000000000000000000010000000000000020000000000000008e3000000000000000000000000000000000000000000000b1800000000000000000000000000000004000000000000ff070000000000000700000000000000000000000000000000000000000000000100000000000000000000000000000004000000000000000000010000000000ff010000000000000000000000000000000000000000000008010000000000000000"]) preadv(r2, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:07 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x2000000}]}, 0x20}}, 0x0) 14:54:07 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x600, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:07 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0xffffff7f}, 0x0) 14:54:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xe00) 14:54:07 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ubi_ctrl\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=0x0, &(0x7f0000000100)=0x4) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e20, 0x5, @mcast2, 0x5}}}, 0x84) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r2, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$TCFLSH(r2, 0x540b, 0x9) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video35\x00', 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x1cc, 0x4000) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000080)={0x62, &(0x7f0000000480)="36954a7b628fd05d53b67a274c539bcf282b218fe212c4a33b48418fbb2764c61db5dacc8c5d92e3152a6053dfdd2e35d75d9e1c38a265b3b75c5e15fbe6fd10ebb7abd8bc1c7f35d12d00bdca015ebb9c7ffc92eea48b66a8806cf467c1aedd4b20"}) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f00000003c0)=0x80) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000200)=""/107, 0x6b}, {&(0x7f0000000280)=""/237, 0xed}], 0x2, 0x33) 14:54:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:07 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x4000000}]}, 0x20}}, 0x0) 14:54:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x40030000000000}, 0x0) 14:54:08 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x700, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xf00) 14:54:08 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x62000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x2, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x8}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4001}, 0x8801) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x3f000000}]}, 0x20}}, 0x0) 14:54:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x100000000000000}, 0x0) 14:54:08 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={@mcast1, 0x51, r1}) 14:54:08 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x2000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x1100) 14:54:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0xffffff7f}]}, 0x20}}, 0x0) 14:54:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x200000000000000}, 0x0) 14:54:08 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') ioctl$TIOCCBRK(r0, 0x5428) recvmmsg(r0, &(0x7f0000000480)=[{{&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/196, 0xc4}], 0x2, &(0x7f00000013c0)=""/4096, 0x1000}, 0x9c7}, {{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)=""/175, 0xaf}], 0x1, &(0x7f0000000380)=""/230, 0xe6}, 0x9cd6}], 0x2, 0x0, 0x0) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:08 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x3f00, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x2000) 14:54:08 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/61, 0x3d}, {&(0x7f0000000080)=""/183, 0xb7}], 0x2, 0x10400003) 14:54:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x40030000000000}]}, 0x20}}, 0x0) 14:54:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x400000000000000}, 0x0) 14:54:08 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x4000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:08 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x3, 0x1, &(0x7f0000000040)=""/222, &(0x7f0000000140)=""/215, &(0x7f0000000240)=""/46, 0x1effe}) 14:54:08 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x100000000000000}]}, 0x20}}, 0x0) 14:54:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x2c01) 14:54:08 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x2000000000000000}, 0x0) 14:54:08 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x34000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x3f00) 14:54:09 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0], 0x5, 0x2, 0x3, 0x2}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @aes256, 0x3, "6f6164922f60265e"}) 14:54:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x200000000000000}]}, 0x20}}, 0x0) 14:54:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x3f00000000000000}, 0x0) 14:54:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x400300, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x4c01) 14:54:09 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = dup(0xffffffffffffff9c) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000040)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:09 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000840)=""/148, 0x471}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x8000000000000000}, 0x0) 14:54:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x400000000000000}]}, 0x20}}, 0x0) 14:54:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x1000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:09 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000040)=0x10001) preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x80fe) 14:54:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0xffffff7f00000000}, 0x0) 14:54:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x3f00000000000000}]}, 0x20}}, 0x0) 14:54:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x10000e0, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:09 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) socket$kcm(0x29, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xc0fe) 14:54:09 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) 14:54:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x2000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:09 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x8000000000000000}]}, 0x20}}, 0x0) 14:54:09 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x2}, 0x0) 14:54:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:09 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x2f, &(0x7f00000000c0)='selinux]lo#!/@cgroupmime_type$,vboxnet1selinux\x00'}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000080)='cpuset\x00') preadv(r1, &(0x7f0000000740)=[{&(0x7f0000000700)=""/20, 0x229}], 0x1, 0x10400003) 14:54:09 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40001, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000040), 0x0, 0x0) 14:54:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xe803) 14:54:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x3000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:10 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0xffffff7f00000000}]}, 0x20}}, 0x0) 14:54:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x4}, 0x0) [ 959.153764][T31784] QAT: Invalid ioctl [ 959.167862][T31787] QAT: Invalid ioctl 14:54:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:10 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x4000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:10 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x0, 0x2}]}, 0x20}}, 0x0) 14:54:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xf401) 14:54:10 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x7f) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x11, r0, 0x0) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x2000}, 0x0) 14:54:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:10 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x88003, 0x0) clock_gettime(0x0, &(0x7f0000007340)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000007180)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000100)=""/73, 0x49}], 0x1}, 0x166e}, {{&(0x7f00000001c0)=@rc, 0x80, &(0x7f0000000600)=[{&(0x7f0000000240)=""/170, 0xaa}, {&(0x7f0000000300)=""/166, 0xa6}, {&(0x7f00000003c0)=""/238, 0xee}, {&(0x7f00000004c0)=""/17, 0x11}, {&(0x7f0000000500)=""/225, 0xe1}], 0x5, &(0x7f0000000680)=""/11, 0xb}, 0x5}, {{&(0x7f00000006c0)=@ipx, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000740)=""/96, 0x60}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000900)=""/210, 0xd2}, {&(0x7f0000000a00)=""/235, 0xeb}, {&(0x7f0000000b00)=""/195, 0xc3}, {&(0x7f0000000c00)=""/155, 0x9b}, {&(0x7f0000000cc0)=""/202, 0xca}, {&(0x7f00000023c0)=""/4096, 0x1000}], 0x8, &(0x7f0000000dc0)=""/199, 0xc7}, 0x2}, {{&(0x7f0000000ec0), 0x80, &(0x7f0000001100)=[{&(0x7f0000000f40)}, {&(0x7f0000000f80)=""/89, 0x59}, {&(0x7f0000001000)=""/1, 0x1}, {&(0x7f0000001040)=""/169, 0xa9}], 0x4, &(0x7f0000001140)=""/158, 0x9e}, 0x6}, {{&(0x7f0000001200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f00000037c0)=[{&(0x7f0000001280)=""/254, 0xfe}, {&(0x7f00000033c0)=""/82, 0x52}, {&(0x7f0000003440)=""/76, 0x4c}, {&(0x7f00000034c0)=""/133, 0x85}, {&(0x7f0000003580)=""/208, 0xd0}, {&(0x7f0000003680)=""/222, 0xde}, {&(0x7f0000003780)=""/25, 0x19}], 0x7}, 0x9}, {{0x0, 0x0, &(0x7f0000004a80)=[{&(0x7f0000003840)=""/39, 0x27}, {&(0x7f0000003880)=""/4096, 0x1000}, {&(0x7f0000004880)=""/68, 0x44}, {&(0x7f0000004900)=""/132, 0x84}, {&(0x7f00000049c0)=""/156, 0x9c}], 0x5, &(0x7f0000004b00)}}, {{&(0x7f0000004b40)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000007000)=[{&(0x7f0000004bc0)=""/4096, 0x1000}, {&(0x7f0000005bc0)=""/209, 0xd1}, {&(0x7f0000005cc0)=""/207, 0xcf}, {&(0x7f0000005dc0)=""/37, 0x25}, {&(0x7f0000005e00)=""/4096, 0x1000}, {&(0x7f0000006e00)=""/75, 0x4b}, {&(0x7f0000006e80)=""/169, 0xa9}, {&(0x7f0000006f40)=""/150, 0x96}], 0x8, &(0x7f0000007080)=""/238, 0xee}, 0x50000000000}], 0x7, 0x0, &(0x7f0000007380)={r1, r2+30000000}) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') write(r3, &(0x7f0000000f40), 0x0) preadv(r4, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:10 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x5000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:10 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x0, 0x4}]}, 0x20}}, 0x0) 14:54:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xfc00) 14:54:10 executing program 2: openat$cgroup_procs(0xffffffffffffff9c, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) preadv(r0, &(0x7f0000001380), 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000040)={{0x3c, @remote, 0x4e20, 0x1, 'dh\x00', 0x1, 0x6, 0x4}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x4e21, 0x1, 0x91d, 0x9}}, 0x44) 14:54:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x3f00}, 0x0) 14:54:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:10 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x0, 0x3f00}]}, 0x20}}, 0x0) 14:54:10 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x6000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:10 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') fsync(r0) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) r1 = dup2(r0, r0) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/87, 0x57}, {&(0x7f00000000c0)=""/175, 0xaf}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x4) 14:54:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x34000}, 0x0) 14:54:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xfcff) 14:54:10 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x0, 0x34000}]}, 0x20}}, 0x0) 14:54:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:10 executing program 2: r0 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x800) bind(r0, &(0x7f0000000080)=@ethernet={0x1, @local}, 0x80) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xfe80) 14:54:10 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x7000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:10 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f00000000c0), 0x160, 0x10400003) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) 14:54:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x400300}, 0x0) 14:54:11 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x0, 0x400300}]}, 0x20}}, 0x0) 14:54:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xfec0) 14:54:11 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x4000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000080)={0x60, 0xfffffffffffffff5, 0x2, {{0x3, 0x101, 0x9, 0x8669, 0xfffffffffffffffd, 0x1, 0x1, 0x7}}}, 0x60) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:11 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x20000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:11 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x0, 0x1000000}]}, 0x20}}, 0x0) 14:54:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x1000000}, 0x0) 14:54:11 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0x70, "0985d612eba9ff38c3dfd95b639c141e0f1d7a28c7eaa470438c106bdbf7efa8e11f349279db5249770f4483b0cbfccb669ba3bfdca13aabcb85e26115e7389c9ec9c9957217c5c022fae3c4f43bccf07d92300ebd7d4f45491ff4ea8a343342a4925075fe56bc4c28943c36498aef86"}, &(0x7f0000000100)=0x78) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r1, 0x6, 0x2}, &(0x7f0000000180)=0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='jet8rac\xd8\x1e\xa7\x13') preadv(r2, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:11 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x3f000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xff00) 14:54:11 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x2000000}, 0x0) 14:54:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xff07) 14:54:11 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x0, 0x2000000}]}, 0x20}}, 0x0) 14:54:11 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x40000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:11 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000040)={'veth0\x00', 0x3ff}) 14:54:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xfffc) 14:54:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x4000000}, 0x0) 14:54:11 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x0, 0x4000000}]}, 0x20}}, 0x0) 14:54:11 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x3be, 0x2d) 14:54:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:11 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0xe0000001, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x1fffff) 14:54:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x20000000}, 0x0) 14:54:11 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0x2503, 0x0) connect$llc(r0, &(0x7f00000002c0)={0x1a, 0xf, 0x40000000000000, 0x4, 0x3ff, 0x5, @local}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:12 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0xffffff7f, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x0, 0x3f000000}]}, 0x20}}, 0x0) 14:54:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x3f000000}, 0x0) 14:54:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x1000000) 14:54:12 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x100, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) write$FUSE_ATTR(r0, &(0x7f0000000280)={0x78, 0x0, 0x2, {0x9, 0x4, 0x0, {0x0, 0x7ff, 0x1, 0x102, 0x6, 0x4, 0x10000, 0xfffffffffffffb14, 0x5, 0x2, 0x3, r1, r3, 0x0, 0x1f}}}, 0x78) syz_kvm_setup_cpu$x86(r2, r0, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000001100)=[@text32={0x20, &(0x7f0000001080)="660f3880020f20c035020000000f22c03e660f3066baf80cb81239868fef66bafc0cb013ee66b852008ee8f2af440f20c0350b000000440f22c0c74424000c000000c7442402a0b10000c7442406000000000f01142426ab66b8ec008ec8", 0x5e}], 0x1, 0x2, &(0x7f0000001140), 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000fc0)) r4 = semget$private(0x0, 0x3, 0x100) semtimedop(r4, &(0x7f0000000300)=[{0x2, 0x7, 0x1800}, {0x3, 0x1, 0x1000}, {0x3, 0x6d, 0x1000}, {0x4, 0x3b, 0x800}, {0x7, 0x6}, {0x3, 0x5, 0x1800}, {0x0, 0x7, 0x1000}], 0x7, &(0x7f0000000340)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000001040)={0x1a, &(0x7f0000001000)="eb024074d22fd0bb644f7cbb084b7f799a4b0d863fe534a56027"}) keyctl$set_reqkey_keyring(0xe, 0x5) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') write$P9_RREMOVE(r5, &(0x7f0000000400)={0x7, 0x7b, 0x2}, 0x7) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f00000003c0)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x3}) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f0000000f80)=0x8, 0x4) preadv(r5, &(0x7f0000000700), 0x31f, 0x10400003) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000380)={0x2, 0x0, 0x91, 0x1f, 0x1000}) recvmmsg(r5, &(0x7f0000000f00)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000440)=""/2, 0x2}, {&(0x7f0000000480)=""/96, 0x60}, {&(0x7f0000000500)=""/100, 0x1a}, {&(0x7f0000000580)=""/17, 0x11}, {&(0x7f00000005c0)=""/195, 0xc3}, {&(0x7f00000006c0)=""/94, 0xd3}, {&(0x7f0000000740)=""/212, 0xd4}, {&(0x7f0000000900)=""/148, 0x94}, {&(0x7f00000009c0)=""/8, 0x8}], 0x9}, 0xfffffffffffffffe}, {{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000ac0)=""/88, 0x58}, {&(0x7f0000000b40)=""/169, 0xa9}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000c00)=""/149, 0x95}, {&(0x7f0000000cc0)=""/21, 0x15}, {&(0x7f0000000d00)=""/150, 0x96}], 0x6, &(0x7f0000000e40)=""/145, 0x91}, 0x4}], 0x2, 0x2000, 0x0) 14:54:12 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0xaf6fa4b635, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x0, 0xffffff7f}]}, 0x20}}, 0x0) 14:54:12 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0xffffff7f}, 0x0) 14:54:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x2000000) 14:54:12 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x40030000000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0xa, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:12 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0xc00, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 14:54:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x0, 0x40030000000000}]}, 0x20}}, 0x0) 14:54:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x40030000000000}, 0x0) 14:54:12 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x100000000000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:12 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xffffffffffff8001, 0x90101) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000100)={0x1f, 0x2, 0x4, 0x62f}) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r1, &(0x7f0000000140)=[{&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f0000000040)=""/47, 0x2f}, {&(0x7f0000000080)=""/8, 0x8}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f00000033c0)=""/4096, 0x1000}], 0x5, 0x10400003) 14:54:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x17, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x0, 0x100000000000000}]}, 0x20}}, 0x0) 14:54:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x3000000) 14:54:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x100000000000000}, 0x0) 14:54:12 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x200000000000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:12 executing program 2: r0 = eventfd2(0x80, 0x801) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000840)=""/148, 0x94}], 0xa2, 0x40) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000040)={'irlan0\x00', {0x2, 0x4e22, @rand_addr=0x3}}) preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x2, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x4000000) 14:54:12 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x200000000000000}, 0x0) 14:54:12 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x0, 0x200000000000000}]}, 0x20}}, 0x0) 14:54:13 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x300000000000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x4, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x5000000) 14:54:13 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) 14:54:13 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x0, 0x400000000000000}]}, 0x20}}, 0x0) 14:54:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x400000000000000}, 0x0) 14:54:13 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x400000000000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:13 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x301, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="380000000b0000000000000000000000015752210000000017000000000000006d696d655f747970657573657276626f786e6574312d3600"], 0x38) 14:54:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x2000, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x6000000) 14:54:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x2000000000000000}, 0x0) 14:54:13 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x0, 0x3f00000000000000}]}, 0x20}}, 0x0) 14:54:13 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x500000000000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:13 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40000, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x78) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={0x0, @broadcast, @empty}, &(0x7f0000000200)=0xc) recvfrom$packet(r0, &(0x7f0000000180)=""/13, 0xd, 0x40010021, &(0x7f0000000240)={0x11, 0xd, r1, 0x1, 0x5, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000140)=0x4, 0x4) preadv(0xffffffffffffffff, &(0x7f0000000700), 0x31f, 0x10400003) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000100)=0x7f, 0x4) 14:54:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x7000000) 14:54:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x3f00, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:13 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-monitor\x00', 0x80000, 0x0) preadv(r0, &(0x7f0000000440), 0x100003c0, 0x400) timer_create(0x6, &(0x7f0000000240)={0x0, 0x13, 0x2, @thr={&(0x7f0000000040)="b30335fa6648150d6ebb1d94c0e5f5bb2926f3d44bf69382fc3bec1b32152655527b0fb003041438c10dd2b2ff57c137f62a2f82e0b563fa3b6c243703cfbf127c36708a860ffbda30caba8c5b1075ee732154cd9d33e3991f573b6dc9b6e7c323e5d34905c909981a75e63f4c1eeddab885ccfaaf1a39b0c6cae083c791cb073b87e50466c2e7c3f6c2c8d62a067d2faa055364ed259f64d15213592195feee1164f692044f55f2c7b0175e956f19fe7e40921f511fc23ce99c8e27681cd54049edbcace2c4494e3dc88aee3e5a360bee08c88531", &(0x7f0000000140)="ec18950223db79fb8f07553b89af3bb8d23e5d141d98dfc9b050af984c7ecc111b1a0e5028d2834441bdc37943d4f9cc588e365da18f839e159c72bde481db57bb2b1babe33ba88bb7b8e9a66de7221e30e4da8ba38a0bb16395d450b1fd4519c6263e7acdf8b6aabf3444e97f584e8553403205535f00c06c33c9dd86228a345fb770439dad70af75ad83db69b6d7049a3849dcc1ef39a76f846c1d56f10b9dcf8167b7c19ee072a913b3d6de2c8cecce8fe7eae5640d02080634729dc705e9f037a060e00eb8d147a8f9a9555efa4d93a2d515b7846b9c1d00169715d4d0"}}, &(0x7f0000000280)=0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) timer_gettime(r1, &(0x7f00000002c0)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r2, &(0x7f0000000700), 0x31f, 0x10400003) r3 = semget$private(0x0, 0x4, 0x100) semctl$SEM_STAT(r3, 0x4, 0x12, &(0x7f0000000300)=""/166) 14:54:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x3f00000000000000}, 0x0) 14:54:13 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x0, 0x8000000000000000}]}, 0x20}}, 0x0) 14:54:13 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x600000000000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:13 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000700), 0x31f, 0x10400003) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/123, 0x7b}, {&(0x7f00000000c0)=""/187, 0xbb}, {&(0x7f0000000180)=""/42, 0x2a}], 0x3, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x23) 14:54:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x9000000) 14:54:13 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x0, 0xffffff7f00000000}]}, 0x20}}, 0x0) 14:54:13 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x8000000000000000}, 0x0) 14:54:13 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x700000000000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:13 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0xfa}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_mr_vif\x00') preadv(r0, &(0x7f0000000040), 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="00fb550140f9f07d4b3029926999d66882cfd2fd3987537cf1e8448c237e3470226a2acdaaa233670e83d5d79dd996948b4227c759f3c6eabaa4768a387990bb82000400000000000055f62bf29b7597dc39f71aa5"], 0x55, 0x2) 14:54:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x34000, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xa000000) 14:54:14 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x2000000000000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:14 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0xf}}, 0x0) 14:54:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 14:54:14 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0, 0x0, 0x0, 0x3f00}]}, 0x20}}, 0x0) 14:54:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x400300, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:14 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x35b6a46faf000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:14 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xe000000) 14:54:14 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0xc0}}, 0x0) 14:54:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x2}, 0x0) [ 963.474022][T32260] FAULT_INJECTION: forcing a failure. [ 963.474022][T32260] name failslab, interval 1, probability 0, space 0, times 0 [ 963.516955][T32260] CPU: 1 PID: 32260 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 963.525011][T32260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 963.535073][T32260] Call Trace: [ 963.535104][T32260] dump_stack+0x172/0x1f0 [ 963.535133][T32260] should_fail.cold+0xa/0x15 [ 963.547369][T32260] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 963.553219][T32260] ? ___might_sleep+0x163/0x280 [ 963.558112][T32260] __should_failslab+0x121/0x190 14:54:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x1000000, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 963.563070][T32260] should_failslab+0x9/0x14 [ 963.567592][T32260] __kmalloc+0x2dc/0x740 [ 963.571847][T32260] ? fput_many+0x12c/0x1a0 [ 963.576287][T32260] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 963.582542][T32260] ? strnlen_user+0x1f0/0x280 [ 963.587230][T32260] ? __x64_sys_memfd_create+0x13c/0x470 [ 963.592793][T32260] __x64_sys_memfd_create+0x13c/0x470 [ 963.598181][T32260] ? memfd_fcntl+0x1550/0x1550 [ 963.602955][T32260] ? do_syscall_64+0x26/0x610 [ 963.607640][T32260] ? lockdep_hardirqs_on+0x418/0x5d0 14:54:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xf000000) [ 963.612939][T32260] ? trace_hardirqs_on+0x67/0x230 [ 963.617984][T32260] do_syscall_64+0x103/0x610 [ 963.622599][T32260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 963.628503][T32260] RIP: 0033:0x458c29 [ 963.632403][T32260] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 963.652019][T32260] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 14:54:14 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x3f00000000000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:14 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 963.660436][T32260] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 963.668407][T32260] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 963.668417][T32260] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 963.668427][T32260] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fb0ba3446d4 [ 963.668435][T32260] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:14 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x2000000, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x11000000) [ 963.784634][T32281] FAULT_INJECTION: forcing a failure. [ 963.784634][T32281] name failslab, interval 1, probability 0, space 0, times 0 14:54:14 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x4000000000000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 963.895635][T32281] CPU: 0 PID: 32281 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 963.903664][T32281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 963.903673][T32281] Call Trace: [ 963.903703][T32281] dump_stack+0x172/0x1f0 [ 963.903731][T32281] should_fail.cold+0xa/0x15 [ 963.903755][T32281] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 963.903780][T32281] ? ___might_sleep+0x163/0x280 [ 963.903802][T32281] __should_failslab+0x121/0x190 [ 963.903822][T32281] ? shmem_destroy_callback+0xc0/0xc0 [ 963.903836][T32281] should_failslab+0x9/0x14 [ 963.903853][T32281] kmem_cache_alloc+0x2b2/0x6f0 [ 963.903871][T32281] ? __alloc_fd+0x44d/0x560 [ 963.903900][T32281] ? shmem_destroy_callback+0xc0/0xc0 [ 963.966261][T32281] shmem_alloc_inode+0x1c/0x50 [ 963.971037][T32281] alloc_inode+0x66/0x190 [ 963.975380][T32281] new_inode_pseudo+0x19/0xf0 [ 963.980070][T32281] new_inode+0x1f/0x40 [ 963.980088][T32281] shmem_get_inode+0x84/0x780 [ 963.980113][T32281] __shmem_file_setup.part.0+0x7e/0x2b0 [ 963.980135][T32281] shmem_file_setup+0x66/0x90 [ 963.980158][T32281] __x64_sys_memfd_create+0x2a2/0x470 [ 964.004465][T32281] ? memfd_fcntl+0x1550/0x1550 [ 964.009250][T32281] ? do_syscall_64+0x26/0x610 [ 964.013942][T32281] ? lockdep_hardirqs_on+0x418/0x5d0 [ 964.019246][T32281] ? trace_hardirqs_on+0x67/0x230 [ 964.024286][T32281] do_syscall_64+0x103/0x610 [ 964.028930][T32281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 964.034831][T32281] RIP: 0033:0x458c29 14:54:14 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x0) 14:54:14 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x33fe0}}, 0x0) [ 964.038740][T32281] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 964.058356][T32281] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 964.066773][T32281] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 964.074756][T32281] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 964.082741][T32281] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 14:54:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x20000000) [ 964.090723][T32281] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fb0ba3446d4 [ 964.098704][T32281] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:15 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x4000000, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:15 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x200000e0}}, 0x0) 14:54:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x2000}, 0x0) 14:54:15 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x8000000000000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 964.265066][T32403] FAULT_INJECTION: forcing a failure. [ 964.265066][T32403] name failslab, interval 1, probability 0, space 0, times 0 [ 964.359892][T32403] CPU: 1 PID: 32403 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 964.368028][T32403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 964.378090][T32403] Call Trace: [ 964.381399][T32403] dump_stack+0x172/0x1f0 [ 964.385751][T32403] should_fail.cold+0xa/0x15 [ 964.390361][T32403] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 964.390385][T32403] ? ___might_sleep+0x163/0x280 [ 964.390406][T32403] __should_failslab+0x121/0x190 [ 964.390426][T32403] should_failslab+0x9/0x14 [ 964.401078][T32403] kmem_cache_alloc+0x2b2/0x6f0 [ 964.401095][T32403] ? current_time+0x6b/0x140 [ 964.401111][T32403] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 964.401133][T32403] ? lockdep_hardirqs_on+0x418/0x5d0 [ 964.431084][T32403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 964.437342][T32403] ? timespec64_trunc+0xf0/0x180 [ 964.442298][T32403] __d_alloc+0x2e/0x8c0 [ 964.446466][T32403] d_alloc_pseudo+0x1e/0x30 [ 964.450980][T32403] alloc_file_pseudo+0xe2/0x280 [ 964.455873][T32403] ? alloc_file+0x4d0/0x4d0 [ 964.460396][T32403] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 964.466661][T32403] __shmem_file_setup.part.0+0x108/0x2b0 [ 964.472318][T32403] shmem_file_setup+0x66/0x90 [ 964.477016][T32403] __x64_sys_memfd_create+0x2a2/0x470 [ 964.482404][T32403] ? memfd_fcntl+0x1550/0x1550 [ 964.487201][T32403] ? do_syscall_64+0x26/0x610 [ 964.491913][T32403] ? lockdep_hardirqs_on+0x418/0x5d0 [ 964.497239][T32403] ? trace_hardirqs_on+0x67/0x230 [ 964.502277][T32403] do_syscall_64+0x103/0x610 [ 964.506886][T32403] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 964.512785][T32403] RIP: 0033:0x458c29 [ 964.516695][T32403] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 964.536310][T32403] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 964.544734][T32403] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 964.552714][T32403] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 14:54:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x2c010000) 14:54:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x3f000000) 14:54:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x4c010000) 14:54:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xe8030000) [ 964.560699][T32403] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 964.568680][T32403] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fb0ba3446d4 [ 964.576655][T32403] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:15 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xf4010000) 14:54:15 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x7ffff000}}, 0x0) 14:54:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x3f00}, 0x0) 14:54:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x20000000, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:15 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0xe000000100000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 964.760942][T32438] FAULT_INJECTION: forcing a failure. [ 964.760942][T32438] name failslab, interval 1, probability 0, space 0, times 0 [ 964.814676][T32438] CPU: 0 PID: 32438 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 964.822705][T32438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 964.832769][T32438] Call Trace: [ 964.836084][T32438] dump_stack+0x172/0x1f0 [ 964.840434][T32438] should_fail.cold+0xa/0x15 [ 964.845047][T32438] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 964.850879][T32438] ? ___might_sleep+0x163/0x280 [ 964.855760][T32438] __should_failslab+0x121/0x190 [ 964.860710][T32438] should_failslab+0x9/0x14 [ 964.860729][T32438] kmem_cache_alloc+0x2b2/0x6f0 [ 964.860753][T32438] __alloc_file+0x27/0x300 [ 964.874533][T32438] alloc_empty_file+0x72/0x170 [ 964.879308][T32438] alloc_file+0x5e/0x4d0 [ 964.879329][T32438] alloc_file_pseudo+0x189/0x280 [ 964.879345][T32438] ? alloc_file+0x4d0/0x4d0 [ 964.879367][T32438] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 964.899337][T32438] __shmem_file_setup.part.0+0x108/0x2b0 [ 964.904999][T32438] shmem_file_setup+0x66/0x90 [ 964.909691][T32438] __x64_sys_memfd_create+0x2a2/0x470 14:54:15 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0xfffffdef}}, 0x0) [ 964.915080][T32438] ? memfd_fcntl+0x1550/0x1550 [ 964.919856][T32438] ? do_syscall_64+0x26/0x610 [ 964.924553][T32438] ? lockdep_hardirqs_on+0x418/0x5d0 [ 964.929851][T32438] ? trace_hardirqs_on+0x67/0x230 [ 964.934896][T32438] do_syscall_64+0x103/0x610 [ 964.939513][T32438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 964.945413][T32438] RIP: 0033:0x458c29 [ 964.949319][T32438] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 964.968929][T32438] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 964.977342][T32438] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 964.985339][T32438] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 [ 964.993333][T32438] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 965.001307][T32438] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fb0ba3446d4 14:54:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xfc000000) [ 965.009298][T32438] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:15 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x34000}, 0x0) [ 965.121865][T32455] FAULT_INJECTION: forcing a failure. [ 965.121865][T32455] name failslab, interval 1, probability 0, space 0, times 0 [ 965.141709][T32455] CPU: 0 PID: 32455 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 965.149709][T32455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 965.159772][T32455] Call Trace: [ 965.163080][T32455] dump_stack+0x172/0x1f0 [ 965.167438][T32455] should_fail.cold+0xa/0x15 14:54:16 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x2}, 0x0) 14:54:16 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0xffffff7f00000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 965.172040][T32455] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 965.177862][T32455] ? ___might_sleep+0x163/0x280 [ 965.182731][T32455] __should_failslab+0x121/0x190 [ 965.187686][T32455] should_failslab+0x9/0x14 [ 965.192201][T32455] kmem_cache_alloc+0x2b2/0x6f0 [ 965.197081][T32455] __alloc_file+0x27/0x300 [ 965.201519][T32455] alloc_empty_file+0x72/0x170 [ 965.206301][T32455] alloc_file+0x5e/0x4d0 [ 965.210565][T32455] alloc_file_pseudo+0x189/0x280 [ 965.215525][T32455] ? alloc_file+0x4d0/0x4d0 [ 965.220052][T32455] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 965.226320][T32455] __shmem_file_setup.part.0+0x108/0x2b0 [ 965.231971][T32455] shmem_file_setup+0x66/0x90 [ 965.236661][T32455] __x64_sys_memfd_create+0x2a2/0x470 [ 965.242043][T32455] ? memfd_fcntl+0x1550/0x1550 [ 965.246821][T32455] ? do_syscall_64+0x26/0x610 [ 965.251520][T32455] ? lockdep_hardirqs_on+0x418/0x5d0 [ 965.256824][T32455] ? trace_hardirqs_on+0x67/0x230 [ 965.261870][T32455] do_syscall_64+0x103/0x610 [ 965.266481][T32455] entry_SYSCALL_64_after_hwframe+0x49/0xbe 14:54:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xfcff0000) [ 965.272394][T32455] RIP: 0033:0x458c29 [ 965.276296][T32455] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 965.295906][T32455] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 965.304325][T32455] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 965.312302][T32455] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 14:54:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x3f000000, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 965.320281][T32455] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 965.329723][T32455] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fb0ba3446d4 [ 965.337697][T32455] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xfe800000) 14:54:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xfec00000) 14:54:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 14:54:16 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x8}, 0x0) 14:54:16 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0xffffffff00000000, 0x0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:16 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0xffffff7f, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xfeffffff) [ 965.666393][T32493] FAULT_INJECTION: forcing a failure. [ 965.666393][T32493] name failslab, interval 1, probability 0, space 0, times 0 14:54:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xff000000) [ 965.712153][T32493] CPU: 1 PID: 32493 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 965.720216][T32493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 965.730321][T32493] Call Trace: [ 965.730357][T32493] dump_stack+0x172/0x1f0 [ 965.737963][T32493] should_fail.cold+0xa/0x15 [ 965.737985][T32493] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 965.738019][T32493] ? ___might_sleep+0x163/0x280 [ 965.753240][T32493] __should_failslab+0x121/0x190 [ 965.758192][T32493] should_failslab+0x9/0x14 14:54:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xff070000) [ 965.762710][T32493] kmem_cache_alloc+0x2b2/0x6f0 [ 965.767576][T32493] ? rcu_read_lock_sched_held+0x110/0x130 [ 965.773308][T32493] ? kmem_cache_alloc+0x32e/0x6f0 [ 965.778369][T32493] security_file_alloc+0x39/0x170 [ 965.783424][T32493] __alloc_file+0xac/0x300 [ 965.787855][T32493] alloc_empty_file+0x72/0x170 [ 965.792634][T32493] alloc_file+0x5e/0x4d0 [ 965.796897][T32493] alloc_file_pseudo+0x189/0x280 [ 965.801858][T32493] ? alloc_file+0x4d0/0x4d0 [ 965.806378][T32493] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 14:54:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xffff1f00) [ 965.812646][T32493] __shmem_file_setup.part.0+0x108/0x2b0 [ 965.818317][T32493] shmem_file_setup+0x66/0x90 [ 965.823017][T32493] __x64_sys_memfd_create+0x2a2/0x470 [ 965.828416][T32493] ? memfd_fcntl+0x1550/0x1550 [ 965.833198][T32493] ? do_syscall_64+0x26/0x610 [ 965.837890][T32493] ? lockdep_hardirqs_on+0x418/0x5d0 [ 965.843190][T32493] ? trace_hardirqs_on+0x67/0x230 [ 965.848232][T32493] do_syscall_64+0x103/0x610 [ 965.852841][T32493] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 965.852855][T32493] RIP: 0033:0x458c29 [ 965.852873][T32493] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 965.852889][T32493] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 965.862777][T32493] RAX: ffffffffffffffda RBX: 0000000020000400 RCX: 0000000000458c29 [ 965.862787][T32493] RDX: 0000000020000428 RSI: 0000000000000000 RDI: 00000000004bdb87 14:54:16 executing program 2 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:16 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x2, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 965.862797][T32493] RBP: 000000000073bf00 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 965.862806][T32493] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fb0ba3446d4 [ 965.862815][T32493] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 965.985982][T32510] FAULT_INJECTION: forcing a failure. [ 965.985982][T32510] name failslab, interval 1, probability 0, space 0, times 0 [ 965.999316][T32510] CPU: 0 PID: 32510 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 966.007303][T32510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 966.017377][T32510] Call Trace: [ 966.020691][T32510] dump_stack+0x172/0x1f0 [ 966.025044][T32510] should_fail.cold+0xa/0x15 [ 966.029671][T32510] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 966.035501][T32510] ? is_dynamic_key+0x1c0/0x1c0 [ 966.040383][T32510] __should_failslab+0x121/0x190 [ 966.045337][T32510] should_failslab+0x9/0x14 [ 966.049856][T32510] kmem_cache_alloc+0x47/0x6f0 [ 966.054633][T32510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 966.060916][T32510] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 966.067169][T32510] ? debug_smp_processor_id+0x3c/0x280 [ 966.072641][T32510] xas_alloc+0x2df/0x3d0 [ 966.076895][T32510] xas_create+0x2cd/0x1040 [ 966.081340][T32510] xas_create_range+0x198/0x5d0 14:54:16 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x300}, 0x0) 14:54:16 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) [ 966.086219][T32510] shmem_add_to_page_cache+0x6f3/0x1200 [ 966.091802][T32510] ? shmem_writepage+0xe90/0xe90 [ 966.096774][T32510] shmem_getpage_gfp+0x6db/0x2500 [ 966.101830][T32510] ? shmem_unuse_inode.constprop.0+0xfd0/0xfd0 [ 966.108018][T32510] ? current_time+0x6b/0x140 [ 966.112624][T32510] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 966.118444][T32510] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 966.124702][T32510] ? iov_iter_fault_in_readable+0x22c/0x450 [ 966.130616][T32510] shmem_write_begin+0x105/0x1e0 [ 966.135621][T32510] generic_perform_write+0x231/0x530 [ 966.140931][T32510] ? page_endio+0x780/0x780 [ 966.145446][T32510] ? current_time+0x140/0x140 [ 966.150137][T32510] ? lock_acquire+0x16f/0x3f0 [ 966.154831][T32510] __generic_file_write_iter+0x25e/0x630 [ 966.160475][T32510] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 966.166263][T32510] generic_file_write_iter+0x360/0x610 [ 966.171776][T32510] ? __generic_file_write_iter+0x630/0x630 [ 966.177590][T32510] ? aa_path_link+0x460/0x460 [ 966.182282][T32510] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 966.188532][T32510] ? iov_iter_init+0xee/0x220 [ 966.193309][T32510] new_sync_write+0x4c7/0x760 [ 966.198006][T32510] ? default_llseek+0x2e0/0x2e0 [ 966.202894][T32510] __vfs_write+0xe4/0x110 [ 966.202917][T32510] vfs_write+0x20c/0x580 [ 966.202940][T32510] ksys_pwrite64+0x183/0x1c0 [ 966.202960][T32510] ? __ia32_sys_pread64+0xf0/0xf0 [ 966.202977][T32510] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 966.202998][T32510] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 966.221143][T32510] ? do_syscall_64+0x26/0x610 [ 966.221161][T32510] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 966.221176][T32510] ? do_syscall_64+0x26/0x610 [ 966.221200][T32510] __x64_sys_pwrite64+0x97/0xf0 [ 966.221220][T32510] do_syscall_64+0x103/0x610 [ 966.221252][T32510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 966.221270][T32510] RIP: 0033:0x412c27 [ 966.236826][T32510] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 14:54:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x40030000000000, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xffffff7f) 14:54:17 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x3, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 966.236836][T32510] RSP: 002b:00007fb0ba343a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 966.236851][T32510] RAX: ffffffffffffffda RBX: 0000000020000410 RCX: 0000000000412c27 [ 966.236861][T32510] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 966.236871][T32510] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 966.236880][T32510] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 966.236890][T32510] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:17 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 14:54:17 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0xffffff1f}, 0x0) 14:54:17 executing program 2 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x100000000000000, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:17 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x4, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 966.579125][T32641] FAULT_INJECTION: forcing a failure. [ 966.579125][T32641] name failslab, interval 1, probability 0, space 0, times 0 [ 966.610391][T32641] CPU: 1 PID: 32641 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 966.618391][T32641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 966.628458][T32641] Call Trace: [ 966.631779][T32641] dump_stack+0x172/0x1f0 [ 966.636128][T32641] should_fail.cold+0xa/0x15 [ 966.640712][T32641] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 966.646535][T32641] ? ___might_sleep+0x163/0x280 [ 966.651374][T32641] __should_failslab+0x121/0x190 [ 966.656308][T32641] should_failslab+0x9/0x14 [ 966.660823][T32641] kmem_cache_alloc+0x2b2/0x6f0 [ 966.665697][T32641] ? lock_downgrade+0x880/0x880 [ 966.670556][T32641] getname_flags+0xd6/0x5b0 [ 966.675050][T32641] getname+0x1a/0x20 [ 966.678953][T32641] do_sys_open+0x2c9/0x5d0 [ 966.683407][T32641] ? filp_open+0x80/0x80 [ 966.687675][T32641] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 966.693120][T32641] ? do_syscall_64+0x26/0x610 [ 966.697784][T32641] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 966.703832][T32641] ? do_syscall_64+0x26/0x610 [ 966.708513][T32641] __x64_sys_open+0x7e/0xc0 [ 966.713033][T32641] do_syscall_64+0x103/0x610 [ 966.717786][T32641] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 966.723679][T32641] RIP: 0033:0x412bc1 [ 966.727566][T32641] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 966.747172][T32641] RSP: 002b:00007fb0ba343a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 966.755567][T32641] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412bc1 [ 966.763533][T32641] RDX: 00007fb0ba343b0a RSI: 0000000000000002 RDI: 00007fb0ba343b00 [ 966.771512][T32641] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:54:17 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x2}, 0x0) 14:54:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xfffffffe) 14:54:17 executing program 2 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 966.779487][T32641] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 966.787459][T32641] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:17 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 14:54:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x200000000000000, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:17 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x5, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 966.878061][T32651] FAULT_INJECTION: forcing a failure. [ 966.878061][T32651] name failslab, interval 1, probability 0, space 0, times 0 14:54:17 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x4}, 0x0) 14:54:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x8000000000) [ 967.031861][T32651] CPU: 0 PID: 32651 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 967.039895][T32651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 967.049955][T32651] Call Trace: [ 967.049990][T32651] dump_stack+0x172/0x1f0 [ 967.057597][T32651] should_fail.cold+0xa/0x15 [ 967.057617][T32651] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 967.057638][T32651] ? ___might_sleep+0x163/0x280 [ 967.057660][T32651] __should_failslab+0x121/0x190 [ 967.057679][T32651] should_failslab+0x9/0x14 14:54:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x100000000000000) [ 967.082344][T32651] kmem_cache_alloc+0x2b2/0x6f0 [ 967.087209][T32651] ? lock_downgrade+0x880/0x880 [ 967.092084][T32651] getname_flags+0xd6/0x5b0 [ 967.096598][T32651] getname+0x1a/0x20 [ 967.100520][T32651] do_sys_open+0x2c9/0x5d0 [ 967.104997][T32651] ? filp_open+0x80/0x80 [ 967.109277][T32651] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 967.114744][T32651] ? do_syscall_64+0x26/0x610 [ 967.119439][T32651] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 967.125523][T32651] ? do_syscall_64+0x26/0x610 [ 967.130225][T32651] __x64_sys_open+0x7e/0xc0 [ 967.134754][T32651] do_syscall_64+0x103/0x610 [ 967.139364][T32651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 967.145271][T32651] RIP: 0033:0x412bc1 [ 967.149191][T32651] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 967.168822][T32651] RSP: 002b:00007fb0ba343a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 14:54:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x200000000000000) [ 967.177276][T32651] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412bc1 [ 967.185301][T32651] RDX: 00007fb0ba343b0a RSI: 0000000000000002 RDI: 00007fb0ba343b00 [ 967.193281][T32651] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 967.201261][T32651] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 967.201277][T32651] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x400000000000000, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:18 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 14:54:18 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x3f00}, 0x0) 14:54:18 executing program 2 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:18 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x6, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x300000000000000) [ 967.405421][T32689] FAULT_INJECTION: forcing a failure. [ 967.405421][T32689] name failslab, interval 1, probability 0, space 0, times 0 14:54:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x400000000000000) [ 967.456709][T32689] CPU: 0 PID: 32689 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 967.464733][T32689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 967.474792][T32689] Call Trace: [ 967.478106][T32689] dump_stack+0x172/0x1f0 [ 967.482461][T32689] should_fail.cold+0xa/0x15 [ 967.487069][T32689] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 967.492895][T32689] ? ___might_sleep+0x163/0x280 [ 967.497763][T32689] __should_failslab+0x121/0x190 [ 967.502731][T32689] should_failslab+0x9/0x14 [ 967.507253][T32689] kmem_cache_alloc+0x2b2/0x6f0 [ 967.512139][T32689] ? __save_stack_trace+0x99/0x100 [ 967.517275][T32689] __alloc_file+0x27/0x300 [ 967.521706][T32689] alloc_empty_file+0x72/0x170 [ 967.526484][T32689] path_openat+0xef/0x46e0 [ 967.530921][T32689] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 967.536740][T32689] ? kasan_slab_alloc+0xf/0x20 [ 967.541512][T32689] ? kmem_cache_alloc+0x11a/0x6f0 [ 967.546546][T32689] ? getname_flags+0xd6/0x5b0 [ 967.551243][T32689] ? getname+0x1a/0x20 14:54:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x500000000000000) [ 967.555324][T32689] ? do_sys_open+0x2c9/0x5d0 [ 967.559924][T32689] ? __x64_sys_open+0x7e/0xc0 [ 967.564614][T32689] ? do_syscall_64+0x103/0x610 [ 967.569389][T32689] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 967.575467][T32689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 967.581727][T32689] ? debug_smp_processor_id+0x3c/0x280 [ 967.587206][T32689] ? __lock_acquire+0x548/0x3fb0 [ 967.592169][T32689] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 967.597565][T32689] ? __alloc_fd+0x44d/0x560 [ 967.602095][T32689] do_filp_open+0x1a1/0x280 14:54:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x600000000000000) [ 967.606612][T32689] ? may_open_dev+0x100/0x100 [ 967.611304][T32689] ? lock_downgrade+0x880/0x880 [ 967.616181][T32689] ? kasan_check_read+0x11/0x20 [ 967.621060][T32689] ? do_raw_spin_unlock+0x57/0x270 [ 967.626188][T32689] ? _raw_spin_unlock+0x2d/0x50 [ 967.631063][T32689] ? __alloc_fd+0x44d/0x560 [ 967.635590][T32689] do_sys_open+0x3fe/0x5d0 [ 967.640021][T32689] ? filp_open+0x80/0x80 [ 967.644279][T32689] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 967.649746][T32689] ? do_syscall_64+0x26/0x610 [ 967.654433][T32689] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 967.660498][T32689] ? do_syscall_64+0x26/0x610 [ 967.660527][T32689] __x64_sys_open+0x7e/0xc0 [ 967.669696][T32689] do_syscall_64+0x103/0x610 [ 967.674305][T32689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 967.680221][T32689] RIP: 0033:0x412bc1 [ 967.684143][T32689] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 14:54:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x700000000000000) 14:54:18 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 14:54:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x2000000000000000, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 967.703754][T32689] RSP: 002b:00007fb0ba343a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 967.712176][T32689] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412bc1 [ 967.720153][T32689] RDX: 00007fb0ba343b0a RSI: 0000000000000002 RDI: 00007fb0ba343b00 [ 967.728133][T32689] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 967.736115][T32689] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 967.744124][T32689] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:18 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x34000}, 0x0) 14:54:18 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x7, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:18 executing program 2 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x900000000000000) 14:54:18 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 14:54:18 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x3f00000000000000, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 967.998555][T32722] FAULT_INJECTION: forcing a failure. [ 967.998555][T32722] name failslab, interval 1, probability 0, space 0, times 0 [ 968.014269][T32722] CPU: 1 PID: 32722 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 968.022286][T32722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 968.032349][T32722] Call Trace: [ 968.035667][T32722] dump_stack+0x172/0x1f0 [ 968.040035][T32722] should_fail.cold+0xa/0x15 [ 968.044649][T32722] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 968.050477][T32722] ? ___might_sleep+0x163/0x280 [ 968.055343][T32722] __should_failslab+0x121/0x190 [ 968.060299][T32722] should_failslab+0x9/0x14 [ 968.064827][T32722] kmem_cache_alloc+0x2b2/0x6f0 [ 968.069696][T32722] ? rcu_read_lock_sched_held+0x110/0x130 [ 968.075428][T32722] ? kmem_cache_alloc+0x32e/0x6f0 [ 968.075454][T32722] security_file_alloc+0x39/0x170 [ 968.075474][T32722] __alloc_file+0xac/0x300 [ 968.075491][T32722] alloc_empty_file+0x72/0x170 [ 968.075508][T32722] path_openat+0xef/0x46e0 [ 968.075532][T32722] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 968.085565][T32722] ? kasan_slab_alloc+0xf/0x20 [ 968.085580][T32722] ? kmem_cache_alloc+0x11a/0x6f0 [ 968.085594][T32722] ? getname_flags+0xd6/0x5b0 [ 968.085607][T32722] ? getname+0x1a/0x20 [ 968.085621][T32722] ? do_sys_open+0x2c9/0x5d0 [ 968.085634][T32722] ? __x64_sys_open+0x7e/0xc0 [ 968.085650][T32722] ? do_syscall_64+0x103/0x610 [ 968.085666][T32722] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 968.085688][T32722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 968.149851][T32722] ? debug_smp_processor_id+0x3c/0x280 [ 968.155343][T32722] ? __lock_acquire+0x548/0x3fb0 [ 968.160298][T32722] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 968.165701][T32722] ? __alloc_fd+0x44d/0x560 [ 968.170220][T32722] do_filp_open+0x1a1/0x280 [ 968.174728][T32722] ? may_open_dev+0x100/0x100 [ 968.174750][T32722] ? lock_downgrade+0x880/0x880 [ 968.174773][T32722] ? kasan_check_read+0x11/0x20 [ 968.189141][T32722] ? do_raw_spin_unlock+0x57/0x270 [ 968.194267][T32722] ? _raw_spin_unlock+0x2d/0x50 [ 968.199129][T32722] ? __alloc_fd+0x44d/0x560 [ 968.203661][T32722] do_sys_open+0x3fe/0x5d0 [ 968.208096][T32722] ? filp_open+0x80/0x80 [ 968.212358][T32722] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 968.217831][T32722] ? do_syscall_64+0x26/0x610 [ 968.222521][T32722] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 968.228600][T32722] ? do_syscall_64+0x26/0x610 [ 968.233298][T32722] __x64_sys_open+0x7e/0xc0 [ 968.237820][T32722] do_syscall_64+0x103/0x610 [ 968.242426][T32722] entry_SYSCALL_64_after_hwframe+0x49/0xbe 14:54:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xa00000000000000) 14:54:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xe00000000000000) 14:54:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xf00000000000000) [ 968.248321][T32722] RIP: 0033:0x412bc1 [ 968.252220][T32722] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 968.271831][T32722] RSP: 002b:00007fb0ba343a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 968.271847][T32722] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000412bc1 [ 968.271856][T32722] RDX: 00007fb0ba343b0a RSI: 0000000000000002 RDI: 00007fb0ba343b00 [ 968.271865][T32722] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 968.271873][T32722] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 968.271889][T32722] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:19 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x400300}, 0x0) 14:54:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x1100000000000000) 14:54:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x8000000000000000, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:19 executing program 2 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:19 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x300, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x40030000000000}, 0x0) 14:54:19 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x1000000}, 0x0) 14:54:19 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0xffffff7f00000000, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x2000000000000000) [ 968.548984][T32761] FAULT_INJECTION: forcing a failure. [ 968.548984][T32761] name failslab, interval 1, probability 0, space 0, times 0 [ 968.582410][T32761] CPU: 1 PID: 32761 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 968.590418][T32761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 968.600462][T32761] Call Trace: [ 968.603772][T32761] dump_stack+0x172/0x1f0 [ 968.608107][T32761] should_fail.cold+0xa/0x15 [ 968.612703][T32761] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 968.618517][T32761] ? ___might_sleep+0x163/0x280 [ 968.623394][T32761] __should_failslab+0x121/0x190 [ 968.628348][T32761] ? loop_info64_to_compat+0x6d0/0x6d0 [ 968.633790][T32761] should_failslab+0x9/0x14 [ 968.638280][T32761] kmem_cache_alloc_trace+0x2d1/0x760 [ 968.643648][T32761] ? lockdep_init_map+0x1be/0x6d0 [ 968.648675][T32761] ? loop_info64_to_compat+0x6d0/0x6d0 [ 968.654119][T32761] __kthread_create_on_node+0xf2/0x460 [ 968.659582][T32761] ? lock_acquire+0x16f/0x3f0 [ 968.664260][T32761] ? kthread_parkme+0xb0/0xb0 [ 968.668951][T32761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 968.675192][T32761] ? kasan_check_read+0x11/0x20 [ 968.680062][T32761] ? mutex_trylock+0x1e0/0x1e0 [ 968.684831][T32761] ? loop_info64_to_compat+0x6d0/0x6d0 [ 968.690295][T32761] kthread_create_on_node+0xbb/0xf0 [ 968.695501][T32761] ? __kthread_create_on_node+0x460/0x460 [ 968.701220][T32761] ? lockdep_init_map+0x1be/0x6d0 [ 968.706233][T32761] ? lockdep_init_map+0x1be/0x6d0 [ 968.711256][T32761] lo_ioctl+0xc1b/0x2150 [ 968.715497][T32761] ? lo_rw_aio+0x1120/0x1120 [ 968.720094][T32761] blkdev_ioctl+0x6f2/0x1d10 [ 968.724672][T32761] ? blkpg_ioctl+0xa90/0xa90 [ 968.729248][T32761] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 968.735047][T32761] ? __fget+0x35a/0x550 [ 968.739190][T32761] block_ioctl+0xee/0x130 [ 968.743501][T32761] ? blkdev_fallocate+0x410/0x410 [ 968.748526][T32761] do_vfs_ioctl+0xd6e/0x1390 [ 968.753131][T32761] ? ioctl_preallocate+0x210/0x210 [ 968.758230][T32761] ? __fget+0x381/0x550 [ 968.762377][T32761] ? ksys_dup3+0x3e0/0x3e0 [ 968.766794][T32761] ? do_sys_open+0x31d/0x5d0 [ 968.771380][T32761] ? tomoyo_file_ioctl+0x23/0x30 [ 968.776300][T32761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 968.782540][T32761] ? security_file_ioctl+0x93/0xc0 [ 968.787635][T32761] ksys_ioctl+0xab/0xd0 [ 968.791790][T32761] __x64_sys_ioctl+0x73/0xb0 [ 968.796398][T32761] do_syscall_64+0x103/0x610 [ 968.801024][T32761] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 968.806900][T32761] RIP: 0033:0x458a97 [ 968.810781][T32761] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 968.830374][T32761] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 968.838766][T32761] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 968.846726][T32761] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 968.854677][T32761] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 968.862655][T32761] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 968.870611][T32761] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x2c01000000000000) 14:54:19 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) 14:54:19 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x2000000}, 0x0) 14:54:19 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x500, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:19 executing program 2 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x5, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x3f00000000000000) [ 969.136729][ T323] FAULT_INJECTION: forcing a failure. [ 969.136729][ T323] name failslab, interval 1, probability 0, space 0, times 0 [ 969.149692][ T323] CPU: 1 PID: 323 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 969.157513][ T323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 969.167575][ T323] Call Trace: [ 969.170889][ T323] dump_stack+0x172/0x1f0 [ 969.175234][ T323] should_fail.cold+0xa/0x15 [ 969.179832][ T323] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 969.185636][ T323] ? ___might_sleep+0x163/0x280 [ 969.190477][ T323] __should_failslab+0x121/0x190 [ 969.195445][ T323] should_failslab+0x9/0x14 [ 969.199956][ T323] kmem_cache_alloc+0x2b2/0x6f0 [ 969.204801][ T323] ? __schedule+0x1383/0x1cc0 [ 969.209483][ T323] __kernfs_new_node+0xef/0x690 [ 969.214318][ T323] ? _raw_spin_unlock_irq+0x28/0x90 [ 969.219512][ T323] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 969.225029][ T323] ? kasan_check_read+0x11/0x20 [ 969.229885][ T323] ? _raw_spin_unlock_irq+0x5e/0x90 [ 969.235086][ T323] ? __schedule+0x1383/0x1cc0 [ 969.239755][ T323] ? __lock_acquire+0x548/0x3fb0 [ 969.244691][ T323] kernfs_new_node+0x99/0x130 [ 969.249374][ T323] kernfs_create_dir_ns+0x52/0x160 [ 969.254476][ T323] internal_create_group+0x7f8/0xc40 [ 969.259753][ T323] ? bd_set_size+0x89/0xb0 [ 969.264177][ T323] ? remove_files.isra.0+0x190/0x190 [ 969.269453][ T323] sysfs_create_group+0x20/0x30 [ 969.274288][ T323] lo_ioctl+0x10af/0x2150 [ 969.278606][ T323] ? lo_rw_aio+0x1120/0x1120 [ 969.283181][ T323] blkdev_ioctl+0x6f2/0x1d10 [ 969.287756][ T323] ? blkpg_ioctl+0xa90/0xa90 [ 969.292331][ T323] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 969.298146][ T323] ? __fget+0x35a/0x550 [ 969.302311][ T323] block_ioctl+0xee/0x130 [ 969.306623][ T323] ? blkdev_fallocate+0x410/0x410 [ 969.311644][ T323] do_vfs_ioctl+0xd6e/0x1390 [ 969.316221][ T323] ? ioctl_preallocate+0x210/0x210 [ 969.321317][ T323] ? __fget+0x381/0x550 [ 969.325462][ T323] ? ksys_dup3+0x3e0/0x3e0 [ 969.330568][ T323] ? do_sys_open+0x31d/0x5d0 [ 969.335158][ T323] ? tomoyo_file_ioctl+0x23/0x30 [ 969.341387][ T323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 969.350763][ T323] ? security_file_ioctl+0x93/0xc0 [ 969.355863][ T323] ksys_ioctl+0xab/0xd0 [ 969.360020][ T323] __x64_sys_ioctl+0x73/0xb0 [ 969.364600][ T323] do_syscall_64+0x103/0x610 [ 969.369182][ T323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 969.375088][ T323] RIP: 0033:0x458a97 [ 969.378990][ T323] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 969.398619][ T323] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 969.407036][ T323] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 969.414989][ T323] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 969.422964][ T323] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:54:20 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x600, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 14:54:20 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x4000000}, 0x0) [ 969.430939][ T323] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 969.438902][ T323] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x7, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:20 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x700, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:20 executing program 2 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x4c01000000000000) 14:54:20 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x3f000000}, 0x0) [ 969.690758][ T345] FAULT_INJECTION: forcing a failure. [ 969.690758][ T345] name failslab, interval 1, probability 0, space 0, times 0 [ 969.703679][ T345] CPU: 1 PID: 345 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 969.711503][ T345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 969.721566][ T345] Call Trace: [ 969.724879][ T345] dump_stack+0x172/0x1f0 [ 969.729243][ T345] should_fail.cold+0xa/0x15 [ 969.733857][ T345] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 969.739669][ T345] ? ___might_sleep+0x163/0x280 [ 969.744519][ T345] __should_failslab+0x121/0x190 [ 969.749456][ T345] should_failslab+0x9/0x14 [ 969.753999][ T345] kmem_cache_alloc+0x2b2/0x6f0 [ 969.758853][ T345] ? __schedule+0x1383/0x1cc0 [ 969.763532][ T345] __kernfs_new_node+0xef/0x690 [ 969.768384][ T345] ? _raw_spin_unlock_irq+0x28/0x90 [ 969.773589][ T345] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 969.779053][ T345] ? kasan_check_read+0x11/0x20 [ 969.783889][ T345] ? _raw_spin_unlock_irq+0x5e/0x90 [ 969.789088][ T345] ? __schedule+0x1383/0x1cc0 [ 969.793768][ T345] ? __lock_acquire+0x548/0x3fb0 [ 969.798698][ T345] kernfs_new_node+0x99/0x130 [ 969.803371][ T345] kernfs_create_dir_ns+0x52/0x160 [ 969.808479][ T345] internal_create_group+0x7f8/0xc40 [ 969.813750][ T345] ? bd_set_size+0x89/0xb0 [ 969.818170][ T345] ? remove_files.isra.0+0x190/0x190 [ 969.823464][ T345] sysfs_create_group+0x20/0x30 [ 969.828301][ T345] lo_ioctl+0x10af/0x2150 [ 969.832622][ T345] ? lo_rw_aio+0x1120/0x1120 [ 969.837196][ T345] blkdev_ioctl+0x6f2/0x1d10 [ 969.841783][ T345] ? blkpg_ioctl+0xa90/0xa90 [ 969.846410][ T345] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 969.852226][ T345] ? __fget+0x35a/0x550 [ 969.856375][ T345] block_ioctl+0xee/0x130 [ 969.860685][ T345] ? blkdev_fallocate+0x410/0x410 [ 969.865701][ T345] do_vfs_ioctl+0xd6e/0x1390 [ 969.870281][ T345] ? ioctl_preallocate+0x210/0x210 [ 969.875377][ T345] ? __fget+0x381/0x550 [ 969.879548][ T345] ? ksys_dup3+0x3e0/0x3e0 [ 969.883949][ T345] ? do_sys_open+0x31d/0x5d0 [ 969.888531][ T345] ? tomoyo_file_ioctl+0x23/0x30 [ 969.893456][ T345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 969.899683][ T345] ? security_file_ioctl+0x93/0xc0 [ 969.904797][ T345] ksys_ioctl+0xab/0xd0 [ 969.908948][ T345] __x64_sys_ioctl+0x73/0xb0 [ 969.913532][ T345] do_syscall_64+0x103/0x610 [ 969.918112][ T345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 969.924021][ T345] RIP: 0033:0x458a97 [ 969.927912][ T345] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 969.947505][ T345] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 969.955944][ T345] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 969.963922][ T345] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 969.971894][ T345] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 969.979847][ T345] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 14:54:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x8, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 969.987799][ T345] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:20 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x400000000000000}, 0x0) 14:54:21 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x2000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:21 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0xffffff7f}, 0x0) 14:54:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xe803000000000000) 14:54:21 executing program 2 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x17, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x2000000000000000}, 0x0) [ 970.269295][ T367] FAULT_INJECTION: forcing a failure. [ 970.269295][ T367] name failslab, interval 1, probability 0, space 0, times 0 [ 970.308894][ T367] CPU: 1 PID: 367 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 14:54:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xf401000000000000) [ 970.316746][ T367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 970.326825][ T367] Call Trace: [ 970.330127][ T367] dump_stack+0x172/0x1f0 [ 970.334468][ T367] should_fail.cold+0xa/0x15 [ 970.339049][ T367] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 970.344842][ T367] ? ___might_sleep+0x163/0x280 [ 970.349717][ T367] __should_failslab+0x121/0x190 [ 970.354649][ T367] should_failslab+0x9/0x14 [ 970.359145][ T367] kmem_cache_alloc+0x2b2/0x6f0 [ 970.363997][ T367] ? find_held_lock+0x35/0x130 [ 970.368774][ T367] ? kernfs_activate+0x192/0x1f0 [ 970.373717][ T367] __kernfs_new_node+0xef/0x690 [ 970.378555][ T367] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 970.383998][ T367] ? lock_downgrade+0x880/0x880 [ 970.388853][ T367] ? kasan_check_write+0x14/0x20 [ 970.393777][ T367] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 970.399307][ T367] ? wait_for_completion+0x440/0x440 [ 970.404580][ T367] kernfs_new_node+0x99/0x130 [ 970.409273][ T367] __kernfs_create_file+0x51/0x340 [ 970.414374][ T367] sysfs_add_file_mode_ns+0x222/0x560 [ 970.419729][ T367] internal_create_group+0x35b/0xc40 [ 970.424997][ T367] ? bd_set_size+0x89/0xb0 [ 970.429423][ T367] ? remove_files.isra.0+0x190/0x190 [ 970.434703][ T367] sysfs_create_group+0x20/0x30 [ 970.439544][ T367] lo_ioctl+0x10af/0x2150 [ 970.443860][ T367] ? lo_rw_aio+0x1120/0x1120 [ 970.448452][ T367] blkdev_ioctl+0x6f2/0x1d10 [ 970.453036][ T367] ? blkpg_ioctl+0xa90/0xa90 [ 970.457613][ T367] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 970.463415][ T367] ? __fget+0x35a/0x550 [ 970.467565][ T367] block_ioctl+0xee/0x130 [ 970.471901][ T367] ? blkdev_fallocate+0x410/0x410 [ 970.476940][ T367] do_vfs_ioctl+0xd6e/0x1390 [ 970.481530][ T367] ? ioctl_preallocate+0x210/0x210 [ 970.486631][ T367] ? __fget+0x381/0x550 [ 970.490796][ T367] ? ksys_dup3+0x3e0/0x3e0 [ 970.495197][ T367] ? do_sys_open+0x31d/0x5d0 [ 970.499771][ T367] ? tomoyo_file_ioctl+0x23/0x30 [ 970.504692][ T367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 970.510915][ T367] ? security_file_ioctl+0x93/0xc0 [ 970.516019][ T367] ksys_ioctl+0xab/0xd0 [ 970.520171][ T367] __x64_sys_ioctl+0x73/0xb0 [ 970.524769][ T367] do_syscall_64+0x103/0x610 [ 970.529347][ T367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 970.535221][ T367] RIP: 0033:0x458a97 [ 970.539100][ T367] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 970.558703][ T367] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:54:21 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x3f00, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 970.567103][ T367] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 970.575083][ T367] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 970.583044][ T367] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 970.591018][ T367] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 970.598971][ T367] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:21 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x40030000000000}, 0x0) 14:54:21 executing program 2 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:21 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x4000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:21 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x3f00000000000000}, 0x0) [ 970.795964][ T392] FAULT_INJECTION: forcing a failure. [ 970.795964][ T392] name failslab, interval 1, probability 0, space 0, times 0 [ 970.822398][ T392] CPU: 1 PID: 392 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 970.830224][ T392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 970.840293][ T392] Call Trace: 14:54:21 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x18, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xfc00000000000000) [ 970.843601][ T392] dump_stack+0x172/0x1f0 [ 970.847956][ T392] should_fail.cold+0xa/0x15 [ 970.852558][ T392] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 970.858399][ T392] ? ___might_sleep+0x163/0x280 [ 970.863256][ T392] __should_failslab+0x121/0x190 [ 970.868186][ T392] should_failslab+0x9/0x14 [ 970.872682][ T392] kmem_cache_alloc+0x2b2/0x6f0 [ 970.877526][ T392] ? lock_downgrade+0x880/0x880 [ 970.882376][ T392] ? kasan_check_read+0x11/0x20 [ 970.887216][ T392] __kernfs_new_node+0xef/0x690 [ 970.892046][ T392] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 970.897488][ T392] ? wait_for_completion+0x440/0x440 [ 970.902765][ T392] ? mutex_unlock+0xd/0x10 [ 970.907162][ T392] ? kernfs_activate+0x192/0x1f0 [ 970.912096][ T392] kernfs_new_node+0x99/0x130 [ 970.916770][ T392] __kernfs_create_file+0x51/0x340 [ 970.921900][ T392] sysfs_add_file_mode_ns+0x222/0x560 [ 970.927271][ T392] internal_create_group+0x35b/0xc40 [ 970.932537][ T392] ? bd_set_size+0x89/0xb0 [ 970.936964][ T392] ? remove_files.isra.0+0x190/0x190 [ 970.942241][ T392] sysfs_create_group+0x20/0x30 [ 970.947078][ T392] lo_ioctl+0x10af/0x2150 [ 970.951388][ T392] ? lo_rw_aio+0x1120/0x1120 [ 970.955961][ T392] blkdev_ioctl+0x6f2/0x1d10 [ 970.960532][ T392] ? blkpg_ioctl+0xa90/0xa90 [ 970.965110][ T392] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 970.970917][ T392] ? __fget+0x35a/0x550 [ 970.975060][ T392] block_ioctl+0xee/0x130 [ 970.979369][ T392] ? blkdev_fallocate+0x410/0x410 [ 970.984385][ T392] do_vfs_ioctl+0xd6e/0x1390 [ 970.988957][ T392] ? ioctl_preallocate+0x210/0x210 [ 970.994056][ T392] ? __fget+0x381/0x550 [ 970.998197][ T392] ? ksys_dup3+0x3e0/0x3e0 [ 971.002592][ T392] ? do_sys_open+0x31d/0x5d0 [ 971.007180][ T392] ? tomoyo_file_ioctl+0x23/0x30 [ 971.012097][ T392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 971.018318][ T392] ? security_file_ioctl+0x93/0xc0 [ 971.023413][ T392] ksys_ioctl+0xab/0xd0 [ 971.027569][ T392] __x64_sys_ioctl+0x73/0xb0 [ 971.032140][ T392] do_syscall_64+0x103/0x610 [ 971.036714][ T392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 971.042583][ T392] RIP: 0033:0x458a97 [ 971.046463][ T392] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 971.066047][ T392] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 971.074470][ T392] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 971.082450][ T392] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 971.090428][ T392] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 971.098420][ T392] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 971.106391][ T392] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:22 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x100000000000000}, 0x0) 14:54:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x34000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:22 executing program 2 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:22 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000000000000000}, 0x0) 14:54:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x400300, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:22 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x200000000000000}, 0x0) 14:54:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xfcff000000000000) 14:54:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x1a, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 971.370903][ T415] FAULT_INJECTION: forcing a failure. [ 971.370903][ T415] name failslab, interval 1, probability 0, space 0, times 0 14:54:22 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) [ 971.415820][ T415] CPU: 0 PID: 415 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 971.423671][ T415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 971.433737][ T415] Call Trace: [ 971.437601][ T415] dump_stack+0x172/0x1f0 [ 971.441947][ T415] should_fail.cold+0xa/0x15 [ 971.447518][ T415] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 971.453341][ T415] ? ___might_sleep+0x163/0x280 [ 971.458213][ T415] __should_failslab+0x121/0x190 [ 971.463167][ T415] should_failslab+0x9/0x14 [ 971.467678][ T415] kmem_cache_alloc+0x2b2/0x6f0 [ 971.472531][ T415] ? lock_downgrade+0x880/0x880 [ 971.477366][ T415] ? kasan_check_read+0x11/0x20 [ 971.482243][ T415] __kernfs_new_node+0xef/0x690 [ 971.487095][ T415] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 971.492552][ T415] ? wait_for_completion+0x440/0x440 [ 971.497826][ T415] ? mutex_unlock+0xd/0x10 [ 971.502224][ T415] ? kernfs_activate+0x192/0x1f0 [ 971.507164][ T415] kernfs_new_node+0x99/0x130 [ 971.511840][ T415] __kernfs_create_file+0x51/0x340 [ 971.516936][ T415] sysfs_add_file_mode_ns+0x222/0x560 [ 971.522315][ T415] internal_create_group+0x35b/0xc40 [ 971.527593][ T415] ? bd_set_size+0x89/0xb0 [ 971.532011][ T415] ? remove_files.isra.0+0x190/0x190 [ 971.537297][ T415] sysfs_create_group+0x20/0x30 [ 971.542136][ T415] lo_ioctl+0x10af/0x2150 [ 971.546470][ T415] ? lo_rw_aio+0x1120/0x1120 [ 971.551064][ T415] blkdev_ioctl+0x6f2/0x1d10 [ 971.555642][ T415] ? blkpg_ioctl+0xa90/0xa90 [ 971.560219][ T415] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 971.566056][ T415] ? __fget+0x35a/0x550 [ 971.570234][ T415] block_ioctl+0xee/0x130 [ 971.574562][ T415] ? blkdev_fallocate+0x410/0x410 [ 971.579572][ T415] do_vfs_ioctl+0xd6e/0x1390 [ 971.584163][ T415] ? ioctl_preallocate+0x210/0x210 [ 971.589280][ T415] ? __fget+0x381/0x550 [ 971.593485][ T415] ? ksys_dup3+0x3e0/0x3e0 [ 971.597924][ T415] ? do_sys_open+0x31d/0x5d0 [ 971.602538][ T415] ? tomoyo_file_ioctl+0x23/0x30 [ 971.607476][ T415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 971.613722][ T415] ? security_file_ioctl+0x93/0xc0 [ 971.618818][ T415] ksys_ioctl+0xab/0xd0 [ 971.622958][ T415] __x64_sys_ioctl+0x73/0xb0 [ 971.627549][ T415] do_syscall_64+0x103/0x610 [ 971.632154][ T415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 971.638060][ T415] RIP: 0033:0x458a97 [ 971.641938][ T415] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 971.661538][ T415] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 971.669949][ T415] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 971.677936][ T415] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 971.685897][ T415] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 971.693890][ T415] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 971.701854][ T415] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:22 executing program 2 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x1000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:22 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x2, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:22 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x400000000000000}, 0x0) 14:54:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xfe80000000000000) [ 971.944802][ T441] FAULT_INJECTION: forcing a failure. [ 971.944802][ T441] name failslab, interval 1, probability 0, space 0, times 0 [ 971.970162][ T441] CPU: 1 PID: 441 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 971.978069][ T441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 971.988124][ T441] Call Trace: [ 971.991408][ T441] dump_stack+0x172/0x1f0 [ 971.995726][ T441] should_fail.cold+0xa/0x15 [ 972.000303][ T441] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 972.006117][ T441] ? ___might_sleep+0x163/0x280 [ 972.010967][ T441] __should_failslab+0x121/0x190 [ 972.015905][ T441] should_failslab+0x9/0x14 [ 972.020440][ T441] kmem_cache_alloc+0x2b2/0x6f0 [ 972.025293][ T441] ? lock_downgrade+0x880/0x880 [ 972.030131][ T441] ? kasan_check_read+0x11/0x20 [ 972.034970][ T441] __kernfs_new_node+0xef/0x690 [ 972.039805][ T441] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 972.045269][ T441] ? wait_for_completion+0x440/0x440 [ 972.050586][ T441] ? sfb_enqueue+0x1ed0/0x1f90 [ 972.055358][ T441] ? mutex_unlock+0xd/0x10 [ 972.059770][ T441] ? kernfs_activate+0x192/0x1f0 [ 972.064712][ T441] kernfs_new_node+0x99/0x130 [ 972.069374][ T441] __kernfs_create_file+0x51/0x340 [ 972.074473][ T441] sysfs_add_file_mode_ns+0x222/0x560 [ 972.079831][ T441] internal_create_group+0x35b/0xc40 [ 972.085114][ T441] ? bd_set_size+0x89/0xb0 [ 972.089533][ T441] ? remove_files.isra.0+0x190/0x190 [ 972.094855][ T441] sysfs_create_group+0x20/0x30 [ 972.099716][ T441] lo_ioctl+0x10af/0x2150 [ 972.104063][ T441] ? lo_rw_aio+0x1120/0x1120 [ 972.108642][ T441] blkdev_ioctl+0x6f2/0x1d10 [ 972.113218][ T441] ? blkpg_ioctl+0xa90/0xa90 [ 972.117815][ T441] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 972.123611][ T441] ? __fget+0x35a/0x550 [ 972.127755][ T441] block_ioctl+0xee/0x130 [ 972.132066][ T441] ? blkdev_fallocate+0x410/0x410 [ 972.137079][ T441] do_vfs_ioctl+0xd6e/0x1390 [ 972.141656][ T441] ? ioctl_preallocate+0x210/0x210 [ 972.146756][ T441] ? __fget+0x381/0x550 [ 972.150899][ T441] ? ksys_dup3+0x3e0/0x3e0 [ 972.155316][ T441] ? do_sys_open+0x31d/0x5d0 [ 972.159924][ T441] ? tomoyo_file_ioctl+0x23/0x30 [ 972.164875][ T441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 972.171102][ T441] ? security_file_ioctl+0x93/0xc0 [ 972.176202][ T441] ksys_ioctl+0xab/0xd0 [ 972.180343][ T441] __x64_sys_ioctl+0x73/0xb0 [ 972.184928][ T441] do_syscall_64+0x103/0x610 [ 972.189507][ T441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 972.195412][ T441] RIP: 0033:0x458a97 [ 972.199312][ T441] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 972.218917][ T441] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 972.227310][ T441] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 972.235285][ T441] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 972.243258][ T441] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 972.251233][ T441] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 972.259187][ T441] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xfec0000000000000) 14:54:23 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x10000e0, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:23 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x3f00000000000000}, 0x0) 14:54:23 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:23 executing program 2 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:23 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x2000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x4, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:23 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x8000000000000000}, 0x0) 14:54:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xfeffffff00000000) 14:54:23 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 972.605145][ T472] FAULT_INJECTION: forcing a failure. [ 972.605145][ T472] name failslab, interval 1, probability 0, space 0, times 0 [ 972.638067][ T472] CPU: 0 PID: 472 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 972.645910][ T472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 972.655958][ T472] Call Trace: [ 972.659286][ T472] dump_stack+0x172/0x1f0 [ 972.663638][ T472] should_fail.cold+0xa/0x15 [ 972.668216][ T472] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 972.674055][ T472] ? ___might_sleep+0x163/0x280 [ 972.678922][ T472] __should_failslab+0x121/0x190 [ 972.683856][ T472] should_failslab+0x9/0x14 [ 972.688357][ T472] kmem_cache_alloc+0x2b2/0x6f0 [ 972.693194][ T472] ? lock_downgrade+0x880/0x880 [ 972.698039][ T472] ? kasan_check_read+0x11/0x20 [ 972.702892][ T472] __kernfs_new_node+0xef/0x690 [ 972.707750][ T472] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 972.713196][ T472] ? wait_for_completion+0x440/0x440 [ 972.718488][ T472] ? mutex_unlock+0xd/0x10 [ 972.722905][ T472] ? kernfs_activate+0x192/0x1f0 [ 972.727827][ T472] kernfs_new_node+0x99/0x130 [ 972.732496][ T472] __kernfs_create_file+0x51/0x340 [ 972.737608][ T472] sysfs_add_file_mode_ns+0x222/0x560 [ 972.742984][ T472] internal_create_group+0x35b/0xc40 [ 972.748262][ T472] ? bd_set_size+0x89/0xb0 [ 972.752678][ T472] ? remove_files.isra.0+0x190/0x190 [ 972.757971][ T472] sysfs_create_group+0x20/0x30 [ 972.762819][ T472] lo_ioctl+0x10af/0x2150 [ 972.767134][ T472] ? lo_rw_aio+0x1120/0x1120 [ 972.771715][ T472] blkdev_ioctl+0x6f2/0x1d10 [ 972.776308][ T472] ? blkpg_ioctl+0xa90/0xa90 [ 972.780929][ T472] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 972.786742][ T472] ? __fget+0x35a/0x550 [ 972.790888][ T472] block_ioctl+0xee/0x130 [ 972.795213][ T472] ? blkdev_fallocate+0x410/0x410 [ 972.800245][ T472] do_vfs_ioctl+0xd6e/0x1390 [ 972.804824][ T472] ? ioctl_preallocate+0x210/0x210 [ 972.809920][ T472] ? __fget+0x381/0x550 [ 972.814081][ T472] ? ksys_dup3+0x3e0/0x3e0 [ 972.818536][ T472] ? do_sys_open+0x31d/0x5d0 [ 972.823126][ T472] ? tomoyo_file_ioctl+0x23/0x30 [ 972.828052][ T472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 972.834286][ T472] ? security_file_ioctl+0x93/0xc0 [ 972.839414][ T472] ksys_ioctl+0xab/0xd0 [ 972.843572][ T472] __x64_sys_ioctl+0x73/0xb0 [ 972.848150][ T472] do_syscall_64+0x103/0x610 [ 972.852749][ T472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 972.858636][ T472] RIP: 0033:0x458a97 [ 972.862528][ T472] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 972.882122][ T472] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 972.890532][ T472] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 972.898493][ T472] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 972.906467][ T472] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 972.914427][ T472] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 972.922394][ T472] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:23 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x3000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x2000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xff00000000000000) 14:54:24 executing program 2 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:24 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0xffffff7f00000000}, 0x0) 14:54:24 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x4000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 973.194298][ T501] FAULT_INJECTION: forcing a failure. [ 973.194298][ T501] name failslab, interval 1, probability 0, space 0, times 0 14:54:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xff07000000000000) 14:54:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x3f00, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 973.242750][ T501] CPU: 1 PID: 501 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 973.250607][ T501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 973.260666][ T501] Call Trace: [ 973.263974][ T501] dump_stack+0x172/0x1f0 [ 973.268332][ T501] should_fail.cold+0xa/0x15 [ 973.272942][ T501] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 973.278817][ T501] ? ___might_sleep+0x163/0x280 [ 973.283673][ T501] __should_failslab+0x121/0x190 [ 973.288612][ T501] should_failslab+0x9/0x14 [ 973.293102][ T501] kmem_cache_alloc+0x2b2/0x6f0 [ 973.297938][ T501] ? lock_downgrade+0x880/0x880 [ 973.302784][ T501] ? kasan_check_read+0x11/0x20 [ 973.307639][ T501] __kernfs_new_node+0xef/0x690 [ 973.312474][ T501] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 973.317920][ T501] ? wait_for_completion+0x440/0x440 [ 973.323220][ T501] ? mutex_unlock+0xd/0x10 [ 973.328560][ T501] ? kernfs_activate+0x192/0x1f0 [ 973.333500][ T501] kernfs_new_node+0x99/0x130 [ 973.338169][ T501] __kernfs_create_file+0x51/0x340 [ 973.343268][ T501] sysfs_add_file_mode_ns+0x222/0x560 [ 973.348628][ T501] internal_create_group+0x35b/0xc40 [ 973.353909][ T501] ? bd_set_size+0x89/0xb0 [ 973.358331][ T501] ? remove_files.isra.0+0x190/0x190 [ 973.363614][ T501] sysfs_create_group+0x20/0x30 [ 973.368497][ T501] lo_ioctl+0x10af/0x2150 [ 973.372822][ T501] ? lo_rw_aio+0x1120/0x1120 [ 973.377401][ T501] blkdev_ioctl+0x6f2/0x1d10 [ 973.381976][ T501] ? blkpg_ioctl+0xa90/0xa90 [ 973.386553][ T501] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 973.392349][ T501] ? __fget+0x35a/0x550 [ 973.396491][ T501] block_ioctl+0xee/0x130 [ 973.400815][ T501] ? blkdev_fallocate+0x410/0x410 [ 973.405840][ T501] do_vfs_ioctl+0xd6e/0x1390 [ 973.410417][ T501] ? ioctl_preallocate+0x210/0x210 [ 973.415524][ T501] ? __fget+0x381/0x550 [ 973.419683][ T501] ? ksys_dup3+0x3e0/0x3e0 [ 973.424084][ T501] ? do_sys_open+0x31d/0x5d0 [ 973.428661][ T501] ? tomoyo_file_ioctl+0x23/0x30 [ 973.433599][ T501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 973.439840][ T501] ? security_file_ioctl+0x93/0xc0 [ 973.444938][ T501] ksys_ioctl+0xab/0xd0 [ 973.449080][ T501] __x64_sys_ioctl+0x73/0xb0 [ 973.453656][ T501] do_syscall_64+0x103/0x610 [ 973.458238][ T501] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 973.464111][ T501] RIP: 0033:0x458a97 [ 973.468001][ T501] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 973.487616][ T501] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 973.496015][ T501] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 973.503972][ T501] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 973.511926][ T501] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 973.519901][ T501] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 973.527857][ T501] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:24 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:24 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x2}, 0x0) 14:54:24 executing program 2 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:24 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x5000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x34000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 973.770881][ T527] FAULT_INJECTION: forcing a failure. [ 973.770881][ T527] name failslab, interval 1, probability 0, space 0, times 0 [ 973.784761][ T527] CPU: 0 PID: 527 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 973.792588][ T527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 973.802647][ T527] Call Trace: [ 973.805961][ T527] dump_stack+0x172/0x1f0 [ 973.810309][ T527] should_fail.cold+0xa/0x15 [ 973.814900][ T527] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 973.820708][ T527] ? ___might_sleep+0x163/0x280 [ 973.825570][ T527] __should_failslab+0x121/0x190 [ 973.830492][ T527] should_failslab+0x9/0x14 [ 973.834994][ T527] kmem_cache_alloc+0x2b2/0x6f0 [ 973.839843][ T527] ? lock_downgrade+0x880/0x880 [ 973.844678][ T527] ? kasan_check_read+0x11/0x20 [ 973.849520][ T527] __kernfs_new_node+0xef/0x690 [ 973.854374][ T527] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 973.859844][ T527] ? wait_for_completion+0x440/0x440 [ 973.865135][ T527] ? mutex_unlock+0xd/0x10 [ 973.869538][ T527] ? kernfs_activate+0x192/0x1f0 [ 973.874477][ T527] kernfs_new_node+0x99/0x130 [ 973.879183][ T527] __kernfs_create_file+0x51/0x340 [ 973.884293][ T527] sysfs_add_file_mode_ns+0x222/0x560 [ 973.889652][ T527] internal_create_group+0x35b/0xc40 [ 973.894929][ T527] ? bd_set_size+0x89/0xb0 [ 973.899346][ T527] ? remove_files.isra.0+0x190/0x190 [ 973.904639][ T527] sysfs_create_group+0x20/0x30 [ 973.909497][ T527] lo_ioctl+0x10af/0x2150 [ 973.913839][ T527] ? lo_rw_aio+0x1120/0x1120 [ 973.918530][ T527] blkdev_ioctl+0x6f2/0x1d10 [ 973.923128][ T527] ? blkpg_ioctl+0xa90/0xa90 [ 973.927706][ T527] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 973.933529][ T527] ? __fget+0x35a/0x550 [ 973.937701][ T527] block_ioctl+0xee/0x130 [ 973.942052][ T527] ? blkdev_fallocate+0x410/0x410 [ 973.947080][ T527] do_vfs_ioctl+0xd6e/0x1390 [ 973.951658][ T527] ? ioctl_preallocate+0x210/0x210 [ 973.956764][ T527] ? __fget+0x381/0x550 [ 973.960920][ T527] ? ksys_dup3+0x3e0/0x3e0 [ 973.965319][ T527] ? do_sys_open+0x31d/0x5d0 [ 973.969897][ T527] ? tomoyo_file_ioctl+0x23/0x30 [ 973.974839][ T527] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 973.981099][ T527] ? security_file_ioctl+0x93/0xc0 [ 973.986198][ T527] ksys_ioctl+0xab/0xd0 [ 973.990341][ T527] __x64_sys_ioctl+0x73/0xb0 [ 973.994933][ T527] do_syscall_64+0x103/0x610 [ 973.999529][ T527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 974.005402][ T527] RIP: 0033:0x458a97 [ 974.009280][ T527] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 974.028888][ T527] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 974.037293][ T527] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 974.045262][ T527] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 974.053231][ T527] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 974.061230][ T527] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 14:54:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xffff1f0000000000) [ 974.069185][ T527] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:25 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x4}, 0x0) 14:54:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x6000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xffffff7f00000000) 14:54:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x400300, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:25 executing program 2 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:25 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x3f00}, 0x0) 14:54:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0xffffffff00000000) [ 974.362853][ T555] FAULT_INJECTION: forcing a failure. [ 974.362853][ T555] name failslab, interval 1, probability 0, space 0, times 0 [ 974.386234][ T555] CPU: 1 PID: 555 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 974.394060][ T555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 974.404116][ T555] Call Trace: [ 974.407396][ T555] dump_stack+0x172/0x1f0 [ 974.411715][ T555] should_fail.cold+0xa/0x15 [ 974.416315][ T555] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 974.422109][ T555] ? ___might_sleep+0x163/0x280 [ 974.426972][ T555] __should_failslab+0x121/0x190 [ 974.431894][ T555] should_failslab+0x9/0x14 [ 974.436382][ T555] kmem_cache_alloc_node+0x264/0x710 [ 974.441649][ T555] ? find_held_lock+0x35/0x130 [ 974.446402][ T555] __alloc_skb+0xd5/0x5e0 [ 974.450715][ T555] ? skb_trim+0x190/0x190 [ 974.455031][ T555] ? kasan_check_read+0x11/0x20 [ 974.459868][ T555] alloc_uevent_skb+0x83/0x1e2 [ 974.464633][ T555] kobject_uevent_env+0xa63/0x1030 [ 974.469736][ T555] kobject_uevent+0x20/0x26 [ 974.474228][ T555] lo_ioctl+0x112b/0x2150 [ 974.478544][ T555] ? lo_rw_aio+0x1120/0x1120 [ 974.483124][ T555] blkdev_ioctl+0x6f2/0x1d10 [ 974.487700][ T555] ? blkpg_ioctl+0xa90/0xa90 [ 974.492275][ T555] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 974.498098][ T555] ? __fget+0x35a/0x550 [ 974.502260][ T555] block_ioctl+0xee/0x130 [ 974.506571][ T555] ? blkdev_fallocate+0x410/0x410 [ 974.511580][ T555] do_vfs_ioctl+0xd6e/0x1390 [ 974.516176][ T555] ? ioctl_preallocate+0x210/0x210 [ 974.521296][ T555] ? __fget+0x381/0x550 [ 974.525434][ T555] ? ksys_dup3+0x3e0/0x3e0 [ 974.529836][ T555] ? do_sys_open+0x31d/0x5d0 [ 974.534412][ T555] ? tomoyo_file_ioctl+0x23/0x30 [ 974.539338][ T555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 974.545566][ T555] ? security_file_ioctl+0x93/0xc0 [ 974.550666][ T555] ksys_ioctl+0xab/0xd0 [ 974.554807][ T555] __x64_sys_ioctl+0x73/0xb0 [ 974.559393][ T555] do_syscall_64+0x103/0x610 [ 974.563988][ T555] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 974.569866][ T555] RIP: 0033:0x458a97 [ 974.573743][ T555] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 974.593327][ T555] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 974.601736][ T555] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 974.609870][ T555] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 974.617826][ T555] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 974.625777][ T555] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 974.633729][ T555] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x1000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x7000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0)=0x401, 0x4) 14:54:25 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x34000}, 0x0) 14:54:25 executing program 2 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x20000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:25 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x2000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 974.971131][ T583] FAULT_INJECTION: forcing a failure. [ 974.971131][ T583] name failslab, interval 1, probability 0, space 0, times 0 [ 974.987545][ T583] CPU: 0 PID: 583 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 974.995370][ T583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 975.005431][ T583] Call Trace: [ 975.008734][ T583] dump_stack+0x172/0x1f0 [ 975.013081][ T583] should_fail.cold+0xa/0x15 [ 975.017685][ T583] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 975.023528][ T583] ? ___might_sleep+0x163/0x280 [ 975.028395][ T583] __should_failslab+0x121/0x190 [ 975.033338][ T583] should_failslab+0x9/0x14 [ 975.037860][ T583] kmem_cache_alloc_node_trace+0x270/0x720 [ 975.043674][ T583] __kmalloc_node_track_caller+0x3d/0x70 [ 975.049304][ T583] __kmalloc_reserve.isra.0+0x40/0xf0 [ 975.054659][ T583] __alloc_skb+0x10b/0x5e0 [ 975.059055][ T583] ? skb_trim+0x190/0x190 [ 975.063384][ T583] ? kasan_check_read+0x11/0x20 [ 975.068248][ T583] alloc_uevent_skb+0x83/0x1e2 [ 975.073030][ T583] kobject_uevent_env+0xa63/0x1030 [ 975.078133][ T583] kobject_uevent+0x20/0x26 [ 975.082620][ T583] lo_ioctl+0x112b/0x2150 [ 975.086950][ T583] ? lo_rw_aio+0x1120/0x1120 [ 975.091541][ T583] blkdev_ioctl+0x6f2/0x1d10 [ 975.096113][ T583] ? blkpg_ioctl+0xa90/0xa90 [ 975.100704][ T583] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 975.106536][ T583] ? __fget+0x35a/0x550 [ 975.110694][ T583] block_ioctl+0xee/0x130 [ 975.115003][ T583] ? blkdev_fallocate+0x410/0x410 [ 975.120012][ T583] do_vfs_ioctl+0xd6e/0x1390 [ 975.124604][ T583] ? ioctl_preallocate+0x210/0x210 [ 975.129706][ T583] ? __fget+0x381/0x550 [ 975.133860][ T583] ? ksys_dup3+0x3e0/0x3e0 [ 975.138293][ T583] ? do_sys_open+0x31d/0x5d0 [ 975.142868][ T583] ? tomoyo_file_ioctl+0x23/0x30 [ 975.147802][ T583] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 975.154048][ T583] ? security_file_ioctl+0x93/0xc0 [ 975.159158][ T583] ksys_ioctl+0xab/0xd0 [ 975.163318][ T583] __x64_sys_ioctl+0x73/0xb0 [ 975.167909][ T583] do_syscall_64+0x103/0x610 [ 975.172496][ T583] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 975.178371][ T583] RIP: 0033:0x458a97 [ 975.182243][ T583] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 975.201827][ T583] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 975.210217][ T583] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 14:54:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) r2 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x9c, 0x400) connect$tipc(r2, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x40}, 0x3}}, 0x10) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) r3 = fcntl$dupfd(r0, 0x406, r1) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000140)={'veth0_to_hsr\x00', @local}) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x6685) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r3, 0x89e4) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) 14:54:26 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x400300}, 0x0) [ 975.218187][ T583] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 975.226149][ T583] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 975.234122][ T583] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 975.242085][ T583] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:26 executing program 2 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:26 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x1000000}, 0x0) 14:54:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x3f000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x4000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 975.488594][ T605] FAULT_INJECTION: forcing a failure. [ 975.488594][ T605] name failslab, interval 1, probability 0, space 0, times 0 [ 975.511637][ T605] CPU: 0 PID: 605 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 975.519450][ T605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 975.529502][ T605] Call Trace: [ 975.532788][ T605] dump_stack+0x172/0x1f0 [ 975.537108][ T605] should_fail.cold+0xa/0x15 [ 975.541688][ T605] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 975.547481][ T605] ? ___might_sleep+0x163/0x280 [ 975.552328][ T605] __should_failslab+0x121/0x190 [ 975.557249][ T605] should_failslab+0x9/0x14 [ 975.561757][ T605] kmem_cache_alloc+0x2b2/0x6f0 [ 975.566605][ T605] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 975.572399][ T605] ? lock_downgrade+0x880/0x880 [ 975.577240][ T605] skb_clone+0x150/0x3b0 [ 975.581497][ T605] netlink_broadcast_filtered+0x870/0xb20 [ 975.587220][ T605] netlink_broadcast+0x3a/0x50 [ 975.592017][ T605] kobject_uevent_env+0xa94/0x1030 [ 975.597136][ T605] kobject_uevent+0x20/0x26 [ 975.601627][ T605] lo_ioctl+0x112b/0x2150 [ 975.605945][ T605] ? lo_rw_aio+0x1120/0x1120 [ 975.610527][ T605] blkdev_ioctl+0x6f2/0x1d10 [ 975.615101][ T605] ? blkpg_ioctl+0xa90/0xa90 [ 975.619676][ T605] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 975.625476][ T605] ? __fget+0x35a/0x550 [ 975.629641][ T605] block_ioctl+0xee/0x130 [ 975.633989][ T605] ? blkdev_fallocate+0x410/0x410 [ 975.639041][ T605] do_vfs_ioctl+0xd6e/0x1390 [ 975.643624][ T605] ? ioctl_preallocate+0x210/0x210 [ 975.648738][ T605] ? __fget+0x381/0x550 [ 975.652895][ T605] ? ksys_dup3+0x3e0/0x3e0 [ 975.657306][ T605] ? do_sys_open+0x31d/0x5d0 [ 975.661881][ T605] ? tomoyo_file_ioctl+0x23/0x30 [ 975.666808][ T605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 975.673054][ T605] ? security_file_ioctl+0x93/0xc0 [ 975.678156][ T605] ksys_ioctl+0xab/0xd0 [ 975.682302][ T605] __x64_sys_ioctl+0x73/0xb0 [ 975.686899][ T605] do_syscall_64+0x103/0x610 [ 975.691482][ T605] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 975.697356][ T605] RIP: 0033:0x458a97 [ 975.701235][ T605] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 975.720826][ T605] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 975.729242][ T605] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 975.737478][ T605] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 975.745430][ T605] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 975.753390][ T605] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 975.761357][ T605] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x40000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:26 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x2000000}, 0x0) 14:54:26 executing program 2 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:26 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc06001c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r4 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r4, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:26 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 975.977287][ T621] FAULT_INJECTION: forcing a failure. [ 975.977287][ T621] name failslab, interval 1, probability 0, space 0, times 0 [ 976.007537][ T621] CPU: 0 PID: 621 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 976.015391][ T621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 976.025449][ T621] Call Trace: [ 976.028758][ T621] dump_stack+0x172/0x1f0 [ 976.033109][ T621] should_fail.cold+0xa/0x15 [ 976.037717][ T621] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 976.043545][ T621] ? ___might_sleep+0x163/0x280 [ 976.048414][ T621] __should_failslab+0x121/0x190 [ 976.053357][ T621] should_failslab+0x9/0x14 [ 976.057872][ T621] kmem_cache_alloc_node+0x264/0x710 [ 976.063176][ T621] ? find_held_lock+0x35/0x130 [ 976.067959][ T621] __alloc_skb+0xd5/0x5e0 [ 976.072298][ T621] ? skb_trim+0x190/0x190 [ 976.076641][ T621] ? kasan_check_read+0x11/0x20 [ 976.081517][ T621] alloc_uevent_skb+0x83/0x1e2 [ 976.086307][ T621] kobject_uevent_env+0xa63/0x1030 [ 976.091436][ T621] kobject_uevent+0x20/0x26 [ 976.095948][ T621] lo_ioctl+0x112b/0x2150 [ 976.100298][ T621] ? lo_rw_aio+0x1120/0x1120 [ 976.104902][ T621] blkdev_ioctl+0x6f2/0x1d10 [ 976.109527][ T621] ? blkpg_ioctl+0xa90/0xa90 [ 976.114132][ T621] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 976.119993][ T621] ? __fget+0x35a/0x550 [ 976.124185][ T621] block_ioctl+0xee/0x130 [ 976.128530][ T621] ? blkdev_fallocate+0x410/0x410 [ 976.133586][ T621] do_vfs_ioctl+0xd6e/0x1390 [ 976.138195][ T621] ? ioctl_preallocate+0x210/0x210 [ 976.143322][ T621] ? __fget+0x381/0x550 [ 976.147493][ T621] ? ksys_dup3+0x3e0/0x3e0 [ 976.151926][ T621] ? do_sys_open+0x31d/0x5d0 [ 976.156542][ T621] ? tomoyo_file_ioctl+0x23/0x30 [ 976.161490][ T621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 976.167748][ T621] ? security_file_ioctl+0x93/0xc0 [ 976.172870][ T621] ksys_ioctl+0xab/0xd0 [ 976.177051][ T621] __x64_sys_ioctl+0x73/0xb0 [ 976.181651][ T621] do_syscall_64+0x103/0x610 [ 976.186264][ T621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 976.192162][ T621] RIP: 0033:0x458a97 [ 976.196078][ T621] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 976.215701][ T621] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 14:54:27 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x4000000}, 0x0) 14:54:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x20000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 976.224121][ T621] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 976.232098][ T621] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 976.240161][ T621] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 976.248136][ T621] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 976.256111][ T621] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:27 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x40, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) modify_ldt$write2(0x11, &(0x7f0000000100)={0x1, 0xffffffffffffffff, 0x1000, 0x6, 0x7fffffff, 0xfffffffffffffffc, 0x3, 0x1, 0x6, 0x2}, 0x10) 14:54:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0xe0000001, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:27 executing program 2 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:27 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x3f000000}, 0x0) 14:54:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x3f000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x202000, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14, 0x80000) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6, @random="3c1667d81796"}, 0x10) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) socket(0x3, 0x6, 0x5) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0xffffff7f, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 976.511083][ T640] FAULT_INJECTION: forcing a failure. [ 976.511083][ T640] name failslab, interval 1, probability 0, space 0, times 0 [ 976.526956][ T640] CPU: 1 PID: 640 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 976.534783][ T640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 976.544845][ T640] Call Trace: [ 976.548157][ T640] dump_stack+0x172/0x1f0 [ 976.552513][ T640] should_fail.cold+0xa/0x15 [ 976.557129][ T640] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 976.562954][ T640] ? ___might_sleep+0x163/0x280 [ 976.567822][ T640] __should_failslab+0x121/0x190 [ 976.572777][ T640] should_failslab+0x9/0x14 [ 976.577289][ T640] kmem_cache_alloc+0x2b2/0x6f0 [ 976.582154][ T640] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 976.587970][ T640] ? lock_downgrade+0x880/0x880 [ 976.592851][ T640] skb_clone+0x150/0x3b0 [ 976.597119][ T640] netlink_broadcast_filtered+0x870/0xb20 [ 976.602860][ T640] netlink_broadcast+0x3a/0x50 [ 976.607640][ T640] kobject_uevent_env+0xa94/0x1030 [ 976.612774][ T640] kobject_uevent+0x20/0x26 [ 976.617292][ T640] lo_ioctl+0x112b/0x2150 [ 976.621639][ T640] ? lo_rw_aio+0x1120/0x1120 [ 976.626266][ T640] blkdev_ioctl+0x6f2/0x1d10 [ 976.630920][ T640] ? blkpg_ioctl+0xa90/0xa90 [ 976.635519][ T640] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 976.641354][ T640] ? __fget+0x35a/0x550 [ 976.645526][ T640] block_ioctl+0xee/0x130 [ 976.649868][ T640] ? blkdev_fallocate+0x410/0x410 [ 976.654908][ T640] do_vfs_ioctl+0xd6e/0x1390 [ 976.659512][ T640] ? ioctl_preallocate+0x210/0x210 [ 976.664638][ T640] ? __fget+0x381/0x550 [ 976.668811][ T640] ? ksys_dup3+0x3e0/0x3e0 [ 976.673239][ T640] ? do_sys_open+0x31d/0x5d0 [ 976.677846][ T640] ? tomoyo_file_ioctl+0x23/0x30 [ 976.682795][ T640] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 976.689051][ T640] ? security_file_ioctl+0x93/0xc0 [ 976.694180][ T640] ksys_ioctl+0xab/0xd0 [ 976.698352][ T640] __x64_sys_ioctl+0x73/0xb0 [ 976.702957][ T640] do_syscall_64+0x103/0x610 [ 976.707561][ T640] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 976.713460][ T640] RIP: 0033:0x458a97 [ 976.717360][ T640] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 976.736969][ T640] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 976.745447][ T640] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458a97 [ 976.753423][ T640] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 976.761398][ T640] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 976.769375][ T640] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 976.777386][ T640] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") getxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000001680)=ANY=[@ANYBLOB="73797374656d2e247d002a87c52413e1f71007b724ae3fa2b3dc2fed94edb109ece02c242c3f340c55f07df7ef33fd9f0c5eed9c6eda3bf59689d3b33260e6870977aa6e9738c04c8463afaf30ebda20fb14fc5ab834fb29538e8b90e03574f38bafa2c31c4dfcd7df7f72cf02d073eefc6fe48f149efed8f6145180084f0802c0cc97d7d4647e8c69665b97ed87a0e6d2e412951cb61ef3155b02ea0c42aeda4fcacc0ee34cbb924fea3710a4117949af95255e6f47f786c3b9a25a99939ccb99501bed0a44920b523b55a7da4877a95b52fb8ff395ad9bd48572dd9ba3da06e0c384cdeb10464b5ccaf7f6c26f36727eb1e6b1d644219d0ad48e97bbf6f37f1d9afebf474e8ca0d814ef10cd0dade45478f81a5ee27db74665f966ba9e6661793371508b239c816d322b22301f32d39537350f388b43e98a1bdaa92ca0852995d3067fd00460bf097d5e102eaa7d8badd75f5095440a039610"], &(0x7f0000000300)=""/214, 0xd6) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x20) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000180)={r2, 0x101}, &(0x7f0000000200)=0x8) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000000540)=""/4096, &(0x7f0000000240)=0x1000) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000001540)) sendmmsg$inet_sctp(r3, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:27 executing program 2 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x400) getsockname$netrom(r1, &(0x7f0000000140)={{0x3, @netrom}, [@netrom, @null, @bcast, @remote, @bcast, @netrom, @null, @bcast]}, &(0x7f0000000200)=0x48) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000100)=0x1) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x5d5}, 0x8) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000240)={0xb7c, 0x6, 0x20, {}, 0x8, 0x1}) sendmmsg$inet_sctp(r2, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f00000002c0)={'ip6erspan0\x00', {0x2, 0x4e23, @broadcast}}) 14:54:27 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0xffffff7f}, 0x0) 14:54:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0xffffff7f, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0xaf6fa4b635, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:27 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 976.949686][ T656] FAULT_INJECTION: forcing a failure. [ 976.949686][ T656] name failslab, interval 1, probability 0, space 0, times 0 [ 977.009990][ T656] CPU: 1 PID: 656 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 977.017862][ T656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.027923][ T656] Call Trace: [ 977.031232][ T656] dump_stack+0x172/0x1f0 [ 977.035584][ T656] should_fail.cold+0xa/0x15 [ 977.040190][ T656] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 977.046018][ T656] ? ___might_sleep+0x163/0x280 [ 977.050890][ T656] __should_failslab+0x121/0x190 [ 977.055843][ T656] should_failslab+0x9/0x14 [ 977.060356][ T656] kmem_cache_alloc+0x2b2/0x6f0 [ 977.065212][ T656] ? __fget+0x381/0x550 [ 977.069389][ T656] getname_flags+0xd6/0x5b0 [ 977.073915][ T656] do_mkdirat+0xa0/0x2a0 [ 977.078173][ T656] ? __ia32_sys_mknod+0xb0/0xb0 [ 977.083041][ T656] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 977.088510][ T656] ? do_syscall_64+0x26/0x610 [ 977.093194][ T656] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 977.099270][ T656] ? do_syscall_64+0x26/0x610 [ 977.103958][ T656] ? lockdep_hardirqs_on+0x418/0x5d0 [ 977.109280][ T656] __x64_sys_mkdir+0x5c/0x80 [ 977.113887][ T656] do_syscall_64+0x103/0x610 [ 977.118491][ T656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 977.124392][ T656] RIP: 0033:0x458047 [ 977.128297][ T656] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 977.147906][ T656] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 977.156325][ T656] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 977.164307][ T656] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 977.172287][ T656] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 977.180268][ T656] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 977.188244][ T656] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:28 executing program 2 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x40030000000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:28 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x40030000000000}, 0x0) 14:54:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x40030000000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff, 0x0, 0x0, 0x92}, 0x8) keyctl$session_to_parent(0x12) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 977.364575][ T675] FAULT_INJECTION: forcing a failure. [ 977.364575][ T675] name failslab, interval 1, probability 0, space 0, times 0 [ 977.385526][ T675] CPU: 0 PID: 675 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 977.393354][ T675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.393395][ T675] Call Trace: [ 977.393428][ T675] dump_stack+0x172/0x1f0 [ 977.393458][ T675] should_fail.cold+0xa/0x15 [ 977.393481][ T675] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 977.393508][ T675] ? ___might_sleep+0x163/0x280 [ 977.426416][ T675] __should_failslab+0x121/0x190 [ 977.431365][ T675] should_failslab+0x9/0x14 [ 977.431383][ T675] kmem_cache_alloc+0x2b2/0x6f0 [ 977.431397][ T675] ? __d_lookup+0x433/0x760 [ 977.431411][ T675] ? lookup_dcache+0x23/0x140 [ 977.431424][ T675] ? d_lookup+0xf9/0x260 [ 977.431442][ T675] ? lockdep_hardirqs_on+0x418/0x5d0 [ 977.431461][ T675] __d_alloc+0x2e/0x8c0 [ 977.465006][ T675] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 977.470740][ T675] d_alloc+0x4d/0x2b0 [ 977.474759][ T675] __lookup_hash+0xcd/0x190 [ 977.479280][ T675] filename_create+0x1a7/0x4f0 [ 977.484062][ T675] ? kern_path_mountpoint+0x40/0x40 [ 977.489272][ T675] ? strncpy_from_user+0x2a8/0x380 [ 977.494402][ T675] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 977.500651][ T675] ? getname_flags+0x277/0x5b0 [ 977.505436][ T675] do_mkdirat+0xb5/0x2a0 [ 977.509691][ T675] ? __ia32_sys_mknod+0xb0/0xb0 [ 977.514562][ T675] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 977.520043][ T675] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 977.526122][ T675] ? do_syscall_64+0x26/0x610 [ 977.530809][ T675] ? lockdep_hardirqs_on+0x418/0x5d0 [ 977.536110][ T675] __x64_sys_mkdir+0x5c/0x80 [ 977.540736][ T675] do_syscall_64+0x103/0x610 [ 977.545344][ T675] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 977.551250][ T675] RIP: 0033:0x458047 14:54:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r2, &(0x7f0000000280)={0xa0, 0x0, 0x6, {{0x2, 0x0, 0x1, 0x4a, 0x5, 0x3, {0x6, 0x0, 0x6, 0x100000001, 0x7, 0xffffffffffffffff, 0x3, 0x4, 0x3be1, 0x4, 0xffffffffffff7829, r3, r4, 0xfffc000000000000, 0xfffffffffffffffc}}, {0x0, 0x1}}}, 0xa0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000540)=ANY=[@ANYBLOB="e6696c746572000000000000000000010000000000000c0000000000070000000401000085040000000000007802000078020000b8030000b8030006b803000004000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="00000000000000000000002000000000000000000000000000000000f300"/64], @ANYBLOB="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"], 0x4f0) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 977.555155][ T675] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 977.574763][ T675] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 977.574779][ T675] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 977.574788][ T675] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 977.574798][ T675] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 977.574807][ T675] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 14:54:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x100000000000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) r2 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x400, 0x400) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f0000000100)={0x6, 0x85b}) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 977.574816][ T675] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:28 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x100000000000000}, 0x0) 14:54:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x100000000000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:28 executing program 2 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:28 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:28 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x200000000000000}, 0x0) 14:54:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 977.844000][ T800] FAULT_INJECTION: forcing a failure. [ 977.844000][ T800] name failslab, interval 1, probability 0, space 0, times 0 [ 977.881460][ T800] CPU: 0 PID: 800 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 977.889314][ T800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.899374][ T800] Call Trace: [ 977.902685][ T800] dump_stack+0x172/0x1f0 [ 977.907035][ T800] should_fail.cold+0xa/0x15 [ 977.911641][ T800] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 977.917467][ T800] ? ___might_sleep+0x163/0x280 [ 977.922331][ T800] __should_failslab+0x121/0x190 [ 977.927301][ T800] ? ratelimit_state_init+0xb0/0xb0 [ 977.932504][ T800] should_failslab+0x9/0x14 [ 977.937032][ T800] kmem_cache_alloc+0x2b2/0x6f0 [ 977.941891][ T800] ? __save_stack_trace+0x99/0x100 [ 977.947019][ T800] ? ratelimit_state_init+0xb0/0xb0 [ 977.952226][ T800] ext4_alloc_inode+0x1f/0x640 [ 977.957008][ T800] ? ratelimit_state_init+0xb0/0xb0 [ 977.962212][ T800] alloc_inode+0x66/0x190 [ 977.966559][ T800] new_inode_pseudo+0x19/0xf0 [ 977.971254][ T800] new_inode+0x1f/0x40 [ 977.975336][ T800] __ext4_new_inode+0x37e/0x5450 [ 977.980288][ T800] ? debug_check_no_obj_freed+0x200/0x464 [ 977.986025][ T800] ? ext4_free_inode+0x1450/0x1450 [ 977.991155][ T800] ? dqget+0x10d0/0x10d0 [ 977.995422][ T800] ext4_mkdir+0x3d5/0xdf0 [ 977.999770][ T800] ? ext4_init_dot_dotdot+0x520/0x520 [ 978.005176][ T800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 978.011420][ T800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 978.017677][ T800] ? security_inode_permission+0xd5/0x110 [ 978.023410][ T800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 978.029665][ T800] ? security_inode_mkdir+0xee/0x120 [ 978.034966][ T800] vfs_mkdir+0x433/0x690 [ 978.039223][ T800] do_mkdirat+0x234/0x2a0 [ 978.043591][ T800] ? __ia32_sys_mknod+0xb0/0xb0 [ 978.048450][ T800] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 978.053919][ T800] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 978.059996][ T800] ? do_syscall_64+0x26/0x610 [ 978.064684][ T800] ? lockdep_hardirqs_on+0x418/0x5d0 [ 978.069978][ T800] __x64_sys_mkdir+0x5c/0x80 [ 978.074576][ T800] do_syscall_64+0x103/0x610 [ 978.079176][ T800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 978.085076][ T800] RIP: 0033:0x458047 14:54:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r1, r1, 0x80000) setsockopt$inet6_dccp_int(r2, 0x21, 0x15, &(0x7f00000003c0)=0xf72, 0x4) execveat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000100)='\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='security*vmnet1\':\x00', &(0x7f0000000200)='+$trustedmime_type-user\\keyring*@wlan0ppp0eth0\x00', &(0x7f0000000240)='^vmnet0!(,eth0^\'securitymime_type\x00'], &(0x7f0000000380)=[&(0x7f00000002c0)='\x00', &(0x7f0000000300)='eth1self-em0\xb3$\x00', &(0x7f0000000340)='vboxnet1\x00'], 0x1400) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x7ff, 0x3, 0xfffffffffffffffe, 0xb}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 978.088977][ T800] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 978.108580][ T800] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 978.108597][ T800] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 978.108606][ T800] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 978.108614][ T800] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 14:54:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x200000000000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x200000000000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xfffffffffffeffff, 0x561200) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x1, @default, @rose={'rose', 0x0}, 0x9, 'syz0\x00', @default, 0x8000, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) [ 978.108623][ T800] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 978.108632][ T800] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:29 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x400000000000000}, 0x0) 14:54:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x40, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x4, {0xa, 0x4e24, 0x0, @rand_addr="1a3db08b7a38bd6ea3654c454e791b04", 0x9}, r2}}, 0x38) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r3, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x400000000000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:29 executing program 2 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x300000000000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:29 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x3f00000000000000}, 0x0) [ 978.453308][ T830] FAULT_INJECTION: forcing a failure. [ 978.453308][ T830] name failslab, interval 1, probability 0, space 0, times 0 [ 978.467725][ T830] CPU: 0 PID: 830 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 978.475543][ T830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 978.485606][ T830] Call Trace: [ 978.488918][ T830] dump_stack+0x172/0x1f0 [ 978.493269][ T830] should_fail.cold+0xa/0x15 [ 978.497900][ T830] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 978.503722][ T830] ? ___might_sleep+0x163/0x280 [ 978.508586][ T830] __should_failslab+0x121/0x190 [ 978.513539][ T830] ? ratelimit_state_init+0xb0/0xb0 [ 978.518742][ T830] should_failslab+0x9/0x14 [ 978.523249][ T830] kmem_cache_alloc+0x2b2/0x6f0 [ 978.528111][ T830] ? __save_stack_trace+0x99/0x100 [ 978.533231][ T830] ? ratelimit_state_init+0xb0/0xb0 [ 978.538438][ T830] ext4_alloc_inode+0x1f/0x640 [ 978.543208][ T830] ? ratelimit_state_init+0xb0/0xb0 [ 978.548425][ T830] alloc_inode+0x66/0x190 [ 978.552759][ T830] new_inode_pseudo+0x19/0xf0 [ 978.557444][ T830] new_inode+0x1f/0x40 [ 978.561524][ T830] __ext4_new_inode+0x37e/0x5450 [ 978.566480][ T830] ? debug_check_no_obj_freed+0x200/0x464 [ 978.572221][ T830] ? ext4_free_inode+0x1450/0x1450 [ 978.577349][ T830] ? dqget+0x10d0/0x10d0 [ 978.581613][ T830] ext4_mkdir+0x3d5/0xdf0 [ 978.585964][ T830] ? ext4_init_dot_dotdot+0x520/0x520 [ 978.591344][ T830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 978.597589][ T830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 978.603840][ T830] ? security_inode_permission+0xd5/0x110 [ 978.609565][ T830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 978.615810][ T830] ? security_inode_mkdir+0xee/0x120 [ 978.621101][ T830] vfs_mkdir+0x433/0x690 [ 978.625374][ T830] do_mkdirat+0x234/0x2a0 [ 978.629711][ T830] ? __ia32_sys_mknod+0xb0/0xb0 [ 978.634595][ T830] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 978.640067][ T830] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 978.646141][ T830] ? do_syscall_64+0x26/0x610 [ 978.650849][ T830] ? lockdep_hardirqs_on+0x418/0x5d0 [ 978.656144][ T830] __x64_sys_mkdir+0x5c/0x80 [ 978.660742][ T830] do_syscall_64+0x103/0x610 [ 978.665349][ T830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 978.671243][ T830] RIP: 0033:0x458047 [ 978.675149][ T830] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 978.694753][ T830] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 14:54:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x1, 0x400) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0xa) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x40000000000007ff, 0x0, 0x0, 0x20000000}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x48040, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x4, 0x998}, &(0x7f0000000440)=0x90) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000480)={r5, 0x5}, 0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x9, 0x7}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000300)={r6, 0x6, 0x8, [0x28d, 0xabc, 0x1bb, 0x0, 0x7, 0x0, 0x80, 0xcbd2]}, &(0x7f0000000340)=0x18) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x800, 0x0, 0x1000}, 0x4) ioctl$DRM_IOCTL_RES_CTX(r4, 0xc0106426, &(0x7f0000000200)={0x6, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}]}) sendmmsg$inet_sctp(r2, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 978.703168][ T830] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 978.711148][ T830] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 978.719131][ T830] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 978.727100][ T830] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 978.735183][ T830] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:29 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x8000000000000000}, 0x0) 14:54:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x2000000000000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x400000000000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:29 executing program 2 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:29 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 979.020612][ T846] FAULT_INJECTION: forcing a failure. [ 979.020612][ T846] name failslab, interval 1, probability 0, space 0, times 0 [ 979.033874][ T846] CPU: 1 PID: 846 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 979.041697][ T846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.051761][ T846] Call Trace: [ 979.055066][ T846] dump_stack+0x172/0x1f0 [ 979.059418][ T846] should_fail.cold+0xa/0x15 [ 979.064028][ T846] ? fault_create_debugfs_attr+0x1e0/0x1e0 14:54:30 executing program 4: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="d6000000a7be9148294446961998f49d0a467e945592375304d2a16a3d531754ebf6e04a03a3f2501ec1173b1df0c8d58f41122ace05cc74d46c976f4c1bfad0943566d04496244de36a8d331e33d8e61912875927d4f7cefa03c1d90e47247914b975649e02d772283287aa0a5fdedf59f3844dcf513a497096a49ca3b92d39a0f988302ced6e1bf66dc3e8b8aa18b0b73bd40e0aa4df65b1219477fdc29d6ee327f780912403f034b090a61464e32d41ab82c0086e35a1865d583760efa96eafcf578ae677564cd251b8e79e55f9b76e4218a4eacee0305ffc63a8f13ab5bdd870047d"], &(0x7f00000000c0)=0xde) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r1, 0x80000001, 0x8}, 0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008915, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000100)={0x7ff, 0x20000000, 0x3, 0x201}, 0x4) sendmmsg$inet_sctp(r3, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 979.069847][ T846] ? __es_tree_search.isra.0+0x1bf/0x230 [ 979.075494][ T846] __should_failslab+0x121/0x190 [ 979.080453][ T846] should_failslab+0x9/0x14 [ 979.084971][ T846] kmem_cache_alloc+0x47/0x6f0 [ 979.089751][ T846] ? ext4_es_scan+0x730/0x730 [ 979.094437][ T846] ? do_raw_write_lock+0x124/0x290 [ 979.099562][ T846] __es_insert_extent+0x2cc/0xf20 [ 979.104599][ T846] ext4_es_insert_extent+0x2b7/0xa40 [ 979.109900][ T846] ? ext4_es_scan_clu+0x50/0x50 [ 979.114773][ T846] ? rcu_read_lock_sched_held+0x110/0x130 14:54:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x800, 0x0) ioctl$NBD_CLEAR_QUE(r2, 0xab05) [ 979.120500][ T846] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 979.126752][ T846] ? ext4_es_find_extent_range+0xff/0x600 [ 979.132493][ T846] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 979.138056][ T846] ? ext4_rereserve_cluster+0x240/0x240 [ 979.143626][ T846] ? ext4_find_extent+0x76e/0x9d0 [ 979.148683][ T846] ? ext4_find_extent+0x6a6/0x9d0 [ 979.153725][ T846] ext4_ext_map_blocks+0x20a8/0x5260 [ 979.159065][ T846] ? ext4_ext_release+0x10/0x10 [ 979.163935][ T846] ? perf_trace_lock+0x510/0x510 [ 979.168893][ T846] ? lock_acquire+0x16f/0x3f0 [ 979.173588][ T846] ? ext4_map_blocks+0x3fd/0x18e0 [ 979.178644][ T846] ext4_map_blocks+0xec7/0x18e0 [ 979.183515][ T846] ? ext4_issue_zeroout+0x190/0x190 [ 979.188738][ T846] ? kasan_check_write+0x14/0x20 [ 979.193782][ T846] ? __brelse+0x95/0xb0 [ 979.197973][ T846] ext4_getblk+0xc4/0x510 [ 979.202339][ T846] ? ext4_iomap_begin+0xfe0/0xfe0 [ 979.207378][ T846] ? ext4_free_inode+0x1450/0x1450 [ 979.212500][ T846] ext4_bread+0x8f/0x230 [ 979.216763][ T846] ? ext4_getblk+0x510/0x510 14:54:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x109000, 0x0) write$capi20_data(r2, &(0x7f0000000100)={{0x10, 0x5, 0x87, 0x83, 0x5, 0x8}, 0x5e, "81874d342ce4fd0b2d97df2243459f43e9c87bcb193b061cf9fad14bdc38e9140a756d399c0881d473a91508042a276320ce9db488331a861d08212b0f28421ef22d66513f5d860dd19337059aa244a86c59cb177f1b6a691e3c0cba3bdb"}, 0x70) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000180)) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 979.221383][ T846] ext4_append+0x155/0x370 [ 979.225839][ T846] ext4_mkdir+0x61b/0xdf0 [ 979.230195][ T846] ? ext4_init_dot_dotdot+0x520/0x520 [ 979.235581][ T846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 979.241835][ T846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 979.248196][ T846] ? security_inode_permission+0xd5/0x110 [ 979.253936][ T846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 979.260204][ T846] ? security_inode_mkdir+0xee/0x120 [ 979.265507][ T846] vfs_mkdir+0x433/0x690 14:54:30 executing program 4: r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x5, 0x10000) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000100)={0x8001, 0x5, 0xfffffffffffffff7, 0x20, 0xf9c, 0x6, 0x2}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 979.269773][ T846] do_mkdirat+0x234/0x2a0 [ 979.274124][ T846] ? __ia32_sys_mknod+0xb0/0xb0 [ 979.278983][ T846] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 979.284461][ T846] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 979.290564][ T846] ? do_syscall_64+0x26/0x610 [ 979.295258][ T846] ? lockdep_hardirqs_on+0x418/0x5d0 [ 979.300595][ T846] __x64_sys_mkdir+0x5c/0x80 [ 979.305202][ T846] do_syscall_64+0x103/0x610 [ 979.309812][ T846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 979.315713][ T846] RIP: 0033:0x458047 14:54:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x9}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000200)={r2, 0x4}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000100)=0x4) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 979.319619][ T846] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 979.340191][ T846] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 979.351823][ T846] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 979.359801][ T846] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 14:54:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0x3, @loopback, 0xfffffffffffffeff}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)={r2, 0x48, "e25b864c2462a8a86b770f0cc50436aa4448b26dfd98b989f47b4a5d96d34c7ed10dc044c3ab565e0cdda89b3e3ee8629a936c11074c97568d580327fec3d4fd8be5aee7e8521b5e"}, &(0x7f0000000280)=0x50) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 979.367785][ T846] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 979.375765][ T846] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 979.383744][ T846] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x500000000000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:30 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 14:54:30 executing program 2 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x3f00000000000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 979.574277][ T866] FAULT_INJECTION: forcing a failure. [ 979.574277][ T866] name failslab, interval 1, probability 0, space 0, times 0 [ 979.594207][ T866] CPU: 0 PID: 866 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 979.602041][ T866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.612100][ T866] Call Trace: [ 979.615421][ T866] dump_stack+0x172/0x1f0 [ 979.619790][ T866] should_fail.cold+0xa/0x15 [ 979.624396][ T866] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 979.624418][ T866] ? ___might_sleep+0x163/0x280 [ 979.624439][ T866] __should_failslab+0x121/0x190 [ 979.624456][ T866] should_failslab+0x9/0x14 [ 979.624471][ T866] __kmalloc+0x2dc/0x740 [ 979.624487][ T866] ? mark_held_locks+0xa4/0xf0 [ 979.624509][ T866] ? kfree+0x173/0x230 [ 979.648837][ T866] ? ext4_find_extent+0x76e/0x9d0 [ 979.648861][ T866] ext4_find_extent+0x76e/0x9d0 [ 979.648886][ T866] ext4_ext_map_blocks+0x1c3/0x5260 [ 979.648912][ T866] ? ext4_ext_release+0x10/0x10 [ 979.648926][ T866] ? perf_trace_lock+0x510/0x510 [ 979.648955][ T866] ? lock_acquire+0x16f/0x3f0 [ 979.687258][ T866] ? ext4_map_blocks+0x85d/0x18e0 [ 979.692338][ T866] ext4_map_blocks+0x8c5/0x18e0 [ 979.697215][ T866] ? ext4_issue_zeroout+0x190/0x190 [ 979.702448][ T866] ? kasan_check_write+0x14/0x20 [ 979.707395][ T866] ? __brelse+0x95/0xb0 [ 979.711572][ T866] ext4_getblk+0xc4/0x510 [ 979.715925][ T866] ? ext4_iomap_begin+0xfe0/0xfe0 [ 979.720968][ T866] ? ext4_free_inode+0x1450/0x1450 [ 979.726102][ T866] ext4_bread+0x8f/0x230 [ 979.730370][ T866] ? ext4_getblk+0x510/0x510 [ 979.734989][ T866] ext4_append+0x155/0x370 [ 979.739423][ T866] ext4_mkdir+0x61b/0xdf0 [ 979.743778][ T866] ? ext4_init_dot_dotdot+0x520/0x520 [ 979.749193][ T866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 979.755454][ T866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 979.761705][ T866] ? security_inode_permission+0xd5/0x110 [ 979.767441][ T866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 979.773694][ T866] ? security_inode_mkdir+0xee/0x120 [ 979.778996][ T866] vfs_mkdir+0x433/0x690 [ 979.783267][ T866] do_mkdirat+0x234/0x2a0 [ 979.787610][ T866] ? __ia32_sys_mknod+0xb0/0xb0 [ 979.792470][ T866] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 979.797939][ T866] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 979.804015][ T866] ? do_syscall_64+0x26/0x610 [ 979.808707][ T866] ? lockdep_hardirqs_on+0x418/0x5d0 [ 979.814007][ T866] __x64_sys_mkdir+0x5c/0x80 [ 979.818613][ T866] do_syscall_64+0x103/0x610 [ 979.823250][ T866] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 979.829152][ T866] RIP: 0033:0x458047 [ 979.833054][ T866] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 979.852668][ T866] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 979.861099][ T866] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 14:54:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x600000000000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x8000000000000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 979.869081][ T866] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 979.877065][ T866] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 979.885049][ T866] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 979.893028][ T866] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000200)=ANY=[@ANYBLOB='broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000f7ff00000000000000000000000000000500000000000000"], @ANYBLOB='\x00'/120], 0xe8) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) 14:54:30 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x2}, 0x0) 14:54:30 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x700000000000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0xffffff7f00000000, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:31 executing program 2 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x4000, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f0000000100)={0x0, 0x7}) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:31 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x0) 14:54:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x2, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x2000000000000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 980.384949][ T1005] FAULT_INJECTION: forcing a failure. [ 980.384949][ T1005] name failslab, interval 1, probability 0, space 0, times 0 [ 980.401237][ T1005] CPU: 1 PID: 1005 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 980.409166][ T1005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 980.419226][ T1005] Call Trace: [ 980.419252][ T1005] dump_stack+0x172/0x1f0 [ 980.419276][ T1005] should_fail.cold+0xa/0x15 [ 980.419297][ T1005] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 980.426914][ T1005] ? ___might_sleep+0x163/0x280 [ 980.426936][ T1005] __should_failslab+0x121/0x190 [ 980.426956][ T1005] should_failslab+0x9/0x14 [ 980.451618][ T1005] kmem_cache_alloc+0x2b2/0x6f0 [ 980.456478][ T1005] ? rcu_read_lock_sched_held+0x110/0x130 [ 980.462204][ T1005] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 980.468459][ T1005] ? __mark_inode_dirty+0x241/0x1290 [ 980.473760][ T1005] ext4_mb_new_blocks+0x5a0/0x3c20 [ 980.478878][ T1005] ? mark_held_locks+0xa4/0xf0 [ 980.483657][ T1005] ? ext4_find_extent+0x76e/0x9d0 [ 980.488705][ T1005] ext4_ext_map_blocks+0x2b8a/0x5260 [ 980.494008][ T1005] ? ext4_ext_release+0x10/0x10 [ 980.498968][ T1005] ? perf_trace_lock+0x510/0x510 [ 980.503948][ T1005] ext4_map_blocks+0x8c5/0x18e0 [ 980.508817][ T1005] ? ext4_issue_zeroout+0x190/0x190 [ 980.514041][ T1005] ? kasan_check_write+0x14/0x20 [ 980.518985][ T1005] ? __brelse+0x95/0xb0 [ 980.523182][ T1005] ext4_getblk+0xc4/0x510 [ 980.527529][ T1005] ? ext4_iomap_begin+0xfe0/0xfe0 [ 980.532569][ T1005] ? ext4_free_inode+0x1450/0x1450 [ 980.537698][ T1005] ext4_bread+0x8f/0x230 [ 980.541949][ T1005] ? ext4_getblk+0x510/0x510 [ 980.546562][ T1005] ext4_append+0x155/0x370 [ 980.551003][ T1005] ext4_mkdir+0x61b/0xdf0 [ 980.555361][ T1005] ? ext4_init_dot_dotdot+0x520/0x520 [ 980.560744][ T1005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 980.566988][ T1005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 980.573276][ T1005] ? security_inode_permission+0xd5/0x110 [ 980.579002][ T1005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 980.585265][ T1005] ? security_inode_mkdir+0xee/0x120 [ 980.590565][ T1005] vfs_mkdir+0x433/0x690 [ 980.594821][ T1005] do_mkdirat+0x234/0x2a0 [ 980.599162][ T1005] ? __ia32_sys_mknod+0xb0/0xb0 [ 980.604032][ T1005] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 980.609501][ T1005] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 980.615577][ T1005] ? do_syscall_64+0x26/0x610 [ 980.620272][ T1005] ? lockdep_hardirqs_on+0x418/0x5d0 [ 980.625568][ T1005] __x64_sys_mkdir+0x5c/0x80 [ 980.630168][ T1005] do_syscall_64+0x103/0x610 [ 980.634781][ T1005] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 980.640680][ T1005] RIP: 0033:0x458047 [ 980.644581][ T1005] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 980.664194][ T1005] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 980.672621][ T1005] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 14:54:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x2) [ 980.680596][ T1005] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 980.688590][ T1005] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 980.696567][ T1005] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 980.704545][ T1005] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x35b6a46faf000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:31 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x3f00}, 0x0) 14:54:31 executing program 2 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x4, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:31 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x200000, 0x0) mq_timedreceive(r0, &(0x7f00000003c0)=""/133, 0x85, 0x8000, &(0x7f0000000480)={0x0, 0x989680}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket$inet_sctp(0x2, 0x100004, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x4) sendmmsg$inet_sctp(r2, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x2, 0x0) ioctl$SG_GET_COMMAND_Q(r3, 0x2270, &(0x7f0000000340)) sendmmsg$inet_sctp(r2, &(0x7f00000002c0)=[{&(0x7f00000000c0)=@in6={0xa, 0x4e23, 0x2cd2401d, @dev={0xfe, 0x80, [], 0x12}, 0x4}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000100)="8462d946c5e7a93d116b4c45c371317c7aba612871d7d759dcb0d8e88acbe927fdfc23b189750e0ced192e8832aa43a768250b08e3fb3739545042c337e2b3b7c7fd370254fee62a04521f7fdc34f7f554d3cb0539a441cfd8ed3d2f20ed3b8228b0dd66aca81724469128", 0x6b}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000000200)="a09f5217910064b23e6d41699f82c740cad3be8420d16188b7c1d9e08d0a3894e8019f2325aff0f2af736a0257ca4dfc56445513f81ad565cec2a39ee3be16c9d46ade057fb5b62764e22a4baa1ef113c7618c8c594e1079903a09947b0b058c7a384ec6246992f79dba840a3bce2a96222e5cec67f803f5f06d1b8eb84e419bfc151c02aeb6d0ffa855915fcaee999e13ef9b5b6eea482acd15b2710a246f4cbb6fb420a1a2811cc92a3d8e", 0xac}], 0x3, 0x0, 0x0, 0x4810}], 0x1, 0x800) 14:54:31 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x4) [ 980.896367][ T1016] FAULT_INJECTION: forcing a failure. [ 980.896367][ T1016] name failslab, interval 1, probability 0, space 0, times 0 [ 980.909622][ T1016] CPU: 0 PID: 1016 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 980.917539][ T1016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 980.927602][ T1016] Call Trace: [ 980.930915][ T1016] dump_stack+0x172/0x1f0 [ 980.935266][ T1016] should_fail.cold+0xa/0x15 [ 980.939871][ T1016] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 980.945687][ T1016] ? __sigqueue_alloc+0x173/0x4d0 [ 980.950721][ T1016] ? find_held_lock+0x35/0x130 [ 980.955503][ T1016] __should_failslab+0x121/0x190 [ 980.960456][ T1016] should_failslab+0x9/0x14 [ 980.964973][ T1016] kmem_cache_alloc+0x47/0x6f0 [ 980.969751][ T1016] ? kasan_check_read+0x11/0x20 [ 980.974616][ T1016] __sigqueue_alloc+0x268/0x4d0 [ 980.979482][ T1016] __send_signal+0xda3/0x1590 [ 980.984183][ T1016] send_signal+0x49/0xd0 [ 980.988441][ T1016] force_sig_info+0x251/0x310 [ 980.993134][ T1016] force_sig_fault+0xbb/0xf0 [ 980.997733][ T1016] ? force_sigsegv+0x120/0x120 [ 981.002522][ T1016] ? trace_hardirqs_on+0x67/0x230 [ 981.007568][ T1016] __bad_area_nosemaphore+0x332/0x420 [ 981.012959][ T1016] bad_area+0x69/0x80 [ 981.016955][ T1016] __do_page_fault+0x996/0xda0 [ 981.021739][ T1016] do_page_fault+0x71/0x581 [ 981.026255][ T1016] ? page_fault+0x8/0x30 [ 981.030511][ T1016] page_fault+0x1e/0x30 [ 981.034680][ T1016] RIP: 0033:0x4528df [ 981.038586][ T1016] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 981.058200][ T1016] RSP: 002b:00007fb0ba343a88 EFLAGS: 00010283 [ 981.064274][ T1016] RAX: 00007fb0ba343b40 RBX: 0000000020000428 RCX: 0000000000000000 [ 981.072249][ T1016] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007fb0ba343b40 [ 981.080228][ T1016] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 981.088205][ T1016] R10: 0000000000000075 R11: 00000000004e3020 R12: 0000000000000004 [ 981.096180][ T1016] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:32 executing program 2 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$packet_buf(r1, 0x107, 0x16, &(0x7f00000000c0)=""/166, &(0x7f0000000180)=0xa6) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x2000, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x2000) 14:54:32 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x3f00000000000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:32 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x34000}, 0x0) [ 981.259443][ T1025] FAULT_INJECTION: forcing a failure. [ 981.259443][ T1025] name failslab, interval 1, probability 0, space 0, times 0 [ 981.272268][ T1025] CPU: 0 PID: 1025 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 981.280180][ T1025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.290255][ T1025] Call Trace: [ 981.293564][ T1025] dump_stack+0x172/0x1f0 [ 981.297910][ T1025] should_fail.cold+0xa/0x15 [ 981.302519][ T1025] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 981.308344][ T1025] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 981.314070][ T1025] ? __es_tree_search.isra.0+0x1bf/0x230 [ 981.319720][ T1025] __should_failslab+0x121/0x190 [ 981.324668][ T1025] should_failslab+0x9/0x14 [ 981.330679][ T1025] kmem_cache_alloc+0x47/0x6f0 [ 981.335456][ T1025] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 981.341183][ T1025] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 981.346645][ T1025] ? ext4_es_scan+0x730/0x730 [ 981.351325][ T1025] ? do_raw_write_lock+0x124/0x290 [ 981.356450][ T1025] __es_insert_extent+0x2cc/0xf20 [ 981.361501][ T1025] ext4_es_insert_extent+0x2b7/0xa40 [ 981.366840][ T1025] ? ext4_es_scan_clu+0x50/0x50 [ 981.371717][ T1025] ext4_map_blocks+0xb87/0x18e0 [ 981.376585][ T1025] ? ext4_issue_zeroout+0x190/0x190 [ 981.381801][ T1025] ? kasan_check_write+0x14/0x20 [ 981.386747][ T1025] ? __brelse+0x95/0xb0 [ 981.390916][ T1025] ext4_getblk+0xc4/0x510 [ 981.395269][ T1025] ? ext4_iomap_begin+0xfe0/0xfe0 [ 981.400318][ T1025] ? ext4_free_inode+0x1450/0x1450 [ 981.405446][ T1025] ext4_bread+0x8f/0x230 [ 981.409701][ T1025] ? ext4_getblk+0x510/0x510 [ 981.414314][ T1025] ext4_append+0x155/0x370 [ 981.418739][ T1025] ext4_mkdir+0x61b/0xdf0 [ 981.423123][ T1025] ? ext4_init_dot_dotdot+0x520/0x520 [ 981.428522][ T1025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 981.435319][ T1025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 981.435332][ T1025] ? security_inode_permission+0xd5/0x110 [ 981.435342][ T1025] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 981.435351][ T1025] ? security_inode_mkdir+0xee/0x120 14:54:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0a1f123c4e45d93552949609f8b18ce7dd387b71efe1bcbf6a89b99427402605d9b0c217f176f7d738b488a5d9b806aa1c13552266c9fc2f11c91ec9b2b0bccba438724e86c354368a269ffdc2197786720aa2ebe4ab01d3675826cca1583e851e78dd2d72072435cbb68d4738e2f7c39cc57d7bd9c50b3a2b4cfc05c2db6a51af6283617d7cb390baa0c677cea887bfbb6f7eefcfe60fd9ea757f810fe7f92832907fb889b79874343a8a6781ddf833fa0502db2c0d3e0264584d8d699759303046") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) accept4$bt_l2cap(r1, &(0x7f0000000040), &(0x7f00000000c0)=0xe, 0x800) [ 981.435361][ T1025] vfs_mkdir+0x433/0x690 [ 981.435373][ T1025] do_mkdirat+0x234/0x2a0 [ 981.435382][ T1025] ? __ia32_sys_mknod+0xb0/0xb0 [ 981.435392][ T1025] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 981.435403][ T1025] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 981.435411][ T1025] ? do_syscall_64+0x26/0x610 [ 981.435421][ T1025] ? lockdep_hardirqs_on+0x418/0x5d0 [ 981.435431][ T1025] __x64_sys_mkdir+0x5c/0x80 [ 981.435440][ T1025] do_syscall_64+0x103/0x610 [ 981.435450][ T1025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 981.435458][ T1025] RIP: 0033:0x458047 [ 981.435467][ T1025] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 981.435472][ T1025] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 981.435481][ T1025] RAX: ffffffffffffffda RBX: 0000000020000428 RCX: 0000000000458047 [ 981.435485][ T1025] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 14:54:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = request_key(&(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='nodev\x00', 0xfffffffffffffffa) add_key(&(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="858dff32b0cc8b8140b999047a042ef5d0229bbd16f6fa6d864cee141a33bd44f44126cc3de08546de17ce2e6d615d61d699cf1373567d0d174ed8f9fff3fda62ab6e4af9b9be025e07186a9d1", 0x4d, r2) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 981.435490][ T1025] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 981.435495][ T1025] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 981.435500][ T1025] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:32 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x101040, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e24, @multicast2}}, 0x40, 0xcd6}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000240)={r1, 0xff}, &(0x7f0000000280)=0x8) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r3, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:32 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 14:54:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x3f00, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:32 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x4000000000000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:32 executing program 2 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:32 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x3f00) 14:54:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 981.804645][ T1064] FAULT_INJECTION: forcing a failure. [ 981.804645][ T1064] name failslab, interval 1, probability 0, space 0, times 0 [ 981.817567][ T1064] CPU: 0 PID: 1064 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 981.825469][ T1064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.835540][ T1064] Call Trace: [ 981.838849][ T1064] dump_stack+0x172/0x1f0 [ 981.843201][ T1064] should_fail.cold+0xa/0x15 [ 981.843227][ T1064] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 981.843263][ T1064] ? ___might_sleep+0x163/0x280 [ 981.858481][ T1064] __should_failslab+0x121/0x190 [ 981.863444][ T1064] should_failslab+0x9/0x14 [ 981.867958][ T1064] kmem_cache_alloc_trace+0x2d1/0x760 [ 981.873348][ T1064] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 981.879597][ T1064] ? _copy_from_user+0xdd/0x150 [ 981.884459][ T1064] copy_mount_options+0x5c/0x3a0 [ 981.889408][ T1064] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 981.895659][ T1064] ksys_mount+0xa7/0x150 [ 981.899910][ T1064] __x64_sys_mount+0xbe/0x150 [ 981.904605][ T1064] do_syscall_64+0x103/0x610 [ 981.909213][ T1064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 981.915113][ T1064] RIP: 0033:0x45b69a [ 981.919012][ T1064] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 981.938632][ T1064] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 981.947053][ T1064] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 981.955029][ T1064] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 981.963004][ T1064] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 981.970979][ T1064] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 981.978955][ T1064] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:32 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x8000000000000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:32 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 14:54:33 executing program 2 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x1ff, 0x121000) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="060000005182daff6e544971ae52bfe26705ec17855f5c451b5e8ac1b30296a4663f0517b1f3a21864f8be9fd285d9ac4c43925803b6c74502c87a4592bf35e78941aa2943f9b23c17f7a420b71a42098e5275e813e1f79dd404907178d0a1e190be16e8760aba79851414beffa51b28ee3c37045fcb8fb3756fb22c7a76686556a385734e0bb91509935ebaabc7264ae0cba0", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000140)=0x1c) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000100)=0x8f3c, 0x4) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={r2, 0x1000}, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = socket$inet_sctp(0x2, 0xfbeffffffffffffd, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000002c0)=0x0) write$cgroup_pid(r1, &(0x7f0000000300)=r4, 0x12) sendmmsg$inet_sctp(r3, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x34000, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x34000) [ 982.181912][ T1081] FAULT_INJECTION: forcing a failure. [ 982.181912][ T1081] name failslab, interval 1, probability 0, space 0, times 0 [ 982.205260][ T1081] CPU: 0 PID: 1081 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 982.213169][ T1081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 982.223227][ T1081] Call Trace: [ 982.226558][ T1081] dump_stack+0x172/0x1f0 [ 982.230912][ T1081] should_fail.cold+0xa/0x15 [ 982.235529][ T1081] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 982.241347][ T1081] ? ___might_sleep+0x163/0x280 [ 982.246250][ T1081] __should_failslab+0x121/0x190 [ 982.251196][ T1081] should_failslab+0x9/0x14 [ 982.255715][ T1081] __kmalloc_track_caller+0x2d8/0x740 [ 982.261096][ T1081] ? setup_sigcontext+0x7d0/0x7d0 [ 982.266131][ T1081] ? __bad_area_nosemaphore+0xb3/0x420 [ 982.271685][ T1081] ? strndup_user+0x77/0xd0 [ 982.276198][ T1081] memdup_user+0x26/0xb0 [ 982.280447][ T1081] strndup_user+0x77/0xd0 [ 982.284787][ T1081] ksys_mount+0x3c/0x150 [ 982.289038][ T1081] __x64_sys_mount+0xbe/0x150 [ 982.293730][ T1081] do_syscall_64+0x103/0x610 [ 982.298336][ T1081] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 982.304236][ T1081] RIP: 0033:0x45b69a [ 982.308141][ T1081] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:54:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000940)='/dev/hwrng\x00', 0x20000, 0x0) getsockopt$ax25_int(r3, 0x101, 0x0, &(0x7f0000000980), &(0x7f00000009c0)=0x4) fcntl$addseals(r1, 0x409, 0x4) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000240)={0xa, 0x4, 0xfa00, {r2}}, 0xc) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) r4 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x774e, 0x10000) listen(r1, 0xfff) ioctl$KVM_ARM_SET_DEVICE_ADDR(r4, 0x4010aeab, &(0x7f0000000900)={0x8, 0xf002}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000280)={0x0, 0x8002, 0x1ff, 0x80000000, 0x0}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000300)={r5, 0x5f4, 0x0, 0x101, 0xfffffffffffffffa, 0x7a35}, &(0x7f0000000340)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x800, 0x8002, 0x100, 0x8, r6}, &(0x7f0000000400)=0x10) readahead(r4, 0x10000, 0xffff) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000380)=@filter={'filter\x00', 0xe, 0x3, 0x3c0, [0x0, 0x20000540, 0x20000570, 0x200007d0], 0x0, &(0x7f0000000100), &(0x7f0000000540)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x3, 0x40, 0xabff, 'eql\x00', 'bond_slave_0\x00', 'erspan0\x00', 'ifb0\x00', @dev={[], 0xb}, [0x0, 0x0, 0xff, 0xff, 0xff], @dev={[], 0xb}, [0xff, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x81, 'syz0\x00', 0x5}}}}, {{{0x7, 0x22, 0x8b9f, 'nlmon0\x00', 'hwsim0\x00', 'nr0\x00', 'bond_slave_1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0xff, 0xff, 0xff, 0x0, 0xff], @empty, [0xff, 0xff, 0xff], 0x100, 0x138, 0x170, [@arp={'arp\x00', 0x38, {{0x33d, 0x6607, 0x1, @empty, 0xffffffff, @dev={0xac, 0x14, 0x14, 0xc}, 0xffffff00, @dev={[], 0x18}, [0xff, 0x0, 0x0, 0xff, 0x0, 0xff], @random="378c6b06e945", [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], 0x8, 0x2}}}, @cpu={'cpu\x00', 0x8, {{0x7}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@remote, 0xfffffffffffffffc}}}]}, @common=@mark={'mark\x00', 0x10, {{0xffffffd0}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x1, [{{{0x1d, 0x58, 0x88fe, 'rose0\x00', 'veth0\x00', 'syzkaller0\x00', 'teql0\x00', @remote, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, [0x0, 0x0, 0x0, 0x0, 0xff], 0xa0, 0xa0, 0xd0, [@connlabel={'connlabel\x00', 0x8, {{0x100000001, 0x1}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffc}]}, 0x438) ioctl$FICLONE(r0, 0x40049409, r4) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f0000000440)=ANY=[@ANYBLOB="035f00000000000000050000c0800000000200000004000000ff7f000001000000ff7f0000000000000000000000000000010000008a64ff7f0bdc953300010000d6be996a010000000600000000000000000000000000000000000080080000000700000000000e000068294701000000ac08000000000000000000000000000066e56d9613cd99e6c512cd"]) 14:54:33 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) [ 982.327752][ T1081] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 982.336183][ T1081] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 982.344156][ T1081] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 982.352131][ T1081] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 982.360104][ T1081] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 982.368079][ T1081] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xbb7, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x400300, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x400300) 14:54:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0xe000000100000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:33 executing program 2 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:33 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 982.581138][ T1096] FAULT_INJECTION: forcing a failure. [ 982.581138][ T1096] name failslab, interval 1, probability 0, space 0, times 0 [ 982.638647][ T1096] CPU: 1 PID: 1096 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 982.646575][ T1096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 982.656632][ T1096] Call Trace: [ 982.659955][ T1096] dump_stack+0x172/0x1f0 [ 982.664311][ T1096] should_fail.cold+0xa/0x15 [ 982.668916][ T1096] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 982.674738][ T1096] ? ___might_sleep+0x163/0x280 [ 982.679606][ T1096] __should_failslab+0x121/0x190 [ 982.684554][ T1096] should_failslab+0x9/0x14 [ 982.689074][ T1096] kmem_cache_alloc_trace+0x2d1/0x760 [ 982.694466][ T1096] alloc_fs_context+0x5a/0x640 [ 982.699252][ T1096] fs_context_for_mount+0x25/0x30 [ 982.699279][ T1096] do_mount+0x13d7/0x2c40 [ 982.708626][ T1096] ? copy_mount_string+0x40/0x40 [ 982.708647][ T1096] ? copy_mount_options+0x1fb/0x3a0 [ 982.708670][ T1096] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 982.725019][ T1096] ? copy_mount_options+0x280/0x3a0 [ 982.730229][ T1096] ksys_mount+0xdb/0x150 [ 982.734499][ T1096] __x64_sys_mount+0xbe/0x150 [ 982.739202][ T1096] do_syscall_64+0x103/0x610 [ 982.743813][ T1096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 982.749711][ T1096] RIP: 0033:0x45b69a [ 982.753610][ T1096] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 982.773231][ T1096] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 982.781664][ T1096] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a 14:54:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x1000000, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0xffffff7f00000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x1000000) 14:54:33 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r0, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 982.789637][ T1096] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 982.797614][ T1096] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 982.805588][ T1096] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 982.813565][ T1096] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:33 executing program 2 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:33 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 14:54:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0xffffffff00000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x2000000, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000000c0)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:33 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x2000000) [ 983.070629][ T1118] FAULT_INJECTION: forcing a failure. [ 983.070629][ T1118] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 983.083886][ T1118] CPU: 0 PID: 1118 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 983.091777][ T1118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.101837][ T1118] Call Trace: [ 983.105182][ T1118] dump_stack+0x172/0x1f0 [ 983.109572][ T1118] should_fail.cold+0xa/0x15 [ 983.114196][ T1118] ? fault_create_debugfs_attr+0x1e0/0x1e0 14:54:34 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) [ 983.120044][ T1118] ? __lock_acquire+0x548/0x3fb0 [ 983.124994][ T1118] ? __save_stack_trace+0x99/0x100 [ 983.130119][ T1118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 983.130143][ T1118] should_fail_alloc_page+0x50/0x60 [ 983.130160][ T1118] __alloc_pages_nodemask+0x1a1/0x7e0 [ 983.130182][ T1118] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 983.130195][ T1118] ? find_held_lock+0x35/0x130 [ 983.130218][ T1118] ? __x64_sys_mount+0xbe/0x150 [ 983.162345][ T1118] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 983.162372][ T1118] cache_grow_begin+0x9c/0x860 [ 983.162390][ T1118] ? getname_flags+0xd6/0x5b0 [ 983.162408][ T1118] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 983.162428][ T1118] kmem_cache_alloc+0x62d/0x6f0 [ 983.162450][ T1118] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 983.194377][ T1118] ? find_held_lock+0x35/0x130 [ 983.199158][ T1118] getname_flags+0xd6/0x5b0 [ 983.203680][ T1118] user_path_at_empty+0x2f/0x50 [ 983.208556][ T1118] do_mount+0x150/0x2c40 [ 983.212847][ T1118] ? copy_mount_options+0x5c/0x3a0 14:54:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = accept(r1, &(0x7f00000000c0)=@rc, &(0x7f0000000140)=0x80) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0xfffffffffffffffe, 0xfffffffffffffe37) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x281, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000080)={0x800, 0x4000000000000}, 0xfffffffffffffcf2) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000200)=@in={0x2, 0x0, @local}, 0x182, &(0x7f0000000180), 0x1}], 0x1, 0x0) ioctl$EVIOCSKEYCODE(r3, 0x40084504, &(0x7f0000000000)=[0x7fff, 0xfffffffffffffffc]) [ 983.217973][ T1118] ? copy_mount_string+0x40/0x40 [ 983.222923][ T1118] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 983.229169][ T1118] ? _copy_from_user+0xdd/0x150 [ 983.234035][ T1118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 983.240282][ T1118] ? copy_mount_options+0x280/0x3a0 [ 983.245495][ T1118] ksys_mount+0xdb/0x150 [ 983.249759][ T1118] __x64_sys_mount+0xbe/0x150 [ 983.254452][ T1118] do_syscall_64+0x103/0x610 [ 983.259095][ T1118] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.265008][ T1118] RIP: 0033:0x45b69a [ 983.268911][ T1118] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 983.288522][ T1118] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 983.288539][ T1118] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 983.288549][ T1118] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 983.288559][ T1118] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 14:54:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) fcntl$setlease(r0, 0x400, 0x3) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff, 0x0, 0x0, 0x3}, 0x8) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000280), &(0x7f0000000300)=0x22b) fcntl$lock(r1, 0x5, &(0x7f0000000180)={0x1, 0x5, 0x5, 0x5, r2}) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 983.288568][ T1118] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 983.288578][ T1118] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:34 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x2, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x4000000, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x4000000) 14:54:34 executing program 2 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:34 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x40030000000000}, 0x0) 14:54:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f00000004c0)={0x0, 0x8}, &(0x7f00000005c0)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000600)={0x0, 0x2}, &(0x7f0000000640)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000980)={0x0, 0x89, "2b536629f434e6b419689abebc05244d638890ecf2946565def3b90fe3b885d32d3782dd0850d2ee0b94667419e6c118a2728df01ea458e14325a042109405cec8fb39c530c8aca7851efeda7f9026ae32d635200d8fbcf530626d8e31a806e262533e8687ccecfd0d7a2b5c044ae5927d69c72b35f9744ae1848cf1126a9472fa5522a011ae7c7d64"}, &(0x7f0000000a40)=0x91) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000a80)={0x0, 0x6, 0x7, [0xd601, 0x7f, 0x3, 0x9, 0x7, 0x74d0c101, 0x401]}, &(0x7f0000000ac0)=0x16) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000b00)={0x0, 0x86, "389e53121e1153a69ef82307d025d74ff934f3766b58ff16bc0736210ffc45cc3dc2d51fdfe95d9875b157c3622606e3248ac92974c9e84d70b6de8fae9fe912bbb2ca64ae40f6d1cd290b70bbd00cbd53feea3c0c7924a35d3811ef443821f0d9bcfcb827e44af4a80ba55e2e863dc80f878ec28fb5fff2c2838eb862f4f0ff6d0f83c16381"}, &(0x7f0000000bc0)=0x8e) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000c00)={0x0, @in6={{0xa, 0x4e23, 0x3c3, @loopback, 0x401}}, 0x3}, &(0x7f0000000cc0)=0x90) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000d00)={0x0, 0x80000001}, &(0x7f0000000d40)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000001080)={0x0, 0x6}, &(0x7f00000010c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000001100)={0x0, 0x9}, &(0x7f0000001140)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000002500)={0x0, 0xffffffffffffff80}, &(0x7f0000002540)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000002580)={0x0, 0x3324}, &(0x7f00000025c0)=0x8) sendmmsg$inet_sctp(r1, &(0x7f00000026c0)=[{&(0x7f00000000c0)=@in6={0xa, 0x4e20, 0x0, @remote, 0x40000}, 0x1c, &(0x7f0000000540)=[{&(0x7f0000000100)="488da5be8aee1d2f4a532a1353befb17d0b39502f3ef6b730271b6a8d5e64f9555c4529f98d1270071556f69adbc71f82f85137bcd4ab987ccaa484cd2c40b976250f02534e67ba62998bb5abd04fdf10a13ee3db1b073cd3542030e4d4c8486e98c119ac30268cc92d9e23d7b9b2416fc48f07d417352797116771e4cbc110f9c60", 0x82}, {&(0x7f0000000200)="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", 0xfc}, {&(0x7f0000000300)="a3040d036f9686b96f0aeaeb690f75ee5ed988099ccf21dd6290fb84407126ad59519ece644b77980cad9980031c8856c8f8e1eba6d7c5f35b1fbe5600759c32443f627e059069d138b71a491f53ecad3ffe6cf6cce23e7173262471bc709878b388", 0x62}, {&(0x7f0000000380)="333586596d43c1dec38d15038a5e28146892c820d7f6750fbfbf371962d2e8b065584273d9dc22aa4f60fb2575f886f95c09301cf3b6ca36a7d98cb7d04b364854aa7a50540dd39eb7a030ec4af86969d6b07de0c9c10f9a7eec546b2772b72a7cdc24269f4f48323035336c5f641a1582b059c24f9f5a038b5787e59aab389ea971994a24bcdedd8487bfbd25f93b1000c8e94df365c668c7f9125dd86ed4c5a351ccf95d19", 0xa6}, {&(0x7f0000000440)="9740ac5d8cd9adb8e3597e7aa24d3b5934a9d4d980b2a2572adee25f8106972fafd85dcd1fd410675ac4e49134820c14b74c5930c474c58915408f8036bb9ff0f2dea696b8d4957dafb68e4ac7b7aa", 0x4f}], 0x5, &(0x7f0000000680)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @dstaddrv6={0x20, 0x84, 0x8, @local}, @sndinfo={0x20, 0x84, 0x2, {0x9, 0x8001, 0xa3, 0x1, r2}}, @sndrcv={0x30, 0x84, 0x1, {0x128c, 0x0, 0x0, 0x7f, 0x9, 0x1, 0x20, 0x1, r3}}], 0x88, 0x8000}, {&(0x7f0000000740)=@in={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000000940)=[{&(0x7f0000000780)="08766a2a49d0687af0947179003d2e0e13c3d995a98055fad33ad94ab0f84d0ee3d0e6e7db4eb90d9637981ce3c3a10a2d46e9ef7da487e521de3c4e203728858da25d7690f087e63950b125c224ff10e7e45384f08a708c63fc695e966c69f424cefe955535a8dc87a167babca0f85ce4c60261118172d7115296e2b399276b1c361ec0793530c61fc1c3c14e8f3c85bdabcd597628040a980bbd06ca327906af958067b30993be29dc6bc76c40ae1f4833d5220e6c3447167a96d1b25701", 0xbf}, {&(0x7f0000000840)="5c6c7ad15975803c85c4d39085fa607990221ca70a360a90a10f932b8b1c31d70bd5c33d6c164059637d8baaf708dab83b9e1c904c13e1c90dc5ec8fd6693bbe1c1ebfae965a7ca9fa4cb6a5f21cc839935ee1130610547d4c41c4378683b88d132ea27d1f0d9b042623421a62", 0x6d}, {&(0x7f00000008c0)="b1afa9eae937f9eaa2bf8f9bed1ee6526d893ec6d6b81a544a9bb23a4dab36e664ac15eaf4123ec1354bd1fac2a981802f7741ce67f41323b98f58d17d6abd0d1bf2fa1c9d6fd69afe3f2991659cadb1bf5f7ac107c26f51fff36f8d47df4f76b4", 0x61}], 0x3, &(0x7f0000000d80)=[@init={0x18, 0x84, 0x0, {0x6fc, 0x100000001, 0x80000001, 0x5}}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, @sndinfo={0x20, 0x84, 0x2, {0x2, 0x2, 0x80, 0x0, r4}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x1}, @sndinfo={0x20, 0x84, 0x2, {0x1, 0x1, 0xfffffffffffffffe, 0xa802, r5}}, @sndrcv={0x30, 0x84, 0x1, {0x9, 0x9ff, 0x4, 0x6336, 0x4, 0x1000, 0x0, 0xa16, r6}}, @sndrcv={0x30, 0x84, 0x1, {0x1, 0x6, 0x208, 0x3, 0x6, 0x40, 0x3, 0x8, r7}}, @authinfo={0x18, 0x84, 0x6, {0x3}}, @sndrcv={0x30, 0x84, 0x1, {0x3, 0x7f, 0x800a, 0x7, 0xfa79, 0x6, 0x3, 0x0, r8}}, @authinfo={0x18, 0x84, 0x6, {0x80000000}}], 0x150, 0x5}, {&(0x7f0000000f00)=@in6={0xa, 0x4e20, 0x100, @empty, 0x3}, 0x1c, &(0x7f0000001040)=[{&(0x7f0000000f40)="a50e5f1f3b5b50a0d55b36ab1cc57f9f89919081366c1a14c9f79268cd77635e1fe2097c2e89a94588a3d6eb3045a03e1a4297d882c787c07eab9a48a18c93e18517ada0e5b8e2701047ae867a11f371fe1792e83e072549b8409deea51680229315d9fb59afad1a4a96", 0x6a}, {&(0x7f0000000fc0)="47b28f55dbc454ce65e9cb95d67f9364a49aa64681c05d5958eeb08173f8155b6e0ab4553bcdb1d534f46ac192b716185a59ef2a1f24203504823cfa9c683c082dbc0d96efdf74e114ef6badae3fe8f7c79f53defdae63e6aec2a50a1aa8f2", 0x5f}], 0x2, &(0x7f0000001180)=[@sndrcv={0x30, 0x84, 0x1, {0x6, 0x0, 0x8, 0x7fff, 0x5, 0xd9, 0x9, 0x8000, r9}}, @sndinfo={0x20, 0x84, 0x2, {0x7fff, 0x8, 0x1, 0x5, r10}}, @init={0x18, 0x84, 0x0, {0x200, 0x1ff, 0x30b0, 0x8}}, @init={0x18, 0x84, 0x0, {0x3ff, 0x8, 0x2, 0x40}}, @init={0x18, 0x84, 0x0, {0x4, 0x5, 0x4ae2, 0x3}}, @authinfo={0x18, 0x84, 0x6, {0xfffffffffffffff8}}], 0xb0, 0x24040000}, {&(0x7f0000001240)=@in={0x2, 0x4e21, @empty}, 0x10, &(0x7f00000024c0)=[{&(0x7f0000001280)="c7998ba5b390431ebcd97869d78a9c799bc31a65db2696509720480aa2bda33a36a48835a80f0ca21a55a31bfd7723fe85190360f16723bd9bfb486ddc2d3cd463d79813328099f681573d07", 0x4c}, {&(0x7f0000001300)="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", 0x1000}, {&(0x7f0000002300)="da5ce4968a94370b0edac55a3e503c9c51e5d4d7922f3ee696114996a26923ac8d9fc76b6b357be8989807752dcecbf5a8a02d38733d8ebea1719c3a973806d9837955b4dcb1df943caa69893f8a92595dc5b455b804ce10ac7a05397a2a9103e6c6abad704141fb73f3faef2d784d5a6629f8d933351b5c50933f589da78005169c9cc987da24c696d1e68a18ea8c351569bb14f4907c14a781fc9431f9228d36d3538bbbf4023ff14390563c32ba6fbf14d85e9ff41fea495775887b", 0xbd}, {&(0x7f00000023c0)="82bc11454340086a85aac7aed3f0134cb71d9bcd3e0fc694f703db3e839f32acec2dd6bf891d441a00d8d4c8bbc8437bf4898a33adb25dd83bc7e7741cfa677501ae7079960c0249d356b3203787be3b8e41dabe785a0b00bf1f17cd30a2929a9020cc9ec04c2bec0564c27cf42fbfad4d0084b71fd8ef3750bfe6e27eb3feb6cf08f2943b04358e995ae2005b433a2ec2a2acf147efc271e6d5aeba1a02c645802e0ef1519460d13e76784ca0762e395f21c5d7a83cc83d2e22747d2345360511db1556aeda6ab57e7e3b82", 0xcc}], 0x4, &(0x7f0000002600)=[@sndinfo={0x20, 0x84, 0x2, {0x8000, 0x202, 0x7, 0x6, r11}}, @init={0x18, 0x84, 0x0, {0x7, 0x0, 0x7fff, 0x401}}, @init={0x18, 0x84, 0x0, {0x3, 0xffffffff, 0x1, 0x1f}}, @sndinfo={0x20, 0x84, 0x2, {0xf02, 0x200, 0x9, 0x7ff, r12}}, @dstaddrv4={0x18, 0x84, 0x7, @broadcast}], 0x88, 0x20000000}], 0x4, 0x80) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 983.526441][ T1142] FAULT_INJECTION: forcing a failure. [ 983.526441][ T1142] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 983.539683][ T1142] CPU: 1 PID: 1142 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 983.547582][ T1142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.557649][ T1142] Call Trace: [ 983.560960][ T1142] dump_stack+0x172/0x1f0 [ 983.565317][ T1142] should_fail.cold+0xa/0x15 [ 983.569925][ T1142] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 983.575748][ T1142] ? __lock_acquire+0x548/0x3fb0 [ 983.580698][ T1142] ? __save_stack_trace+0x99/0x100 [ 983.585818][ T1142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 983.592073][ T1142] should_fail_alloc_page+0x50/0x60 [ 983.597281][ T1142] __alloc_pages_nodemask+0x1a1/0x7e0 [ 983.597304][ T1142] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 983.597317][ T1142] ? find_held_lock+0x35/0x130 [ 983.597350][ T1142] ? __x64_sys_mount+0xbe/0x150 [ 983.597372][ T1142] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 983.608499][ T1142] cache_grow_begin+0x9c/0x860 [ 983.608517][ T1142] ? getname_flags+0xd6/0x5b0 [ 983.608541][ T1142] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 983.639563][ T1142] kmem_cache_alloc+0x62d/0x6f0 [ 983.644419][ T1142] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 983.650059][ T1142] ? find_held_lock+0x35/0x130 [ 983.654836][ T1142] getname_flags+0xd6/0x5b0 [ 983.659363][ T1142] user_path_at_empty+0x2f/0x50 [ 983.664221][ T1142] do_mount+0x150/0x2c40 [ 983.668477][ T1142] ? copy_mount_options+0x5c/0x3a0 [ 983.673599][ T1142] ? copy_mount_string+0x40/0x40 [ 983.678548][ T1142] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 983.684804][ T1142] ? _copy_from_user+0xdd/0x150 [ 983.689670][ T1142] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 983.695918][ T1142] ? copy_mount_options+0x280/0x3a0 [ 983.701130][ T1142] ksys_mount+0xdb/0x150 [ 983.705387][ T1142] __x64_sys_mount+0xbe/0x150 [ 983.710078][ T1142] do_syscall_64+0x103/0x610 [ 983.714688][ T1142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 983.720583][ T1142] RIP: 0033:0x45b69a [ 983.724485][ T1142] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 983.744097][ T1142] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 983.752540][ T1142] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 983.760518][ T1142] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 983.769449][ T1142] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 14:54:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 983.777425][ T1142] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 983.785400][ T1142] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:34 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x20000000) 14:54:34 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x3, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:34 executing program 2 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x20000000, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") pwritev(r0, &(0x7f00000000c0), 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x0, 0x0) 14:54:34 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) [ 983.956080][ T1154] FAULT_INJECTION: forcing a failure. [ 983.956080][ T1154] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 983.969317][ T1154] CPU: 0 PID: 1154 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 983.969329][ T1154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.969335][ T1154] Call Trace: [ 983.969364][ T1154] dump_stack+0x172/0x1f0 [ 983.969389][ T1154] should_fail.cold+0xa/0x15 [ 983.990647][ T1154] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 983.990667][ T1154] ? __lock_acquire+0x548/0x3fb0 [ 983.990686][ T1154] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 983.990708][ T1154] should_fail_alloc_page+0x50/0x60 [ 984.021751][ T1154] __alloc_pages_nodemask+0x1a1/0x7e0 [ 984.027149][ T1154] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 984.032884][ T1154] ? find_held_lock+0x35/0x130 [ 984.037670][ T1154] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 984.043495][ T1154] cache_grow_begin+0x9c/0x860 [ 984.048279][ T1154] ? getname_flags+0xd6/0x5b0 14:54:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x4202, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000100)='proc\x00', 0x5) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) chmod(&(0x7f0000000140)='./file0\x00', 0x0) [ 984.052968][ T1154] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 984.059227][ T1154] kmem_cache_alloc+0x62d/0x6f0 [ 984.064091][ T1154] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 984.069736][ T1154] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 984.075239][ T1154] getname_flags+0xd6/0x5b0 [ 984.079757][ T1154] user_path_at_empty+0x2f/0x50 [ 984.084620][ T1154] do_mount+0x150/0x2c40 [ 984.088875][ T1154] ? retint_kernel+0x2d/0x2d [ 984.093484][ T1154] ? copy_mount_string+0x40/0x40 [ 984.098428][ T1154] ? copy_mount_options+0x1d9/0x3a0 [ 984.098448][ T1154] ? write_comp_data+0x9/0x70 [ 984.098468][ T1154] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 984.098482][ T1154] ? copy_mount_options+0x280/0x3a0 [ 984.098501][ T1154] ksys_mount+0xdb/0x150 [ 984.098528][ T1154] __x64_sys_mount+0xbe/0x150 [ 984.119792][ T1154] do_syscall_64+0x103/0x610 [ 984.119816][ T1154] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 984.119829][ T1154] RIP: 0033:0x45b69a [ 984.119844][ T1154] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 984.119853][ T1154] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 984.171191][ T1154] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 984.179179][ T1154] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 984.187192][ T1154] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 984.195167][ T1154] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:54:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x100400003, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) socketpair(0x1e, 0x0, 0x2, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @local}}, 0x8, 0x1ff, 0x10001, 0x4, 0x5}, &(0x7f00000002c0)=0x98) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f00000003c0)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000300)={r3, 0x10, &(0x7f0000000200)=[@in={0x2, 0x4e23, @multicast2}]}, &(0x7f0000000340)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000240)={r3, 0x3, 0x7, 0xfffffffffffffffb}, &(0x7f0000000280)=0x10) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 984.203152][ T1154] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x3f000000) 14:54:35 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 14:54:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x3f000000, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:35 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x4, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:35 executing program 2 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 984.445587][ T1186] FAULT_INJECTION: forcing a failure. [ 984.445587][ T1186] name failslab, interval 1, probability 0, space 0, times 0 [ 984.473799][ T1186] CPU: 0 PID: 1186 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 984.481717][ T1186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.491773][ T1186] Call Trace: 14:54:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0xffffff7f, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:35 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x400000000000000}, 0x0) 14:54:35 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x5, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 984.495083][ T1186] dump_stack+0x172/0x1f0 [ 984.499441][ T1186] should_fail.cold+0xa/0x15 [ 984.504042][ T1186] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 984.509884][ T1186] ? ___might_sleep+0x163/0x280 [ 984.514751][ T1186] __should_failslab+0x121/0x190 [ 984.519703][ T1186] should_failslab+0x9/0x14 [ 984.524222][ T1186] kmem_cache_alloc_trace+0x2d1/0x760 [ 984.529612][ T1186] ? preempt_schedule+0x4b/0x60 [ 984.534475][ T1186] ? ___preempt_schedule+0x16/0x18 [ 984.539612][ T1186] alloc_fs_context+0x5a/0x640 [ 984.544394][ T1186] fs_context_for_mount+0x25/0x30 [ 984.549443][ T1186] do_mount+0x13d7/0x2c40 [ 984.553791][ T1186] ? copy_mount_string+0x40/0x40 [ 984.558741][ T1186] ? copy_mount_options+0x1ea/0x3a0 [ 984.563943][ T1186] ? copy_mount_options+0x1ed/0x3a0 [ 984.563963][ T1186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 984.563978][ T1186] ? copy_mount_options+0x280/0x3a0 [ 984.563998][ T1186] ksys_mount+0xdb/0x150 [ 984.564017][ T1186] __x64_sys_mount+0xbe/0x150 [ 984.564037][ T1186] do_syscall_64+0x103/0x610 [ 984.564058][ T1186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 984.564071][ T1186] RIP: 0033:0x45b69a [ 984.564087][ T1186] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 984.564102][ T1186] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 984.575547][ T1186] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a 14:54:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0xffffff7f) 14:54:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = syz_open_dev$dmmidi(&(0x7f0000000480)='/dev/dmmidi#\x00', 0x9, 0x800) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r5, 0x84, 0x20, &(0x7f0000000540)=0x9, 0x4) getresgid(&(0x7f00000003c0), &(0x7f0000000400)=0x0, &(0x7f0000000440)) r7 = getegid() stat(&(0x7f0000000900)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r10 = getegid() lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xc, &(0x7f0000000780)=0x100000000, 0x4) fsetxattr$system_posix_acl(r0, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000a40)=ANY=[@ANYBLOB="02000000010007000000000002000200", @ANYRES32=r2, @ANYBLOB="040004000000000008000600", @ANYRES32=r4, @ANYBLOB="08000600", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r7, @ANYBLOB="08000300", @ANYRES32=r9, @ANYBLOB="08000600", @ANYRES32=r10, @ANYBLOB="08000300", @ANYRES32=r11, @ANYBLOB="10000200000000002000020000000000"], 0x5c, 0x2) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) r12 = shmget$private(0x0, 0x3000, 0x100, &(0x7f0000ffd000/0x3000)=nil) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000580)={0x0}, &(0x7f00000006c0)=0xc) r14 = getpgrp(0xffffffffffffffff) shmctl$IPC_SET(r12, 0x1, &(0x7f0000000700)={{0x6, r3, r11, r8, r11, 0x102, 0x1000}, 0x5, 0xfffffffffffffff7, 0x2, 0x55, r13, r14}) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) r15 = creat(&(0x7f00000000c0)='./file0\x00', 0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r15, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) [ 984.575557][ T1186] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 984.575567][ T1186] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 984.575576][ T1186] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 984.575586][ T1186] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:35 executing program 2 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:35 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x3f00000000000000}, 0x0) 14:54:35 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x6, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x40030000000000, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:35 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x40030000000000) 14:54:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 984.853562][ T1204] FAULT_INJECTION: forcing a failure. [ 984.853562][ T1204] name failslab, interval 1, probability 0, space 0, times 0 [ 984.900977][ T1204] CPU: 0 PID: 1204 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 984.908905][ T1204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.918965][ T1204] Call Trace: [ 984.918996][ T1204] dump_stack+0x172/0x1f0 [ 984.919023][ T1204] should_fail.cold+0xa/0x15 [ 984.919049][ T1204] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 984.919075][ T1204] ? ___might_sleep+0x163/0x280 [ 984.919099][ T1204] __should_failslab+0x121/0x190 [ 984.919120][ T1204] should_failslab+0x9/0x14 [ 984.919140][ T1204] kmem_cache_alloc_trace+0x2d1/0x760 [ 984.919166][ T1204] alloc_fs_context+0x5a/0x640 [ 984.941981][ T1204] fs_context_for_mount+0x25/0x30 [ 984.942000][ T1204] do_mount+0x13d7/0x2c40 [ 984.942023][ T1204] ? copy_mount_string+0x40/0x40 [ 984.942040][ T1204] ? copy_mount_options+0x1ea/0x3a0 [ 984.942062][ T1204] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 984.986561][ T1204] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 984.992811][ T1204] ? copy_mount_options+0x280/0x3a0 [ 984.998022][ T1204] ksys_mount+0xdb/0x150 [ 985.002274][ T1204] __x64_sys_mount+0xbe/0x150 [ 985.006966][ T1204] do_syscall_64+0x103/0x610 [ 985.011571][ T1204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 985.017467][ T1204] RIP: 0033:0x45b69a [ 985.021366][ T1204] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 985.040978][ T1204] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 985.049395][ T1204] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 985.057368][ T1204] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 985.065345][ T1204] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 985.073321][ T1204] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 985.081298][ T1204] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:36 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x8000000000000000}, 0x0) 14:54:36 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x7, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x100000000000000) 14:54:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x100000000000000, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:36 executing program 2 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0xfffffffffffffcae, 0x3}, &(0x7f0000000140)=0x8) accept$inet(r0, 0x0, &(0x7f00000002c0)) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r2, 0xf8a}, 0x8) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000300)={0x0, 0x0, [0xb6a, 0x100000000, 0x2462, 0x2, 0x80000001, 0x878d, 0x1, 0x7]}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000200)=ANY=[@ANYRES32=r2, @ANYBLOB="0200810001e063998aab043111c2e6d3422161938f00df413ce5d55cb178d3dee8598a47be8f8800d00297e07064dc09f4155b5bffc67beaee21e2c4a78700bb8a8da1b2284134145073dffc6dfe6cf2e8dccbee23d32233430a05d50d3e07b6f9b725c5b2effea28c54e8f676856e07f6ee8196ca7b65d8b77ffc24e7865afe2da1002650"], 0x89) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r3, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 985.329507][ T1229] FAULT_INJECTION: forcing a failure. [ 985.329507][ T1229] name failslab, interval 1, probability 0, space 0, times 0 14:54:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1c7f8d67273859c6, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x7, 0x1, [0x7]}, &(0x7f0000000140)=0xa) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000180)={r2, 0x7, 0x28000, 0x3}, &(0x7f0000000200)=0x10) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x200000000000000) 14:54:36 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 14:54:36 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x300, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 985.442175][ T1229] CPU: 0 PID: 1229 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 985.450115][ T1229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 985.460181][ T1229] Call Trace: [ 985.463495][ T1229] dump_stack+0x172/0x1f0 [ 985.467855][ T1229] should_fail.cold+0xa/0x15 [ 985.472471][ T1229] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 985.478334][ T1229] ? ___might_sleep+0x163/0x280 [ 985.483209][ T1229] __should_failslab+0x121/0x190 14:54:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x200000000000000, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 985.488154][ T1229] should_failslab+0x9/0x14 [ 985.492672][ T1229] kmem_cache_alloc_trace+0x2d1/0x760 [ 985.498099][ T1229] alloc_fs_context+0x5a/0x640 [ 985.502885][ T1229] fs_context_for_mount+0x25/0x30 [ 985.507921][ T1229] do_mount+0x13d7/0x2c40 [ 985.507946][ T1229] ? copy_mount_string+0x40/0x40 [ 985.507972][ T1229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 985.507986][ T1229] ? copy_mount_options+0x280/0x3a0 [ 985.508005][ T1229] ksys_mount+0xdb/0x150 [ 985.517288][ T1229] __x64_sys_mount+0xbe/0x150 [ 985.517310][ T1229] do_syscall_64+0x103/0x610 14:54:36 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f00000000c0)="60392cf8d9503342f6", 0x9}], 0x1) write$binfmt_misc(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="73797a3174d0b80963d0e50a317fcd3ccf740bb4252763aef35e06231d9e96ce3dc472d6b9395e1d57210033a2c039b8864ee33e2774ca83a4e5d0bdb10032831858572519de6b6af4e58d444cdbcd759540ff10b196843062c5c4fd71a44602acc2057c1a67804fef29c576cf72a29b539f5a2f44d2888b608f184228bab5373b8b5888a94155728cbfee83a21b56c7f8d81ea8adc2863a26a1c7ba2a7f87ba30bd589fb2d71c4de771536b48d94cbd67ed1715f5b6179184c5ad90a8238fc21e95061b1dfeeac002eb40c2b59e0c8c39a9b03fc36a474e8fe6ec26d844a24e998ed510037ef41d592cc35d92e71f1473733d70a4af367fcd763f9572e2ba78"], 0xffffffffffffffa1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 985.517332][ T1229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 985.517344][ T1229] RIP: 0033:0x45b69a [ 985.517359][ T1229] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 985.517368][ T1229] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 985.517384][ T1229] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 985.517394][ T1229] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 985.517403][ T1229] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 985.517412][ T1229] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 985.517421][ T1229] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:36 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x500, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x400000000000000) 14:54:36 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:36 executing program 2 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x400000000000000, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x9, 0x20001) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x5, 0xf, 0x18, 0x11, "0209642dcfc330ef598111f0d09528b05d728624fc68cc2cc8aef29a918f59d1d0277182d614864a1ea837cd0606bd6161c1529774464981d0bd47ed499b5617", "fc793bf7c10878f721d894dbef38bc23be2da278e44255f44b607713f06fcbaf", [0x240, 0x8]}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 985.826384][ T1254] FAULT_INJECTION: forcing a failure. [ 985.826384][ T1254] name failslab, interval 1, probability 0, space 0, times 0 [ 985.854057][ T1254] CPU: 0 PID: 1254 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 985.861970][ T1254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 985.872028][ T1254] Call Trace: [ 985.875337][ T1254] dump_stack+0x172/0x1f0 [ 985.879686][ T1254] should_fail.cold+0xa/0x15 [ 985.884291][ T1254] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 985.890111][ T1254] ? ___might_sleep+0x163/0x280 [ 985.895150][ T1254] __should_failslab+0x121/0x190 [ 985.900093][ T1254] should_failslab+0x9/0x14 [ 985.904611][ T1254] __kmalloc_track_caller+0x2d8/0x740 [ 985.909987][ T1254] ? kasan_kmalloc+0x9/0x10 [ 985.914498][ T1254] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 985.920840][ T1254] ? debug_smp_processor_id+0x3c/0x280 [ 985.926330][ T1254] ? btrfs_mount+0xdc/0x15e2 [ 985.930934][ T1254] kstrdup+0x3a/0x70 [ 985.934842][ T1254] ? btrfs_remount+0x11f0/0x11f0 [ 985.939784][ T1254] btrfs_mount+0xdc/0x15e2 [ 985.944213][ T1254] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 985.949856][ T1254] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 985.956102][ T1254] ? should_fail+0x1de/0x852 [ 985.960704][ T1254] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 985.966531][ T1254] ? btrfs_remount+0x11f0/0x11f0 [ 985.971494][ T1254] ? rcu_read_lock_sched_held+0x110/0x130 [ 985.977223][ T1254] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 985.983478][ T1254] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 985.989734][ T1254] ? vfs_parse_fs_string+0x111/0x170 [ 985.995031][ T1254] ? vfs_parse_fs_string+0x111/0x170 [ 986.000324][ T1254] ? rcu_read_lock_sched_held+0x110/0x130 [ 986.006057][ T1254] ? kfree+0x1fa/0x230 [ 986.010133][ T1254] ? vfs_parse_fs_string+0x116/0x170 [ 986.015436][ T1254] ? btrfs_remount+0x11f0/0x11f0 [ 986.020379][ T1254] legacy_get_tree+0xf2/0x200 [ 986.025066][ T1254] ? btrfs_remount+0x11f0/0x11f0 [ 986.030004][ T1254] ? legacy_get_tree+0xf2/0x200 [ 986.034868][ T1254] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 986.041117][ T1254] vfs_get_tree+0x123/0x450 [ 986.045629][ T1254] do_mount+0x1436/0x2c40 [ 986.049972][ T1254] ? copy_mount_string+0x40/0x40 [ 986.054919][ T1254] ? _copy_from_user+0xdd/0x150 [ 986.059780][ T1254] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 986.066028][ T1254] ? copy_mount_options+0x280/0x3a0 [ 986.071248][ T1254] ksys_mount+0xdb/0x150 [ 986.075504][ T1254] __x64_sys_mount+0xbe/0x150 [ 986.080198][ T1254] do_syscall_64+0x103/0x610 [ 986.084817][ T1254] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 986.090716][ T1254] RIP: 0033:0x45b69a [ 986.094619][ T1254] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 986.114227][ T1254] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:54:37 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x600, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 986.122656][ T1254] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 986.130635][ T1254] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 986.138621][ T1254] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 986.146593][ T1254] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 986.154565][ T1254] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in=@loopback, @in=@initdev}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) 14:54:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x2000000000000000) 14:54:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x2000000000000000, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:37 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:37 executing program 2 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x3f00000000000000) 14:54:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) ioctl(0xffffffffffffffff, 0x7, &(0x7f0000000100)) lstat(0x0, &(0x7f00000009c0)) setpriority(0x0, r1, 0x10000) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) sched_setscheduler(r1, 0x2, &(0x7f0000000800)=0x80000001) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000300)='./file0\x00', 0x0, &(0x7f00000004c0)) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, 0x0) rt_sigaction(0x28, &(0x7f0000000140)={&(0x7f0000000080)="c42115f632427600c4a295b76ac5660f10ecf2446d6583880050b220013e400f7fefc4c2f934b600000000f2400fc21100c4c37bf0800000000000", {0x1297388}, 0x88000002, &(0x7f00000001c0)="f04283b6fd053451bbc4017b70c800c403c56982bf16000006c4425903cf66420f38dcfd8f2a50120c960900000066470f3adfb300f0ffff9765f00fb33fc4623545ef46d3e3"}, &(0x7f00000002c0)={&(0x7f0000000240)="6ca72665450f18ef66430f381517d2c1d027c4815d73df0b0ff23ce5000800003e6666460f57a16225000066460f72f23d", {}, 0x0, &(0x7f0000000280)="f043808c85cb12becee7c442f91700363ef3f08077000066440f6547d926f3af64400f01de660fe68ced8e00000065f7b508000000f246afc4c1d9d8d3"}, 0x8, &(0x7f0000000380)) lsetxattr$security_smack_transmute(&(0x7f0000000a80)='./file0\x00', 0x0, 0x0, 0x0, 0x2) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x7ff, 0x0, 0x4}, 0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 986.378446][ T1273] FAULT_INJECTION: forcing a failure. [ 986.378446][ T1273] name failslab, interval 1, probability 0, space 0, times 0 14:54:37 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x700, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 986.449786][ T1273] CPU: 1 PID: 1273 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 986.457721][ T1273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 986.467778][ T1273] Call Trace: [ 986.471083][ T1273] dump_stack+0x172/0x1f0 [ 986.475443][ T1273] should_fail.cold+0xa/0x15 [ 986.480057][ T1273] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 986.480080][ T1273] ? ___might_sleep+0x163/0x280 [ 986.480102][ T1273] __should_failslab+0x121/0x190 [ 986.495666][ T1273] should_failslab+0x9/0x14 [ 986.495686][ T1273] kmem_cache_alloc_trace+0x2d1/0x760 [ 986.495712][ T1273] alloc_fs_context+0x5a/0x640 [ 986.510347][ T1273] fs_context_for_mount+0x25/0x30 [ 986.515389][ T1273] vfs_kern_mount.part.0+0x28/0xf0 [ 986.520517][ T1273] vfs_kern_mount+0x40/0x60 [ 986.525055][ T1273] btrfs_mount+0x2b4/0x15e2 [ 986.529568][ T1273] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 986.535209][ T1273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 986.541461][ T1273] ? should_fail+0x1de/0x852 [ 986.546065][ T1273] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 986.551911][ T1273] ? btrfs_remount+0x11f0/0x11f0 [ 986.556884][ T1273] ? rcu_read_lock_sched_held+0x110/0x130 [ 986.562615][ T1273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 986.568869][ T1273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 986.575120][ T1273] ? vfs_parse_fs_string+0x111/0x170 [ 986.580428][ T1273] ? vfs_parse_fs_string+0x111/0x170 [ 986.585730][ T1273] ? rcu_read_lock_sched_held+0x110/0x130 [ 986.591478][ T1273] ? kfree+0x1fa/0x230 [ 986.595561][ T1273] ? vfs_parse_fs_string+0x116/0x170 [ 986.600862][ T1273] ? btrfs_remount+0x11f0/0x11f0 [ 986.605812][ T1273] legacy_get_tree+0xf2/0x200 [ 986.610499][ T1273] ? btrfs_remount+0x11f0/0x11f0 [ 986.615450][ T1273] ? legacy_get_tree+0xf2/0x200 [ 986.620319][ T1273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 986.626576][ T1273] vfs_get_tree+0x123/0x450 [ 986.631096][ T1273] do_mount+0x1436/0x2c40 [ 986.635453][ T1273] ? copy_mount_string+0x40/0x40 [ 986.640408][ T1273] ? _copy_from_user+0xdd/0x150 [ 986.645276][ T1273] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 986.651526][ T1273] ? copy_mount_options+0x280/0x3a0 [ 986.656741][ T1273] ksys_mount+0xdb/0x150 [ 986.661031][ T1273] __x64_sys_mount+0xbe/0x150 [ 986.665726][ T1273] do_syscall_64+0x103/0x610 [ 986.670340][ T1273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 986.676246][ T1273] RIP: 0033:0x45b69a [ 986.680149][ T1273] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:54:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000001c0), &(0x7f0000000500)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000000)={0x7ff}, 0x8) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) sendmmsg$inet_sctp(r2, &(0x7f0000001a00)=[{&(0x7f00000000c0)=@in6={0xa, 0x4e22, 0x1, @remote, 0x3}, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000100)="a4e3e2332dde9beff3bcde72c446bcd89511ad356e220f94278c64f8ba354fabfe93a3c910621f13a79e0dce1438e33272a85b88b1fcc234f3e0cf8628bed663a74f610e7bc9a725300a8d668134417dcfb6ce9c53cb565393c6877ca2c18f"}, {&(0x7f0000000180)="9ccccbb63724b993254f455387ec594cec9c70bf32c077ac9c080b25ba2654af"}, {&(0x7f0000000200)="ab4c84a371ea87dea994a68fbbe579fb2b3f75f32a2e5b33f25b73aff322be6fbbbea1d02fc85252642044e7c689dc288b970c80158da59220eac3163684f10e3c14f72aa54b68fadc823a94943c041ae40d28a02b38924e2500280c823f11f5df53c13bf9b924ef7e7958428ebc7a770f55120cbfb858d335b634d4a9b99baac370667994b7df", 0xffffffffffffff35}, {&(0x7f00000002c0)="b52c1a2277a5109814e13786c2bb9d9279408229c32b2439b3b4e69fc987908fdd77e5caffa72bf581cc66166e58d20a38a0c1582ef09102e422ea408f7e8a8b9cb5c0458141f5d340fa4295a72980791fe90fae45feb7e0a0015a6d9d0a81d9aef83c279b1bfa52a3b3b96a8dbe6c1109207e4ff5009d8ff5f16706"}, {&(0x7f0000000340)="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"}, {&(0x7f0000000540)="a29e84b27b0700f2c3d183d5c0ed2fdcf15f9d9fb012887e9ed2d8bfde36bbcdbbf70adacdfee0d940d0951a83baeb9822262482cddd2199482ce9980fa144d9212c0708879b76a67be57c7fa04b292b57da4d2ee076f7ed62510c295a96c64af0ebcdb633feff33f3ec883acaa25ae1bddefb3e2c34ef2acf49fd0f379ad8898d5aa458a876a4ad07c75557aed029c86f01c370659b784a5146ae2a7883db5aec276a8b75d849d074f7672f821a94100d6eaa0bbeb9bda9a74455de9616d976e3f3745ebddd"}, {&(0x7f0000000440)="4d50579a50492548d95b483663d87046354d1e6fbd5533526a164aa10e9984f8f1c7fd849a70f6815f99915b5a7041a1c101eecc2fdab86237a5bd0c9bad63f4bcda60582fe150d0da3f450aa9f891f4a7f46d154f6bb9678d155de531547e51decc1a5586603c47dbe0198812fc97b9e1d1ef8720c56d72d01f61aa69f81bececdfa2039d60b0eb2b4c86587c9c143571d7e386be662620a829513b956da39517a2dc64f21140"}, {&(0x7f0000000640)="2e4241e87c3547e8c683a1355cda1f100c930f45f65ad434500fbe3418364af5a35f8fbfc9b2d9cb9875b46dddc1eea0c9dfa6b045b309b6bd1219df2197e775ef8f7d8dc0658393ae56727bfe5c57781f8b2cca65d787b39d64bc83ef3376120dd9de4dbaade86d7cef42d687d282bb04b244a026f3ca6268ffed27410949a2ea798d76694afc3b4f436ea7b69409de415924adf25a869ef3d8c49976e932380944d5ede8a78c9dd2d548c186d76f580773b77fc7657e5fd23b78251fa3960dac515891326318dca4cfae744695560d765ea57a0be4c10e3742aef31f9a4a13ba67e2683329e62ea02b82"}, {&(0x7f0000000740)="6fddc78d586f60e6b84697d1b59b5785be47d964c3130b756dd6801320c0cd378fedb92d231a284dca616c816e3a5882fea2dde9b4a98e22436d43f1539756453e537c3fd5353baf2f596ce39fdfc5"}, {&(0x7f00000007c0)="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", 0x2a5}], 0x0, &(0x7f0000001980)=ANY=[@ANYBLOB="eaff0000ff0000008400000002000400000008000100000000000000", @ANYRES32, @ANYBLOB="000000000000000084000000000000000700050020003c0000000000000000008400000007000000ac14140c00000000000000000000000084000000050000000000000005000000"], 0x0, 0x10}], 0x1, 0x0) 14:54:37 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x3f00000000000000, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 986.699760][ T1273] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 986.708181][ T1273] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 986.716154][ T1273] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 986.716165][ T1273] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 986.716174][ T1273] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 986.716183][ T1273] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x80, 0x200000) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f00000002c0)=0xffff, 0x4) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000000)={0x0, 0xdc, 0x30, 0x100000001, 0xeff}, &(0x7f00000000c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000100)={r3, @in={{0x2, 0x4e21, @broadcast}}, 0xff, 0x10001, 0x0, 0x3, 0x1}, &(0x7f00000001c0)=0x98) r4 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x5, 0x80000) write$P9_RVERSION(r4, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff0100000008003950303030302e4c6ce26f3b8ff20ba1b862aba751fdccac262c23d74a3d988e6716fb91311a1f724ef1debc53bd87b8cd151c221ee9a73ef6f39284026e174907bbcd7888e0ab7289538fe4df465a9235f6623c67cd08bf06ac6920afdf1a9f17690c451463bd4bb6011f1480e106af77b594af70d733cbf7dc89caaa07a66457753bd28b1a1bb6c7390da35256c2b55507770656c0c97451e94989ee72000000000000000000088e7fde7eb38671950a1a8ebb4dae00"/208], 0x15) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) 14:54:37 executing program 2 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:37 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x8000000000000000, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x8000000000000000) 14:54:37 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x2000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 986.974427][ T1301] FAULT_INJECTION: forcing a failure. [ 986.974427][ T1301] name failslab, interval 1, probability 0, space 0, times 0 [ 987.008628][ T1301] CPU: 1 PID: 1301 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 987.016567][ T1301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 987.026631][ T1301] Call Trace: [ 987.029957][ T1301] dump_stack+0x172/0x1f0 [ 987.034312][ T1301] should_fail.cold+0xa/0x15 [ 987.038923][ T1301] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 987.044749][ T1301] ? ___might_sleep+0x163/0x280 [ 987.049616][ T1301] __should_failslab+0x121/0x190 [ 987.054566][ T1301] should_failslab+0x9/0x14 [ 987.059084][ T1301] kmem_cache_alloc_trace+0x2d1/0x760 [ 987.064467][ T1301] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 987.070289][ T1301] ? rcu_read_lock_sched_held+0x110/0x130 [ 987.076032][ T1301] ? kmem_cache_alloc_trace+0x354/0x760 [ 987.081590][ T1301] legacy_init_fs_context+0x48/0xe0 [ 987.086799][ T1301] ? generic_parse_monolithic+0x200/0x200 [ 987.092521][ T1301] alloc_fs_context+0x365/0x640 [ 987.097387][ T1301] fs_context_for_mount+0x25/0x30 [ 987.102424][ T1301] vfs_kern_mount.part.0+0x28/0xf0 [ 987.107551][ T1301] vfs_kern_mount+0x40/0x60 [ 987.112070][ T1301] btrfs_mount+0x2b4/0x15e2 [ 987.116590][ T1301] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 987.122231][ T1301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 987.128485][ T1301] ? should_fail+0x1de/0x852 [ 987.133087][ T1301] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 987.138910][ T1301] ? btrfs_remount+0x11f0/0x11f0 [ 987.143867][ T1301] ? rcu_read_lock_sched_held+0x110/0x130 [ 987.149594][ T1301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 987.155845][ T1301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 987.162093][ T1301] ? vfs_parse_fs_string+0x111/0x170 [ 987.167408][ T1301] ? vfs_parse_fs_string+0x111/0x170 [ 987.172735][ T1301] ? rcu_read_lock_sched_held+0x110/0x130 [ 987.178464][ T1301] ? kfree+0x1fa/0x230 [ 987.182545][ T1301] ? vfs_parse_fs_string+0x116/0x170 [ 987.187845][ T1301] ? btrfs_remount+0x11f0/0x11f0 [ 987.192790][ T1301] legacy_get_tree+0xf2/0x200 [ 987.197477][ T1301] ? btrfs_remount+0x11f0/0x11f0 [ 987.202416][ T1301] ? legacy_get_tree+0xf2/0x200 [ 987.207287][ T1301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 987.213565][ T1301] vfs_get_tree+0x123/0x450 [ 987.218079][ T1301] do_mount+0x1436/0x2c40 [ 987.222426][ T1301] ? copy_mount_string+0x40/0x40 [ 987.227375][ T1301] ? _copy_from_user+0xdd/0x150 [ 987.232256][ T1301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 987.238505][ T1301] ? copy_mount_options+0x280/0x3a0 [ 987.243720][ T1301] ksys_mount+0xdb/0x150 [ 987.247984][ T1301] __x64_sys_mount+0xbe/0x150 [ 987.252684][ T1301] do_syscall_64+0x103/0x610 [ 987.257287][ T1301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 987.263185][ T1301] RIP: 0033:0x45b69a [ 987.267088][ T1301] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 987.286702][ T1301] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 987.295125][ T1301] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 987.303100][ T1301] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 987.311075][ T1301] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 14:54:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) r2 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x8, 0x200) ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 987.319052][ T1301] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 987.328036][ T1301] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:38 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0xffffff7f00000000) 14:54:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0xffffff7f00000000, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:38 executing program 2 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x400000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0xd0, r3, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8a}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x10000}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_team\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xb2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffff}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'irlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="c8c568380a809045758d6ea89586303b"}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4040800}, 0x20000000) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x800, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f00000003c0)=0x4) ioctl$PPPIOCSDEBUG(r4, 0x40047440, &(0x7f0000000100)=0x100000001) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:38 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x3f00, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 987.530726][ T1317] FAULT_INJECTION: forcing a failure. [ 987.530726][ T1317] name failslab, interval 1, probability 0, space 0, times 0 [ 987.543548][ T1317] CPU: 1 PID: 1317 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 987.551451][ T1317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 987.561509][ T1317] Call Trace: [ 987.564821][ T1317] dump_stack+0x172/0x1f0 [ 987.569177][ T1317] should_fail.cold+0xa/0x15 [ 987.573788][ T1317] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 987.579617][ T1317] ? ___might_sleep+0x163/0x280 [ 987.584483][ T1317] __should_failslab+0x121/0x190 [ 987.589434][ T1317] should_failslab+0x9/0x14 [ 987.593952][ T1317] kmem_cache_alloc_node_trace+0x270/0x720 [ 987.599797][ T1317] __kmalloc_node+0x3d/0x70 [ 987.604312][ T1317] kvmalloc_node+0xbd/0x100 [ 987.608858][ T1317] btrfs_mount_root+0x12b/0x1220 [ 987.613813][ T1317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 987.620075][ T1317] ? btrfs_decode_error+0x70/0x70 [ 987.625117][ T1317] ? rcu_read_lock_sched_held+0x110/0x130 [ 987.630845][ T1317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 987.637097][ T1317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 987.643348][ T1317] ? vfs_parse_fs_string+0x111/0x170 [ 987.648644][ T1317] ? vfs_parse_fs_string+0x111/0x170 [ 987.653944][ T1317] ? rcu_read_lock_sched_held+0x110/0x130 [ 987.659676][ T1317] ? kfree+0x1fa/0x230 [ 987.663759][ T1317] ? vfs_parse_fs_string+0x116/0x170 [ 987.669066][ T1317] ? btrfs_decode_error+0x70/0x70 [ 987.674110][ T1317] legacy_get_tree+0xf2/0x200 [ 987.678805][ T1317] vfs_get_tree+0x123/0x450 [ 987.683357][ T1317] fc_mount+0x17/0xc0 [ 987.687362][ T1317] vfs_kern_mount.part.0+0xd8/0xf0 [ 987.692499][ T1317] vfs_kern_mount+0x40/0x60 [ 987.697016][ T1317] btrfs_mount+0x2b4/0x15e2 [ 987.701543][ T1317] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 987.707191][ T1317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 987.713439][ T1317] ? should_fail+0x1de/0x852 [ 987.718052][ T1317] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 987.723879][ T1317] ? btrfs_remount+0x11f0/0x11f0 [ 987.728835][ T1317] ? rcu_read_lock_sched_held+0x110/0x130 [ 987.734565][ T1317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 987.740817][ T1317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 987.747074][ T1317] ? vfs_parse_fs_string+0x111/0x170 [ 987.752368][ T1317] ? vfs_parse_fs_string+0x111/0x170 [ 987.757664][ T1317] ? rcu_read_lock_sched_held+0x110/0x130 [ 987.763396][ T1317] ? kfree+0x1fa/0x230 [ 987.767488][ T1317] ? vfs_parse_fs_string+0x116/0x170 [ 987.772805][ T1317] ? btrfs_remount+0x11f0/0x11f0 [ 987.777750][ T1317] legacy_get_tree+0xf2/0x200 [ 987.782444][ T1317] ? btrfs_remount+0x11f0/0x11f0 [ 987.787390][ T1317] ? legacy_get_tree+0xf2/0x200 [ 987.792255][ T1317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 987.798510][ T1317] vfs_get_tree+0x123/0x450 [ 987.803039][ T1317] do_mount+0x1436/0x2c40 [ 987.807397][ T1317] ? copy_mount_string+0x40/0x40 [ 987.812349][ T1317] ? _copy_from_user+0xdd/0x150 [ 987.817210][ T1317] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 987.823466][ T1317] ? copy_mount_options+0x280/0x3a0 [ 987.828674][ T1317] ksys_mount+0xdb/0x150 [ 987.832932][ T1317] __x64_sys_mount+0xbe/0x150 [ 987.837630][ T1317] do_syscall_64+0x103/0x610 [ 987.842235][ T1317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 987.848151][ T1317] RIP: 0033:0x45b69a [ 987.852063][ T1317] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 987.871672][ T1317] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:54:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x2, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 987.880090][ T1317] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 987.888064][ T1317] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 987.896045][ T1317] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 987.904029][ T1317] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 987.912004][ T1317] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:38 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/netlink\x00') ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000100)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0x80, &(0x7f0000000140)="00e69241a58885aa7c7b78c08ba5af2fe90e53d5b2", 0x15) 14:54:38 executing program 2 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x8, 0x149001) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e20, 0x4, @ipv4={[], [], @rand_addr=0x4}, 0x10001}, {0xa, 0x4e22, 0x6, @mcast1, 0x3}, 0x3dc, [0x9, 0x800, 0x4, 0x9, 0x7f, 0x1, 0x1, 0x7]}, 0x5c) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300090900000000000000000000000200090000000000000000000000000002000100000008000000000b00000000030005000000000002000000e00000010000000000000000"], 0x48}}, 0x0) 14:54:38 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x4000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:38 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x4, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1004008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000004c0)={0x0, 0x1}, &(0x7f00000026c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000002700)={0x0, @in6={{0xa, 0x4e22, 0x7fffffff, @mcast2, 0x7}}, 0x6, 0x10000, 0x4, 0x1, 0x20}, &(0x7f00000027c0)=0x98) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000004380)={0x0, @in={{0x2, 0x4e20, @local}}, [0x1, 0x5, 0x8, 0x7, 0x3ff, 0x400, 0x3, 0x80000000, 0x40, 0x100, 0x6, 0x40, 0x9, 0x7f, 0xfffffffffffffffe]}, &(0x7f0000004480)=0x100) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00000056c0)={0x0, @in6={{0xa, 0x4e22, 0xac8f, @ipv4={[], [], @multicast2}, 0x5}}, [0x0, 0x6, 0x10001, 0x1, 0x400000000, 0x80000001, 0x30a, 0x5, 0xc5, 0x8, 0x7f, 0x20, 0x9, 0x5, 0x2479]}, &(0x7f00000057c0)=0x100) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000005a40)={0x0, 0x4b, "71b7041be2d4a19b554ddc995e78435604ec094efdba9f8527113016861081365696b3950316bff341e90676854bf1aa5080e6c39abf19cb41c3a593a10c82625250a493b6a49cd07b6d2c"}, &(0x7f0000005ac0)=0x53) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000005b00)={0x0, @in={{0x2, 0x4e20, @empty}}, 0x6, 0xa7, 0x226d, 0xffffffffffffff66, 0x64}, &(0x7f0000005bc0)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000006440)={0x0, 0x48, &(0x7f00000063c0)=[@in6={0xa, 0x4e21, 0x3, @rand_addr="990a4aa8f0b0b39caa52b3a806df64f1"}, @in={0x2, 0x4e21}, @in6={0xa, 0x4e22, 0x20, @local, 0x4}]}, &(0x7f0000006480)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f00000064c0)={0x0, 0xff, 0x2}, &(0x7f0000006500)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000006680)={0x0, 0x6}, &(0x7f00000066c0)=0x8) sendmmsg$inet_sctp(r1, &(0x7f0000006780)=[{&(0x7f00000000c0)=@in6={0xa, 0x4e23, 0x7fff, @dev={0xfe, 0x80, [], 0x28}, 0xf60}, 0x1c, &(0x7f0000002640)=[{&(0x7f0000000200)="957cf2ad84ead0dbdc78d490c3a3cb248f6ee41b2b8121bd1bfb0fa860b45a27bd09d01944285e1be34ac0f6b4330ace463f02fb72b88557", 0x38}, {&(0x7f0000000240)="c445c5d8bac35fde187cd65af244ec37311dac6fccde4cadf19a508354c147c95318e0c46b4adc38b3b9748d0e5ad19bd57d0c11372a237226742eaf56fcf595ef63ebdd46008c9efdc67a55f39b7d1d223b17ccb4cf70da082423350a1816474857e2c33a128c4ffbf18f48a5a720637598f23862c6a4e24d77f68b087c786d0b8ebf091fa2c5d2a8e98fe9f8c64123c6a643b60ab391c31ea1054ce1ec9da3170ab28dd6d23b5c93ce4b2c803e6eb2c9232b4f5b812e09b948a38cc14c5363fe4fed3c8d3092682b11e3ea5ddcbd19e2a6b8d6e0e844a43658d821887ac146352e7e24576e5fc5d190ee722281d7", 0xef}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="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", 0x1000}, {&(0x7f0000000340)="88a48cc0e1c6cbf6b424c57548ab6b6ba51efe96af98568c9a56a77ffd7f60a9cd8e15b78c6c3d77974f3c13ab7d8f290671d31ea1e4277c656734a37636bf43e18f44c12168d79125f648d4b0844a9255165bd57f726267053ce8546348119aefc9d897b4a6837d305f9776d94173a51b90769e8b5de63341fc99f00b958f775bedbd422fb2dde2f61febc88e7739885a0fb9722538c690d31b6160b611a361d2da1b3c3bde80d8f90f1c00f14943a57f1f6507a9495a9ac6e1543af119aa6d454c290509e20b2b5380", 0xca}, {&(0x7f0000000440)="0733d2364c9bafa51573c7b082bf8d7dca25c0a7fe48bcf9a16aabd6f4dca8b7618e20344e38377380bb694ee731598028d69599458d48edf013277e152fc89f60ff", 0x42}, {&(0x7f0000002540)="eac93f984068d2a53a41f91330aa41dd0b05681d6c12688ba383b86327e7f5c89ccb84db29f878e8cc2e72dc2715117949ef5716e8a79b4eafcc2fa3974ecf05daaa8d46dfb9d122b4f74904d66c3df0aded53b0099108f0a62906d2ba7dacf2f40dcd0d11f31b252bd43a76f6c4c0545b9ad155a5afe19279029a6940f2f4210d7de3779664aca55e70dac5b5a802ce2e2833f586f9a5ed0ee6e7b371b5f683259191a97ae9acef9fbf392774c25de8b8745dbd9e9bd1d58aaead7789928c868067a90546ff088341e277b79a84cdb6c9e8451fb4fc5ec1d585bb793c", 0xdd}], 0x7, &(0x7f0000006940)=ANY=[@ANYBLOB="18000000000000008400000007000000000000040000000030000000000000008400000001000000800001800100000028060000000000000104000055ee0000fffeffff", @ANYRES32=r2, @ANYBLOB="30000000000000fe02887665fa856800f4b21854f750b560497a0e8722a457a90000f50002000000010400005f0000000000000007000000020000001040cab7377ad68cccc4ec4359cd543d5766da3baf9d4b0011269c9977c8c43f47c74f39ec50f80300930dfafc1484d8691715eaed08bce805ccc370dafd33f31689b0c89c766c96836efbb3a5a6c71508985d737d1be394b7575ff4f4f69c0e7db81ebd82e7f6a474352f10d2393f6041fd829ad35730baf2dbcdbabf", @ANYRES32=r3], 0x78, 0x44}, {&(0x7f0000002880)=@in6={0xa, 0x4e22, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2a99d3d5}, 0x1c, &(0x7f0000003c00)=[{&(0x7f00000028c0)="657801adcc9052d48744d143f0e0976bc695443ceee4804ac9af1987e73c1ef34cd05ab13ff4938729ef200bb08817bf228b975fda0fdd66ff78ad627ac274bb8c1626bf", 0x44}, {&(0x7f0000002940)="e3ae203c31129633c35668ea47743d7ac69b671edee3b1b997c5f77b64cb6cc0f62c62219600820685c65d8fb80d1d9304bc351cec6b7f0ed598e4edc02de4bae7cfd2bb90018d2a9e5bd6419324b48aeac5fa3450b5dc0237997303d107f1fddd250653b1c1103918d99210d45fb1589641f07af2bda62e8a322907d04e7250a98d2d5ca303fd910f87abb378dfb1757f83ca1367a06d59c6e26593d0a77c275ce37076c475dadf0fedc412cb9096fc6d4af75ea427657ddbb84844e976fa5373dce8e7480841d07418a0eff8728ce5ae6e589977f3d173106e60fe842fe3068dc7ac26b0eb94e27c642696105941c2c1af5de5", 0xf4}, {&(0x7f0000002c00)="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", 0x1000}, {&(0x7f0000002a40)="afe435c2d26c660a6e4748d85da49a25f633954f5cac3e38b0caf3da33fa432e523b5eabc536797804124b1ccf745f0fc46caa9bcd8dfaf523a3718d14ca6d3b7dce72ec98f63b93f7fd9dea56c574f12d9045d0260369203aac7520313c8c1d432ea24fddf1b2b01773915aabb5799389f7b0da39", 0x75}, {&(0x7f0000002ac0)="d5f73bddb7230bc63bee6aef3cc857fe3b0790765e4e74f0906a6af4c691b7f802c9eeed760e55ee91a6ca36d4b615f4f9435a612e080c0f416ffacd2afa3482b04a242a5de8c1c52ceb0c350937b0ce2488c739e606c2b86a", 0x59}, {&(0x7f0000002b40)="6acd313a907f33ac3d5e0869236f74d6c4229b95a40e7e3a16775cfa", 0x1c}], 0x6, 0x0, 0x0, 0x20000000}, {&(0x7f0000002b80)=@in={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f0000004300)=[{&(0x7f0000003c80)="94b43ab148df690ba3a200a64c9daced2cddb273b29e1db5914bae6a958ebb667cf0f68d29934cdd42a27069c4074e28238fa59d71ce86471cec763fe4ac655a947f9b85732a2f0eba0d2b789d7b6a095a7eb69375dcdb44d258cdd85a1a2560c3e031f35fe19b9ea2f849855d8b87697f49e1709dde3c4ba1564c6e92f32ee8d2394424ab2f8f5aacfd46826422bbb8e1e642c4ff", 0x95}, {&(0x7f0000003d40)="ee3baca170c1b7f74a9c552eb8930abcaeee94012835315c294ea66af674b6566a3b5b4f00674873b05fc02f2bbf6349ef29c2fa09b37e2d4e2da337b131eac753738bfc6654a51cc1a070b49a0a37884ae48ef8f4707e9bc1a96a7911a3e0f8514778bc492ae500381b859c22297692c32094dabdcb520f6c753b34c4ec84f6a0e4958c5fff9b52bbdceb5a72df5246f6b451b8d81a83dca9863228122afe192fc02a0897c2f95794118e98c3a1a9e88388121a0c3aa3dd94", 0xb9}, {&(0x7f0000003e00)="c474614e8186c547ed4d609fcc2ceb1c9ee324231d30fd68fe504ebaaf208d702c10ac8f79d5f28cb3afc6e514447f5ae9a1f1876871caac7d565fd983a0c63e19ced200e7c1c8b3bee2f02ea579dd7d57f76a0da444", 0x56}, {&(0x7f0000003e80)="9d52fcc771a0be4ef2407fdcdf2a201f6c64d3ac073f591b0de847b015f0d5e2895ef84dea96468900b79f27a74dcdc144a2e91c8bf6fb35ec397a3db2c1ffedf6bf0f10873128ac9cd32676c0f2e4e6851648d2965f806e0be63b59804f84cb8b99dfce6216ba1ed3749abd200855a0eab75f4475adeb03e8744c2f86ea5844ca4e0a6f26a91c94025f86f234125a21fb8af7", 0x93}, {&(0x7f0000003f40)="cdbeb7397c53453886030877eee467b1a5df64dde4cecabff944aed03892ce1dc7362d8004f1822d12e49a3b8c7c7ea09ebbbb98b56ecb9a92f6b9b7caaba6adb60378edee31ea3eb79402d8e975bae2f02970e90d74deb1af58e3b0f3591f253a6948dd8c0e1339652f28eb4bad5c0d525a323b3c66711d5a3cb8fd15ddf96400a0e991e277256587aba7d5e41c8d78dc375758899efd8482c811723132920e4175185a649d6d29b2", 0xa9}, {&(0x7f0000004000)="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", 0xfd}, {&(0x7f0000004100)="f6d1f9d02810481941256521e794e1aaa3fdaddca8ecd2b34a6bb60ce7cf13a1b67a4d2404dbfd3636613f2be2877eea8d48d7d21c63dd6c1266668bb2d94a0c4d34d5d51b413222430a114ddb56ab08349183e2e24b5669ee7a80ba70476cfaf697db0886e1faf2026a5e64128ce2e869e2009d56c657da090a1350cd0d49c8d8121f2523a743f0b5c00db846687bf602b25bba07cb270653a6d3df54565f8b5b1c13846d15dd94f4c37c1ba56e377249cefaab8d771b7fe662e8e2f6def17c3ed4ada9330a6fb6263755803d6dba3553147d9fab162fcf88e141e73fc1ee1c443518363467ce34c42407", 0xeb}, {&(0x7f0000004200)="62551e53e2216d0afe3baaf4f721461a0f5c02a50b8c11d26736549fac1801e4891b4415f6333a71edd528555fcb5110802c57000a0037db280f19bc8911489fcd287fafdf4dc4ee6ce0ae5cc7c6d7895c62071ac1b30974bb670a0febe953c34c7b3edf42174b349b96c0b133c33e58542ed892e2794a88f27d1fd9ceb27b153576a75b4dc5c43d3a7c070d2d797e2a6d2280e2e456927b28a950bfda633be00d930767a5609fa6c3a6b435db1fc1657f8283ea5fbad7f57cefc50e29248c3e3c6f363bf757ab39a186ff75ef83e64506831366b6", 0xd5}], 0x8, &(0x7f00000044c0)=[@prinfo={0x18, 0x84, 0x5, {0x10, 0xca}}, @dstaddrv6={0x20, 0x84, 0x8, @remote}, @sndrcv={0x30, 0x84, 0x1, {0x5, 0xfffffffffffffffd, 0x202, 0x3, 0x0, 0xffff, 0x3, 0x81, r4}}], 0x68, 0x80c5}, {&(0x7f0000004540)=@in6={0xa, 0x4e23, 0x0, @local, 0xa8}, 0x1c, &(0x7f0000005680)=[{&(0x7f0000004580)="0f00fd15fa6b57b400b96fe83a10b74a8c3d86ec5ac7dd3dc1a2d1c807b1c683b7766d6eb31407cc41062d5f6a6a46c89a6cf93933061244", 0x38}, {&(0x7f00000045c0)="2ba3f05dda020fc82e6f6613040c7c740630b156023178dca7c1b4a5cefb28bd7ab6d0c842243bc1ca2daa3fdb1e2c7a6c8ef68cee4524584b0a0298317b3f91d65e211ba04ee9dbbcb591a1a8af1a1eee827dd4e9ddab8d50b34f05b02bbb8e9b510b225bd6d7bc33f8e3f8bb36f612d4902e2ae4ee486dfc1d6dbc27ad1e04eaf6a58373657a202830ce410b867b5b4d116b8f3a55fa0da618ec963015f59969a81c0e8bba", 0xa6}, {&(0x7f0000004680)="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", 0x1000}], 0x3, &(0x7f0000005800)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @sndinfo={0x20, 0x84, 0x2, {0x3, 0x200, 0x9, 0x4, r5}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0xfffffffffffff801}}], 0x70, 0x800}, {&(0x7f0000005880)=@in6={0xa, 0x4e20, 0x1, @loopback, 0xffff}, 0x1c, &(0x7f0000005a00)=[{&(0x7f00000058c0)="c4d79b83c3d33cf395cc8c7d6b94b85c4a639ecb7286c15717a977e23d648eb8d996e13da2c8adf640582c4d697600762cf71eedd601997c818b2f68a54040db9b5831331fdc46876a125a33f7d38e138162529ac58bbf3ad647534a2e636130a6bec95fda3a3d35d01636f11d64657c0314c69fa5e872aa74df7900cc654e8ad654162b2f367b521f82af34a2bee85fa19e6d6fdaa35e2398560a055abb25080e0934401f1742d8364ee4aad28b0660003088291b2b7848db51dc104794f2e3c8775bf1b1b8", 0xc6}, {&(0x7f00000059c0)="9550e9906a8e32657f691ae0f231bedd1370", 0x12}], 0x2, &(0x7f0000005c00)=[@authinfo={0x18, 0x84, 0x6, {0x80000001}}, @sndrcv={0x30, 0x84, 0x1, {0x7a487a80, 0x100, 0x0, 0x5, 0xa532, 0x9, 0x4, 0x5, r6}}, @init={0x18, 0x84, 0x0, {0x0, 0x0, 0x6, 0x97d}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0xffff}}, @sndrcv={0x30, 0x84, 0x1, {0x1, 0x5, 0x8000, 0x3cea, 0x80000000, 0x6b3, 0x8, 0x5, r7}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x800}}, @dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0x17}}], 0xe0}, {&(0x7f0000005d00)=@in={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f0000005dc0)=[{&(0x7f0000005d40)="16f2132a2059ede0395c9891c3d7ae1d9dcb664cfa23fcb64221be0d0783dd717810627dca962be63e79e9ee4d0c9cf767e9207deac3dba6ff01c8b0089d67f691", 0x41}], 0x1, &(0x7f0000005e00)=[@prinfo={0x18, 0x84, 0x5, {0x30, 0x40}}, @dstaddrv6={0x20, 0x84, 0x8, @local}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}, @init={0x18, 0x84, 0x0, {0x9, 0x6, 0x3, 0x1}}, @init={0x18, 0x84, 0x0, {0x4d8b0e9, 0xff, 0x0, 0xfff}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}], 0xa0, 0x800}, {&(0x7f0000005ec0)=@in6={0xa, 0x4e20, 0x401, @loopback, 0x8}, 0x1c, &(0x7f0000006300)=[{&(0x7f0000005f00)="abf6b2a9ebc18f7981c6", 0xa}, {&(0x7f0000005f40)="d1f3997dd458c8dfc22b363f61769a3740a1a4ed3ebf39cca731ca6df487d5597607831970e2f81f5994cda132ff5fade27d876387649a5676c0d5938bf734ad331ae1bc87a787b0faaec47895d3c3b1e2588d68f4e2f669d61efa7c1252889b8019616f1190a9f132c8aa480432ee3ecacac727c4295718387ebe980bd8366c4cd4832ec4ccc701402e02327948b643441189c6246099e33b0e484d5eba467a91a1cd9eaea61043a9355c9e8e1cf0acd805c1b9709436f249723900d176", 0xbe}, {&(0x7f0000006000)="565711f2c3b7", 0x6}, {&(0x7f0000006040)="c480ab042c761cb1c8e7071cd84680d55205acd13a269e6d2588d2a312ebea5d0d9b62043628abeabf28361b3a956f9b320886a122cc5bf0225cfc9a4560905d5ff5eff2fd2a3c5d4d4a30b851f2f5afd51988c21520f27a1af4def46f7c2486b20985251745f0eb605ebcee313f0ad608f1ba263a28e4ff5fb8aa208b6344384c7042f57efae24fbd93c59d0ad7abfcdb6afc962247f06a1a498df9ea814bd1680e73f2c8c4b84bfe6d141bbf0e8859a78a2603e1c90744f28a23ae303c4b6de51d76ad06f692e3531cac3f8557ad76ec9fa746803b45a5a56b8c050d9cb33fd7bf841d2a18460ecf95d045e72735bd607cf77bfd2a08719685911fb2d4bd", 0xff}, {&(0x7f0000006140)="23cd2c7f35c4645e95d0352fa67a7c8f17d7ea6aef06a015f3a3134030a1533cc987773927661d2e263a9aa44f5d4548b82dde", 0x33}, {&(0x7f0000006180)="0d303d8e9d81f301f1f1de17d433d8fb2be1f8b0dda38ababb87880696", 0x1d}, {&(0x7f00000061c0)="7860d4797e86bed44a763d2850010f25b60971c6c70c957effb0ca29850f5a", 0x1f}, {&(0x7f0000006200)="d5b89eb3a6d0990480e675a8e8eeab556b530b4cf3beb913e239b44fee7bcd91ec8e7dcd02e23c3de197ce62e994585808c6c691b2163e5c95484b3fcc3b656f4f0d3b19a356fbda8985b0c4468fa879efbd04a7fc20007115ab5a3a10749fdac433ef7f0572ee82726bf76394d30e9a4d826ee4bbaebcea110db8aa31a77ee02679371aefe00665afe6bac8f4cf995baee838ea527b", 0x96}, {&(0x7f00000062c0)="5a3a7954b8f3282b5dd2765e", 0xc}], 0x9, &(0x7f0000006540)=[@prinfo={0x18, 0x84, 0x5, {0x20, 0x2}}, @init={0x18, 0x84, 0x0, {0x7, 0x699a, 0x5c25, 0x1ff}}, @sndrcv={0x30, 0x84, 0x1, {0xda, 0x1, 0x6, 0x100000000, 0xffffffffffffff1b, 0x76, 0x100000000, 0x4, r8}}, @sndrcv={0x30, 0x84, 0x1, {0xffffffffffffffff, 0x0, 0x4, 0x5, 0x8, 0x0, 0x400, 0xfffffffffffffffb, r9}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x3}}], 0xa8, 0x8000}, {&(0x7f0000006600)=@in={0x2, 0x4e24, @remote}, 0x10, &(0x7f0000006640), 0x0, &(0x7f0000006700)=[@sndrcv={0x30, 0x84, 0x1, {0x9, 0x4, 0x4, 0x1, 0xfc, 0x7ff, 0xfffffffffffffffe, 0x1ff, r10}}, @init={0x18, 0x84, 0x0, {0x81, 0x8, 0x9, 0x7fffffff}}], 0x48, 0x44080}], 0x8, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffff9c, 0x10, &(0x7f0000000100)={&(0x7f00000000c0), 0x0, 0xffffffffffffffff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=r11, 0x4) [ 988.121371][ T1441] FAULT_INJECTION: forcing a failure. [ 988.121371][ T1441] name failslab, interval 1, probability 0, space 0, times 0 [ 988.150072][ T1441] CPU: 0 PID: 1441 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 988.157993][ T1441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 988.168063][ T1441] Call Trace: [ 988.171384][ T1441] dump_stack+0x172/0x1f0 [ 988.175746][ T1441] should_fail.cold+0xa/0x15 [ 988.175775][ T1441] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 988.175801][ T1441] ? ___might_sleep+0x163/0x280 [ 988.175827][ T1441] __should_failslab+0x121/0x190 [ 988.175851][ T1441] should_failslab+0x9/0x14 [ 988.191085][ T1441] kmem_cache_alloc_node_trace+0x270/0x720 [ 988.191116][ T1441] __kmalloc_node+0x3d/0x70 [ 988.191136][ T1441] kvmalloc_node+0xbd/0x100 [ 988.210852][ T1441] btrfs_mount_root+0x12b/0x1220 [ 988.220289][ T1441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 988.226551][ T1441] ? btrfs_decode_error+0x70/0x70 [ 988.226575][ T1441] ? rcu_read_lock_sched_held+0x110/0x130 [ 988.226591][ T1441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 988.226607][ T1441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 988.226624][ T1441] ? vfs_parse_fs_string+0x111/0x170 [ 988.226640][ T1441] ? vfs_parse_fs_string+0x111/0x170 [ 988.226656][ T1441] ? rcu_read_lock_sched_held+0x110/0x130 [ 988.226673][ T1441] ? kfree+0x1fa/0x230 14:54:39 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x40800, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000400)=0x2) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x5}, 0xc, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB="00000000317e6bb4403e88df70b0e46e61a1023166ddc9de37f6306cf468f38c3bd5ffd3b24f4d73c32090a188ec24cd38cf3793c76dc2f24f4c7cd16dd38e32a6e1d0186be50cdc0e990c27dd12c9a934280600e0ff3a5661b393f36067e001a6afd69f6757085d4cd38abc0000000000000000000072f7b4afe036b2696fac029067ae0158682202000000daa50bbcf068118fb758fa18df93798727c1e924f63187994caca08cb161ffc8a9172c25a5c72d8e3e57f106ed7064ba8c49ce450f99af5375e1a93298c31188f6f4143df1a51e2a6ac6bf960421b957f1e71fbc811cec0e57f9719e99fd107e0208c9cd31d868188904d59c6e321a55992f84ccc8ec5b76fac085db94ccb971ea83b93138ba73c3a780b6", @ANYRES16=r2, @ANYBLOB="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"], 0x128}, 0x1, 0x0, 0x0, 0x844}, 0x80) r3 = socket$inet_udplite(0x2, 0x2, 0x88) fchdir(r3) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_open_dev$admmidi(&(0x7f0000000380)='/dev/admmidi#\x00', 0x4, 0x10000) r4 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r4, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 988.226698][ T1441] ? vfs_parse_fs_string+0x116/0x170 [ 988.275475][ T1441] ? btrfs_decode_error+0x70/0x70 [ 988.280513][ T1441] legacy_get_tree+0xf2/0x200 [ 988.285214][ T1441] vfs_get_tree+0x123/0x450 [ 988.289740][ T1441] fc_mount+0x17/0xc0 [ 988.293738][ T1441] vfs_kern_mount.part.0+0xd8/0xf0 [ 988.298864][ T1441] vfs_kern_mount+0x40/0x60 [ 988.303384][ T1441] btrfs_mount+0x2b4/0x15e2 [ 988.307901][ T1441] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 988.313550][ T1441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 988.313568][ T1441] ? should_fail+0x1de/0x852 [ 988.313588][ T1441] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 988.313609][ T1441] ? btrfs_remount+0x11f0/0x11f0 [ 988.313636][ T1441] ? rcu_read_lock_sched_held+0x110/0x130 [ 988.313651][ T1441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 988.313666][ T1441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 988.313687][ T1441] ? vfs_parse_fs_string+0x111/0x170 [ 988.324530][ T1441] ? vfs_parse_fs_string+0x111/0x170 [ 988.324549][ T1441] ? rcu_read_lock_sched_held+0x110/0x130 [ 988.324567][ T1441] ? kfree+0x1fa/0x230 [ 988.324584][ T1441] ? vfs_parse_fs_string+0x116/0x170 [ 988.324605][ T1441] ? btrfs_remount+0x11f0/0x11f0 [ 988.324619][ T1441] legacy_get_tree+0xf2/0x200 [ 988.324634][ T1441] ? btrfs_remount+0x11f0/0x11f0 [ 988.324646][ T1441] ? legacy_get_tree+0xf2/0x200 [ 988.324662][ T1441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 988.324682][ T1441] vfs_get_tree+0x123/0x450 [ 988.409477][ T1441] do_mount+0x1436/0x2c40 [ 988.413834][ T1441] ? copy_mount_string+0x40/0x40 [ 988.418784][ T1441] ? _copy_from_user+0xdd/0x150 [ 988.423679][ T1441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 988.429966][ T1441] ? copy_mount_options+0x280/0x3a0 [ 988.435180][ T1441] ksys_mount+0xdb/0x150 [ 988.439433][ T1441] __x64_sys_mount+0xbe/0x150 [ 988.444127][ T1441] do_syscall_64+0x103/0x610 [ 988.448736][ T1441] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 988.454634][ T1441] RIP: 0033:0x45b69a 14:54:39 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x40, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket$inet_sctp(0x2, 0x5, 0x84) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="00fb580307d372a7136ab14170355e0ed5b2f4c3c05ecaeffa98d92dc4c924a299edad1e05107cb0232ca6a8e71d520945355d875e05391805d043938befae13002484687f062e11fa3372fcc6e54572f360b4043880059a"], 0x58, 0x1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x7ff, 0x0, 0x1, 0x8000000}, 0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000002c0)={0xdc, {{0xa, 0x4e21, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3ff}}}, 0x88) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f00000000c0)) [ 988.458546][ T1441] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 988.478152][ T1441] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 988.486570][ T1441] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 988.494552][ T1441] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 988.502539][ T1441] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 988.510516][ T1441] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 988.510533][ T1441] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300090900000000000000000000000200090000000000000000000000008002000100000000000000000b00000000030005000000000002000000e00000010000000000000000"], 0x48}}, 0x0) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0xa, 0x7, 0x0, 0x10, 0x0, 0x70bd25, 0x25dfdbfd, [@sadb_x_policy={0x8, 0x12, 0x2, 0x3, 0x0, 0x6e6bbd, 0x5, {0x6, 0x32, 0x7, 0x7, 0x0, 0x5, 0x0, @in6=@dev={0xfe, 0x80, [], 0x1b}, @in6=@mcast1}}, @sadb_x_nat_t_type={0x1, 0x14, 0x6}, @sadb_address={0x5, 0x6, 0xff, 0x20, 0x0, @in6={0xa, 0x4e23, 0xbd, @mcast2}}]}, 0x80}}, 0x1) 14:54:39 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x34000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:39 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x4800, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:39 executing program 2 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x2000, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x380000000000, 0x82000) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000280)={0x6001, 0x4000}) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) getsockopt$inet6_dccp_buf(r2, 0x21, 0xf, &(0x7f0000000140)=""/169, &(0x7f0000000200)=0xa9) 14:54:39 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x400300, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 988.753382][ T1469] FAULT_INJECTION: forcing a failure. [ 988.753382][ T1469] name failslab, interval 1, probability 0, space 0, times 0 14:54:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x8001}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000140)={r2, 0xb1d}, &(0x7f0000000180)=0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 988.822605][ T1469] CPU: 0 PID: 1469 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 988.830529][ T1469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 988.840590][ T1469] Call Trace: [ 988.843906][ T1469] dump_stack+0x172/0x1f0 [ 988.848279][ T1469] should_fail.cold+0xa/0x15 [ 988.852885][ T1469] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 988.852935][ T1469] ? ___might_sleep+0x163/0x280 [ 988.852958][ T1469] __should_failslab+0x121/0x190 [ 988.868543][ T1469] should_failslab+0x9/0x14 [ 988.873057][ T1469] kmem_cache_alloc+0x2b2/0x6f0 [ 988.877916][ T1469] ? fc_mount+0x17/0xc0 [ 988.882080][ T1469] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 988.887375][ T1469] ? vfs_kern_mount+0x40/0x60 [ 988.892064][ T1469] ? btrfs_mount+0x2b4/0x15e2 [ 988.896756][ T1469] ? legacy_get_tree+0xf2/0x200 [ 988.901610][ T1469] ? vfs_get_tree+0x123/0x450 [ 988.906294][ T1469] ? do_mount+0x1436/0x2c40 [ 988.910801][ T1469] ? ksys_mount+0xdb/0x150 [ 988.915232][ T1469] getname_kernel+0x53/0x370 [ 988.919844][ T1469] kern_path+0x20/0x40 [ 988.923927][ T1469] lookup_bdev.part.0+0x7b/0x1b0 [ 988.928875][ T1469] ? blkdev_open+0x290/0x290 [ 988.933472][ T1469] ? lock_downgrade+0x880/0x880 [ 988.938343][ T1469] blkdev_get_by_path+0x81/0x130 [ 988.943307][ T1469] btrfs_scan_one_device+0xd3/0x720 [ 988.948524][ T1469] ? kfree+0x173/0x230 [ 988.952609][ T1469] ? device_list_add+0x14d0/0x14d0 [ 988.957739][ T1469] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 988.963566][ T1469] ? btrfs_mount_root+0xb36/0x1220 [ 988.968702][ T1469] btrfs_mount_root+0x718/0x1220 [ 988.973660][ T1469] ? btrfs_decode_error+0x70/0x70 [ 988.978705][ T1469] ? rcu_read_lock_sched_held+0x110/0x130 [ 988.984437][ T1469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 988.990687][ T1469] ? vfs_parse_fs_string+0x111/0x170 [ 988.995993][ T1469] ? vfs_parse_fs_string+0x111/0x170 [ 989.001293][ T1469] ? rcu_read_lock_sched_held+0x110/0x130 [ 989.007022][ T1469] ? kfree+0x1fa/0x230 [ 989.011100][ T1469] ? vfs_parse_fs_string+0x116/0x170 [ 989.016411][ T1469] ? btrfs_decode_error+0x70/0x70 [ 989.021443][ T1469] legacy_get_tree+0xf2/0x200 [ 989.026134][ T1469] vfs_get_tree+0x123/0x450 [ 989.030653][ T1469] fc_mount+0x17/0xc0 [ 989.034650][ T1469] vfs_kern_mount.part.0+0xd8/0xf0 [ 989.039775][ T1469] vfs_kern_mount+0x40/0x60 [ 989.044297][ T1469] btrfs_mount+0x2b4/0x15e2 [ 989.048813][ T1469] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 989.054453][ T1469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 989.060702][ T1469] ? should_fail+0x1de/0x852 [ 989.065314][ T1469] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 989.071133][ T1469] ? btrfs_remount+0x11f0/0x11f0 [ 989.076094][ T1469] ? rcu_read_lock_sched_held+0x110/0x130 [ 989.081824][ T1469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 989.088080][ T1469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 989.094335][ T1469] ? vfs_parse_fs_string+0x111/0x170 [ 989.099629][ T1469] ? vfs_parse_fs_string+0x111/0x170 [ 989.104930][ T1469] ? rcu_read_lock_sched_held+0x110/0x130 [ 989.110665][ T1469] ? kfree+0x1fa/0x230 [ 989.114745][ T1469] ? vfs_parse_fs_string+0x116/0x170 [ 989.120049][ T1469] ? btrfs_remount+0x11f0/0x11f0 [ 989.124993][ T1469] legacy_get_tree+0xf2/0x200 [ 989.129684][ T1469] ? btrfs_remount+0x11f0/0x11f0 [ 989.134625][ T1469] ? legacy_get_tree+0xf2/0x200 [ 989.139488][ T1469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 989.145795][ T1469] vfs_get_tree+0x123/0x450 [ 989.150310][ T1469] do_mount+0x1436/0x2c40 [ 989.154656][ T1469] ? copy_mount_string+0x40/0x40 [ 989.159613][ T1469] ? copy_mount_options+0x1f8/0x3a0 [ 989.164819][ T1469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:54:40 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x1000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 989.171070][ T1469] ? copy_mount_options+0x280/0x3a0 [ 989.176290][ T1469] ksys_mount+0xdb/0x150 [ 989.180548][ T1469] __x64_sys_mount+0xbe/0x150 [ 989.185258][ T1469] do_syscall_64+0x103/0x610 [ 989.189867][ T1469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 989.195760][ T1469] RIP: 0033:0x45b69a [ 989.199658][ T1469] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 989.219278][ T1469] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 989.227700][ T1469] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 989.235676][ T1469] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 989.243654][ T1469] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 989.251632][ T1469] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 989.259608][ T1469] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:40 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200000) r2 = inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000200) inotify_rm_watch(r1, r2) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r3, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x3f00, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:40 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000140)=""/107) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40008}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x38, r2, 0x0, 0x70bd28, 0x25dfdbfd, {{}, 0x0, 0x4101, 0x0, {0x1c, 0x17, {0x8, 0x0, @l2={'ib', 0x3a, 'syzkaller0\x00'}}}}, ["", "", "", "", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x1) r3 = add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)="f17b6d73963a875b8403685d7d742768a3b912827d30f8d7a1967de0074e6be3af2e5b0cb1a915529b1fc11b06a4a636b16f880b47fc902328ac401be608771dc673cdb37df524360f3d1883871416eee04378831f18d98ba23694a3d11a7f64ed9d5a231e51e9ffa248f1787868dadcf3105dcae6161f13e0171f8fac9b6196b3eafc281c313b713e46e7050a89b18485ed9a18a208a06282ffe4ba4d019b57ac2bdbb8c100fb7ce88a6fc2824322620bcf0a9c702bc44f2eb5c65486d3397850632e6ed236fffa97dc8be5ea317358885e12170873e0b1513bcd11cfd57997d6f85adba7906d880189598c", 0xec, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r3) 14:54:40 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x10000e0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:40 executing program 2 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x4, 0x0, 0x0, 0xffffffffffffffff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 989.531641][ T1612] FAULT_INJECTION: forcing a failure. [ 989.531641][ T1612] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 989.544896][ T1612] CPU: 1 PID: 1612 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 989.552794][ T1612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 989.562849][ T1612] Call Trace: [ 989.566154][ T1612] dump_stack+0x172/0x1f0 [ 989.570509][ T1612] should_fail.cold+0xa/0x15 [ 989.575125][ T1612] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 989.580952][ T1612] ? __lock_acquire+0x548/0x3fb0 [ 989.585907][ T1612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 989.592161][ T1612] should_fail_alloc_page+0x50/0x60 [ 989.597377][ T1612] __alloc_pages_nodemask+0x1a1/0x7e0 [ 989.602775][ T1612] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 989.608502][ T1612] ? find_held_lock+0x35/0x130 [ 989.613294][ T1612] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 989.619113][ T1612] cache_grow_begin+0x9c/0x860 [ 989.623897][ T1612] ? getname_kernel+0x53/0x370 [ 989.628678][ T1612] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 989.634931][ T1612] kmem_cache_alloc+0x62d/0x6f0 [ 989.639794][ T1612] ? fc_mount+0x17/0xc0 [ 989.643970][ T1612] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 989.649265][ T1612] ? vfs_kern_mount+0x40/0x60 [ 989.653949][ T1612] ? legacy_get_tree+0xf2/0x200 [ 989.658814][ T1612] getname_kernel+0x53/0x370 [ 989.663426][ T1612] kern_path+0x20/0x40 [ 989.667510][ T1612] lookup_bdev.part.0+0x7b/0x1b0 [ 989.672470][ T1612] ? blkdev_open+0x290/0x290 [ 989.677070][ T1612] ? lock_downgrade+0x880/0x880 [ 989.681948][ T1612] blkdev_get_by_path+0x81/0x130 [ 989.686904][ T1612] btrfs_scan_one_device+0xd3/0x720 [ 989.692116][ T1612] ? kfree+0x173/0x230 [ 989.696205][ T1612] ? device_list_add+0x14d0/0x14d0 [ 989.701330][ T1612] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 989.707149][ T1612] ? btrfs_mount_root+0xb36/0x1220 [ 989.712274][ T1612] btrfs_mount_root+0x718/0x1220 [ 989.717234][ T1612] ? btrfs_decode_error+0x70/0x70 [ 989.722281][ T1612] ? rcu_read_lock_sched_held+0x110/0x130 [ 989.728032][ T1612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 989.734285][ T1612] ? vfs_parse_fs_string+0x111/0x170 [ 989.739586][ T1612] ? vfs_parse_fs_string+0x111/0x170 [ 989.744884][ T1612] ? rcu_read_lock_sched_held+0x110/0x130 [ 989.750620][ T1612] ? kfree+0x1fa/0x230 [ 989.754702][ T1612] ? vfs_parse_fs_string+0x116/0x170 [ 989.760007][ T1612] ? btrfs_decode_error+0x70/0x70 [ 989.765052][ T1612] legacy_get_tree+0xf2/0x200 [ 989.769747][ T1612] vfs_get_tree+0x123/0x450 [ 989.774275][ T1612] fc_mount+0x17/0xc0 [ 989.778271][ T1612] vfs_kern_mount.part.0+0xd8/0xf0 [ 989.783399][ T1612] vfs_kern_mount+0x40/0x60 [ 989.787923][ T1612] btrfs_mount+0x2b4/0x15e2 [ 989.792439][ T1612] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 989.798083][ T1612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 989.804335][ T1612] ? should_fail+0x1de/0x852 [ 989.808940][ T1612] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 989.814759][ T1612] ? btrfs_remount+0x11f0/0x11f0 [ 989.819715][ T1612] ? rcu_read_lock_sched_held+0x110/0x130 [ 989.825442][ T1612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:54:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) acct(&(0x7f0000000280)='./file0\x00') setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f00000001c0)=[{&(0x7f0000000200)=@in6={0xa, 0x4e21, 0x5, @empty, 0x1}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000140)="93", 0x1}], 0x1, 0x0, 0x0, 0x4}], 0x1, 0x0) 14:54:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000000140), 0x0, 0x0) 14:54:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd0706f963a3c09256629724cc75812ed2a610ad45de2cff476b001d1e6c502d366afee0ff24cb3da35547589b8ceaa0954b9ba0f9f0618f09eee03fff80a54d942377c1bde23b1421e7b1d7c8f406fe9be9f7057919aadbfdebbd3473ac0") r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x6, 0x101000) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r1, 0xfb, 0x100, 0xf6, 0x5, 0x2}, 0x14) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1040}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x304, 0x70bd28, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000004) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:40 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) r2 = semget$private(0x0, 0x3, 0x2) semctl$IPC_RMID(r2, 0x0, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x34000, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 989.831708][ T1612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 989.837945][ T1612] ? vfs_parse_fs_string+0x111/0x170 [ 989.843237][ T1612] ? vfs_parse_fs_string+0x111/0x170 [ 989.848532][ T1612] ? rcu_read_lock_sched_held+0x110/0x130 [ 989.854267][ T1612] ? kfree+0x1fa/0x230 [ 989.858349][ T1612] ? vfs_parse_fs_string+0x116/0x170 [ 989.863656][ T1612] ? btrfs_remount+0x11f0/0x11f0 [ 989.868605][ T1612] legacy_get_tree+0xf2/0x200 [ 989.873292][ T1612] ? btrfs_remount+0x11f0/0x11f0 [ 989.878226][ T1612] ? legacy_get_tree+0xf2/0x200 [ 989.878243][ T1612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 989.878260][ T1612] vfs_get_tree+0x123/0x450 [ 989.878279][ T1612] do_mount+0x1436/0x2c40 [ 989.878302][ T1612] ? copy_mount_string+0x40/0x40 [ 989.878320][ T1612] ? _copy_from_user+0xdd/0x150 [ 989.878340][ T1612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 989.878354][ T1612] ? copy_mount_options+0x280/0x3a0 [ 989.878373][ T1612] ksys_mount+0xdb/0x150 [ 989.908037][ T1612] __x64_sys_mount+0xbe/0x150 [ 989.928360][ T1612] do_syscall_64+0x103/0x610 [ 989.932964][ T1612] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 989.938860][ T1612] RIP: 0033:0x45b69a [ 989.938876][ T1612] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 989.938885][ T1612] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 989.938901][ T1612] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a 14:54:40 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="0212b30200080000000000005c6d0000000000000000000000000000d15520a67fc2cd75f1148cf07bab31505194f31363f9810ddb92f3e9ededd35c9dbcd31e9e1a0651c90ac9bd77e33cb3f590f94207ffffff7fbbae626dde08d2ecef8609aa67fe58b521cd396f1533c77703eeabe5aa8d32d4bdd720aacd076841d299672576aa932050f3b5f4d73bba7ddcf687c21533e8d9e68fd321ebf5246e67026b7b6c9c8e069f2c983b93f9e3bff0e36b3be81b66d84c542daa15b106201ae7e7546f118e563b339f5418cf69589433fc9f072962b346f2e22b5f45bb816c793d52a1e5fcec300a6f04e6"], 0x30}}, 0x4) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="0203ff090900000000000000000000000200090000000000000000000000000002000100000000000000000b00000000030005000000000002000000e0000001000000000000000079ff3da3152cbcd0a617f5fc3f"], 0x48}}, 0x0) 14:54:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) fcntl$setpipe(r1, 0x407, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000100)=[@in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e24, 0x68ba53a3, @mcast1, 0x9a}], 0x4c) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000200)=""/130) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 989.938911][ T1612] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 989.938921][ T1612] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 989.938930][ T1612] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 989.938943][ T1612] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:41 executing program 2 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:41 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x2000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x400300, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:41 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:41 executing program 4: r0 = add_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000200)="c4d38608c189b56cb3799c894eea676d9b22cfefbd6be34fba3088f206ded743d4f39c4d82846a2b7079fcc6493b06e7b86a31472042f8615cfb3f670dac5320c80619285f4a5e807b27f00da02aeef80f087c1c43097ebc5c772877974c8d1841a4cf3a6f681bb0c1d9e8bb368bc7bf79761dfb46fcb9d87f43470e11cb63d1e9a238e1a7165b9d0a4f74ee35ce01bd7c97862a8de319c65c2226e32befff06519822406dbd066e962438b441de", 0xae, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000002c0)=',ppp0vmnet0\x00', 0xfffffffffffffff9) keyctl$link(0x8, r0, r1) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 990.205374][ T1650] FAULT_INJECTION: forcing a failure. [ 990.205374][ T1650] name failslab, interval 1, probability 0, space 0, times 0 [ 990.224620][ T1650] CPU: 0 PID: 1650 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 990.232534][ T1650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 990.242597][ T1650] Call Trace: [ 990.245909][ T1650] dump_stack+0x172/0x1f0 [ 990.250271][ T1650] should_fail.cold+0xa/0x15 [ 990.254882][ T1650] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 990.260710][ T1650] ? ___might_sleep+0x163/0x280 [ 990.265575][ T1650] __should_failslab+0x121/0x190 [ 990.270536][ T1650] should_failslab+0x9/0x14 [ 990.275063][ T1650] kmem_cache_alloc_trace+0x2d1/0x760 [ 990.280449][ T1650] ? kasan_kmalloc+0x9/0x10 [ 990.284970][ T1650] ? __kmalloc_node+0x4e/0x70 [ 990.289667][ T1650] btrfs_mount_root+0x1d0/0x1220 [ 990.294623][ T1650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 990.300876][ T1650] ? btrfs_decode_error+0x70/0x70 [ 990.305913][ T1650] ? rcu_read_lock_sched_held+0x110/0x130 [ 990.311640][ T1650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 990.317907][ T1650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 990.324165][ T1650] ? vfs_parse_fs_string+0x111/0x170 [ 990.329658][ T1650] ? vfs_parse_fs_string+0x111/0x170 [ 990.334958][ T1650] ? rcu_read_lock_sched_held+0x110/0x130 [ 990.334978][ T1650] ? kfree+0x1fa/0x230 [ 990.334996][ T1650] ? vfs_parse_fs_string+0x116/0x170 [ 990.335017][ T1650] ? btrfs_decode_error+0x70/0x70 [ 990.335031][ T1650] legacy_get_tree+0xf2/0x200 [ 990.335050][ T1650] vfs_get_tree+0x123/0x450 [ 990.335071][ T1650] fc_mount+0x17/0xc0 [ 990.335088][ T1650] vfs_kern_mount.part.0+0xd8/0xf0 [ 990.335108][ T1650] vfs_kern_mount+0x40/0x60 [ 990.335128][ T1650] btrfs_mount+0x2b4/0x15e2 [ 990.335150][ T1650] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 990.364438][ T1650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 990.364457][ T1650] ? should_fail+0x1de/0x852 [ 990.364477][ T1650] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 990.364499][ T1650] ? btrfs_remount+0x11f0/0x11f0 [ 990.364533][ T1650] ? rcu_read_lock_sched_held+0x110/0x130 [ 990.364549][ T1650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 990.364564][ T1650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 990.364581][ T1650] ? vfs_parse_fs_string+0x111/0x170 [ 990.364596][ T1650] ? vfs_parse_fs_string+0x111/0x170 [ 990.364613][ T1650] ? rcu_read_lock_sched_held+0x110/0x130 [ 990.364631][ T1650] ? kfree+0x1fa/0x230 [ 990.364650][ T1650] ? vfs_parse_fs_string+0x116/0x170 [ 990.453642][ T1650] ? btrfs_remount+0x11f0/0x11f0 [ 990.458594][ T1650] legacy_get_tree+0xf2/0x200 [ 990.463280][ T1650] ? btrfs_remount+0x11f0/0x11f0 [ 990.468226][ T1650] ? legacy_get_tree+0xf2/0x200 [ 990.473091][ T1650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 990.479346][ T1650] vfs_get_tree+0x123/0x450 [ 990.483869][ T1650] do_mount+0x1436/0x2c40 [ 990.488221][ T1650] ? copy_mount_string+0x40/0x40 [ 990.493171][ T1650] ? copy_mount_options+0x1ea/0x3a0 [ 990.498381][ T1650] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 990.503936][ T1650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 990.510178][ T1650] ? copy_mount_options+0x280/0x3a0 [ 990.515392][ T1650] ksys_mount+0xdb/0x150 [ 990.519649][ T1650] __x64_sys_mount+0xbe/0x150 [ 990.524337][ T1650] do_syscall_64+0x103/0x610 [ 990.528941][ T1650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 990.534873][ T1650] RIP: 0033:0x45b69a 14:54:41 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x3000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sync_file_range(r0, 0x200, 0xc1, 0x3) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x4, 0x1) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffff9c, &(0x7f0000000400)={0x16, 0x98, 0xfa00, {&(0x7f00000003c0)={0xffffffffffffffff}, 0x4, 0xffffffffffffffff, 0x30, 0x1, @in={0x2, 0x4e22, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f00000004c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000180), r3}}, 0x18) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) write$binfmt_script(r4, &(0x7f0000000200)={'#! ', './file0', [{0x20, '/proc/sys/net/ipv4/vs/secure_tcp\x00'}, {0x20, '/proc/sys/net/ipv4/vs/secure_tcp\x00'}, {0x20, 'em0'}, {0x20, '/proc/sys/net/ipv4/vs/secure_tcp\x00'}, {0x20, '/proc/sys/net/ipv4/vs/secure_tcp\x00'}, {0x20, '/proc/sys/net/ipv4/vs/secure_tcp\x00'}, {0x20, '/proc/sys/net/ipv4/vs/secure_tcp\x00'}, {}, {0x20, 'systemcpuset'}, {0x20, '/proc/sys/net/ipv4/vs/secure_tcp\x00'}], 0xa, "80103d79c26b5be0b6ef2816322acc7abbe9418e312ec4c019b3dc0c23987f8b1e6fc383285c913c2627373704b2fcc059c7a81db7d95983fcf9b3bbf643bb89c2c9e0bbbdb8cc869ae15b4246ce39bdd4982432f00dac22c61761e3e5697edf43015ae709ccfbfa2f3e13d1ee2b5fc036df1b0360d4532c2287805a13e1950d65d4bbfaa2b76e82be2b6ce80421f1505736fe489d6c3156a580842c9076ece1b51e726a0cbc55b1b8fe16796a7687dfd480f95875"}, 0x1c0) ioctl$TIOCSISO7816(r4, 0xc0285443, &(0x7f0000000100)={0x9, 0x28, 0x707, 0x7fffffff, 0x3}) [ 990.538779][ T1650] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 990.558386][ T1650] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 990.566800][ T1650] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 990.574778][ T1650] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 990.582787][ T1650] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 990.590765][ T1650] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 990.598742][ T1650] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x400000) ioctl$VIDIOC_QUERYSTD(r2, 0x8008563f, &(0x7f0000000100)) socket$l2tp(0x18, 0x1, 0x1) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000140)) 14:54:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x80000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000140)={0xf0, 0xffffffffffffffe0, 0xfffffffffffffffd, 0x3, 0xffffffffffffffff, 0x7}) 14:54:41 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x1000000, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:41 executing program 2 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 990.807386][ T1772] FAULT_INJECTION: forcing a failure. [ 990.807386][ T1772] name failslab, interval 1, probability 0, space 0, times 0 [ 990.820647][ T1772] CPU: 1 PID: 1772 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 990.828546][ T1772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 990.838604][ T1772] Call Trace: [ 990.841913][ T1772] dump_stack+0x172/0x1f0 [ 990.846275][ T1772] should_fail.cold+0xa/0x15 [ 990.850891][ T1772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 990.857144][ T1772] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 990.862973][ T1772] __should_failslab+0x121/0x190 [ 990.867918][ T1772] should_failslab+0x9/0x14 [ 990.872429][ T1772] kmem_cache_alloc+0x47/0x6f0 [ 990.877209][ T1772] ? __lock_acquire+0x548/0x3fb0 [ 990.882173][ T1772] xas_alloc+0x2df/0x3d0 [ 990.886426][ T1772] xas_create+0x2cd/0x1040 [ 990.890865][ T1772] xas_store+0x9a/0x19b0 [ 990.895114][ T1772] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 990.901356][ T1772] ? xas_start+0x166/0x560 [ 990.905788][ T1772] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 990.912038][ T1772] ? xas_load+0x67/0x150 [ 990.916297][ T1772] __add_to_page_cache_locked+0x5be/0xe70 [ 990.922042][ T1772] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 990.928206][ T1772] ? __alloc_pages_nodemask+0x599/0x7e0 [ 990.933773][ T1772] ? count_shadow_nodes+0x500/0x500 [ 990.938992][ T1772] add_to_page_cache_lru+0x1cb/0x760 [ 990.944295][ T1772] ? add_to_page_cache_locked+0x40/0x40 [ 990.949856][ T1772] ? __page_cache_alloc+0x131/0x460 [ 990.955069][ T1772] do_read_cache_page+0xc2e/0x14c0 [ 990.960192][ T1772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 990.966442][ T1772] ? blkdev_writepages+0x30/0x30 [ 990.971398][ T1772] ? blkdev_get+0xcc/0x990 [ 990.975831][ T1772] ? pagecache_get_page+0x740/0x740 [ 990.981048][ T1772] ? bd_may_claim+0xd0/0xd0 [ 990.985563][ T1772] ? lookup_bdev.part.0+0x10e/0x1b0 [ 990.990772][ T1772] ? blkdev_open+0x290/0x290 [ 990.995366][ T1772] ? lock_downgrade+0x880/0x880 [ 991.000237][ T1772] read_cache_page_gfp+0x6e/0x90 [ 991.005200][ T1772] btrfs_scan_one_device+0x19b/0x720 [ 991.010495][ T1772] ? kfree+0x173/0x230 [ 991.014575][ T1772] ? device_list_add+0x14d0/0x14d0 [ 991.019693][ T1772] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 991.025525][ T1772] ? btrfs_mount_root+0xb36/0x1220 [ 991.030652][ T1772] btrfs_mount_root+0x718/0x1220 [ 991.035606][ T1772] ? btrfs_decode_error+0x70/0x70 [ 991.040648][ T1772] ? rcu_read_lock_sched_held+0x110/0x130 [ 991.046374][ T1772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 991.052628][ T1772] ? vfs_parse_fs_string+0x111/0x170 [ 991.057925][ T1772] ? vfs_parse_fs_string+0x111/0x170 [ 991.063222][ T1772] ? rcu_read_lock_sched_held+0x110/0x130 [ 991.068956][ T1772] ? kfree+0x1fa/0x230 [ 991.073038][ T1772] ? vfs_parse_fs_string+0x116/0x170 [ 991.078338][ T1772] ? btrfs_decode_error+0x70/0x70 [ 991.083367][ T1772] legacy_get_tree+0xf2/0x200 [ 991.088078][ T1772] vfs_get_tree+0x123/0x450 [ 991.092594][ T1772] fc_mount+0x17/0xc0 [ 991.096588][ T1772] vfs_kern_mount.part.0+0xd8/0xf0 [ 991.101707][ T1772] vfs_kern_mount+0x40/0x60 [ 991.106225][ T1772] btrfs_mount+0x2b4/0x15e2 [ 991.110750][ T1772] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 991.116387][ T1772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 991.122642][ T1772] ? should_fail+0x1de/0x852 [ 991.127253][ T1772] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 991.133072][ T1772] ? btrfs_remount+0x11f0/0x11f0 [ 991.138031][ T1772] ? rcu_read_lock_sched_held+0x110/0x130 [ 991.143761][ T1772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 991.150010][ T1772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 991.156276][ T1772] ? vfs_parse_fs_string+0x111/0x170 [ 991.161567][ T1772] ? vfs_parse_fs_string+0x111/0x170 [ 991.166860][ T1772] ? rcu_read_lock_sched_held+0x110/0x130 [ 991.172586][ T1772] ? kfree+0x1fa/0x230 [ 991.176666][ T1772] ? vfs_parse_fs_string+0x116/0x170 [ 991.181965][ T1772] ? btrfs_remount+0x11f0/0x11f0 [ 991.186909][ T1772] legacy_get_tree+0xf2/0x200 [ 991.191597][ T1772] ? btrfs_remount+0x11f0/0x11f0 [ 991.196537][ T1772] ? legacy_get_tree+0xf2/0x200 [ 991.201400][ T1772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 991.207659][ T1772] vfs_get_tree+0x123/0x450 [ 991.212214][ T1772] do_mount+0x1436/0x2c40 [ 991.216582][ T1772] ? copy_mount_string+0x40/0x40 [ 991.221529][ T1772] ? _copy_from_user+0xdd/0x150 [ 991.226391][ T1772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 991.232635][ T1772] ? copy_mount_options+0x280/0x3a0 [ 991.237848][ T1772] ksys_mount+0xdb/0x150 [ 991.242103][ T1772] __x64_sys_mount+0xbe/0x150 [ 991.246795][ T1772] do_syscall_64+0x103/0x610 [ 991.251408][ T1772] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 991.257301][ T1772] RIP: 0033:0x45b69a [ 991.261201][ T1772] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 991.280805][ T1772] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 991.289221][ T1772] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 991.297204][ T1772] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 14:54:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x4000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 991.305202][ T1772] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 991.313184][ T1772] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 991.321157][ T1772] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:42 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$dmmidi(&(0x7f00000013c0)='/dev/dmmidi#\x00', 0x1ff, 0x40) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000001480)={0x4, &(0x7f0000001400)=[{}, {}, {}, {}]}) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x4000}, {r0}, {r1, 0xa0}, {r1, 0x20}, {r0, 0x420a}, {r0, 0x10}, {r0, 0x4}, {r0, 0x8}, {r1, 0x5000}], 0x9, 0x7) 14:54:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x2000000, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x5000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:42 executing program 2 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:42 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_sctp(0x2, 0x201, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r0, &(0x7f0000002bc0)=[{&(0x7f00000000c0)=@in6={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1d6}], 0x1, 0x0) 14:54:42 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 991.620020][ T1793] FAULT_INJECTION: forcing a failure. [ 991.620020][ T1793] name failslab, interval 1, probability 0, space 0, times 0 [ 991.640291][ T1793] CPU: 0 PID: 1793 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 991.648200][ T1793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 991.658256][ T1793] Call Trace: [ 991.661568][ T1793] dump_stack+0x172/0x1f0 [ 991.665919][ T1793] should_fail.cold+0xa/0x15 [ 991.670530][ T1793] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 991.676379][ T1793] ? ___might_sleep+0x163/0x280 [ 991.681268][ T1793] __should_failslab+0x121/0x190 [ 991.686217][ T1793] should_failslab+0x9/0x14 [ 991.690730][ T1793] kmem_cache_alloc+0x2b2/0x6f0 [ 991.695590][ T1793] ? fc_mount+0x17/0xc0 [ 991.699755][ T1793] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 991.705052][ T1793] ? vfs_kern_mount+0x40/0x60 [ 991.709738][ T1793] ? btrfs_mount+0x2b4/0x15e2 [ 991.714418][ T1793] ? legacy_get_tree+0xf2/0x200 [ 991.714438][ T1793] ? vfs_get_tree+0x123/0x450 [ 991.723953][ T1793] ? do_mount+0x1436/0x2c40 [ 991.728457][ T1793] ? ksys_mount+0xdb/0x150 [ 991.732884][ T1793] getname_kernel+0x53/0x370 [ 991.737493][ T1793] kern_path+0x20/0x40 [ 991.741579][ T1793] lookup_bdev.part.0+0x7b/0x1b0 [ 991.746529][ T1793] ? blkdev_open+0x290/0x290 [ 991.751129][ T1793] ? lock_downgrade+0x880/0x880 [ 991.756008][ T1793] blkdev_get_by_path+0x81/0x130 [ 991.760962][ T1793] btrfs_scan_one_device+0xd3/0x720 [ 991.766253][ T1793] ? kfree+0x173/0x230 [ 991.770335][ T1793] ? device_list_add+0x14d0/0x14d0 [ 991.775458][ T1793] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 991.781270][ T1793] ? btrfs_mount_root+0xb36/0x1220 [ 991.786433][ T1793] btrfs_mount_root+0x718/0x1220 [ 991.791391][ T1793] ? btrfs_decode_error+0x70/0x70 [ 991.796440][ T1793] ? rcu_read_lock_sched_held+0x110/0x130 [ 991.802172][ T1793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 991.808426][ T1793] ? vfs_parse_fs_string+0x111/0x170 [ 991.813717][ T1793] ? vfs_parse_fs_string+0x111/0x170 [ 991.819007][ T1793] ? rcu_read_lock_sched_held+0x110/0x130 [ 991.824737][ T1793] ? kfree+0x1fa/0x230 [ 991.828814][ T1793] ? vfs_parse_fs_string+0x116/0x170 [ 991.834118][ T1793] ? btrfs_decode_error+0x70/0x70 [ 991.839148][ T1793] legacy_get_tree+0xf2/0x200 [ 991.843837][ T1793] vfs_get_tree+0x123/0x450 [ 991.848351][ T1793] fc_mount+0x17/0xc0 [ 991.852343][ T1793] vfs_kern_mount.part.0+0xd8/0xf0 [ 991.857466][ T1793] vfs_kern_mount+0x40/0x60 [ 991.861982][ T1793] btrfs_mount+0x2b4/0x15e2 [ 991.866497][ T1793] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 991.872143][ T1793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 991.878406][ T1793] ? should_fail+0x1de/0x852 [ 991.883011][ T1793] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 991.888828][ T1793] ? btrfs_remount+0x11f0/0x11f0 [ 991.893783][ T1793] ? rcu_read_lock_sched_held+0x110/0x130 [ 991.899511][ T1793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 991.905764][ T1793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 991.912014][ T1793] ? vfs_parse_fs_string+0x111/0x170 [ 991.917315][ T1793] ? vfs_parse_fs_string+0x111/0x170 [ 991.922611][ T1793] ? rcu_read_lock_sched_held+0x110/0x130 [ 991.928339][ T1793] ? kfree+0x1fa/0x230 [ 991.932413][ T1793] ? vfs_parse_fs_string+0x116/0x170 [ 991.937711][ T1793] ? btrfs_remount+0x11f0/0x11f0 [ 991.942655][ T1793] legacy_get_tree+0xf2/0x200 [ 991.947341][ T1793] ? btrfs_remount+0x11f0/0x11f0 [ 991.952280][ T1793] ? legacy_get_tree+0xf2/0x200 [ 991.957138][ T1793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 991.963481][ T1793] vfs_get_tree+0x123/0x450 [ 991.968009][ T1793] do_mount+0x1436/0x2c40 [ 991.972354][ T1793] ? copy_mount_string+0x40/0x40 [ 991.977304][ T1793] ? _copy_from_user+0xdd/0x150 [ 991.982174][ T1793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 991.988416][ T1793] ? copy_mount_options+0x280/0x3a0 [ 991.993627][ T1793] ksys_mount+0xdb/0x150 [ 991.997878][ T1793] __x64_sys_mount+0xbe/0x150 [ 992.002572][ T1793] do_syscall_64+0x103/0x610 [ 992.007179][ T1793] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 992.013075][ T1793] RIP: 0033:0x45b69a [ 992.016975][ T1793] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 992.036583][ T1793] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 992.044998][ T1793] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 992.052970][ T1793] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 992.060945][ T1793] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 14:54:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101800, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x9) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000140)=0xfffffffffffffff9, 0x4) 14:54:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x4000000, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x6000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 992.068917][ T1793] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 992.076895][ T1793] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 14:54:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="020300090900000000000000000000000200090000000000000000000000000002000100000000000000000b00000000030005000000000002000000e0000001000000d3269ddddd19332253815fc800000000006b2de99e487d"], 0x48}}, 0x0) 14:54:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x7000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="30bd4bdbbaf35734d01b1ed156fd3edfe0f12c5004c5d2b3d1c9c759bcdd7078ded5b3e9996c3a48b9a1d9de8827169fa8e844f9bdf43e967833c6fa05cf7b72ddc69e682963fee107d039b3f034aaf17ae825ef670cf4533d74d6dd0a59a72f65dc7799be54abd73445c302d5871e862625dff834c70621e61d3ecad7004ad0ee6618fa9b44c0f1031592d3cae2686ce1") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040)=0x180000002, 0x4) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x440040, 0x0) r3 = eventfd2(0x4, 0x1) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000002c0)={0x3, r3}) r4 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x4, 0xa0000) syz_open_dev$vbi(&(0x7f0000000300)='/dev/vbi#\x00', 0x2, 0x2) getpeername$llc(r4, &(0x7f00000000c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x20000000, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:43 executing program 2 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 992.414006][ T1821] FAULT_INJECTION: forcing a failure. [ 992.414006][ T1821] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 992.506367][ T1821] CPU: 0 PID: 1821 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 992.514302][ T1821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 992.524358][ T1821] Call Trace: [ 992.527666][ T1821] dump_stack+0x172/0x1f0 [ 992.532015][ T1821] should_fail.cold+0xa/0x15 [ 992.536630][ T1821] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 992.542451][ T1821] ? ___might_sleep+0x163/0x280 [ 992.547323][ T1821] should_fail_alloc_page+0x50/0x60 [ 992.552535][ T1821] __alloc_pages_nodemask+0x1a1/0x7e0 [ 992.557922][ T1821] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 992.563649][ T1821] ? blkdev_get+0x5a4/0x990 [ 992.568172][ T1821] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 992.574425][ T1821] alloc_pages_current+0x107/0x210 [ 992.579553][ T1821] __page_cache_alloc+0x2bd/0x460 [ 992.584601][ T1821] do_read_cache_page+0xc05/0x14c0 [ 992.589768][ T1821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 992.596014][ T1821] ? blkdev_writepages+0x30/0x30 [ 992.596038][ T1821] ? blkdev_get+0xcc/0x990 [ 992.596056][ T1821] ? pagecache_get_page+0x740/0x740 [ 992.596076][ T1821] ? bd_may_claim+0xd0/0xd0 [ 992.596094][ T1821] ? lookup_bdev.part.0+0x10e/0x1b0 [ 992.596117][ T1821] ? blkdev_open+0x290/0x290 [ 992.605457][ T1821] ? lock_downgrade+0x880/0x880 [ 992.605487][ T1821] read_cache_page_gfp+0x6e/0x90 [ 992.605509][ T1821] btrfs_scan_one_device+0x19b/0x720 [ 992.605533][ T1821] ? kfree+0x173/0x230 [ 992.605551][ T1821] ? device_list_add+0x14d0/0x14d0 [ 992.605567][ T1821] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 992.605587][ T1821] ? btrfs_mount_root+0xb36/0x1220 [ 992.605609][ T1821] btrfs_mount_root+0x718/0x1220 [ 992.605636][ T1821] ? btrfs_decode_error+0x70/0x70 [ 992.670083][ T1821] ? rcu_read_lock_sched_held+0x110/0x130 [ 992.675807][ T1821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 992.675826][ T1821] ? vfs_parse_fs_string+0x111/0x170 [ 992.675842][ T1821] ? vfs_parse_fs_string+0x111/0x170 [ 992.675863][ T1821] ? rcu_read_lock_sched_held+0x110/0x130 [ 992.687371][ T1821] ? kfree+0x1fa/0x230 [ 992.687388][ T1821] ? vfs_parse_fs_string+0x116/0x170 [ 992.687408][ T1821] ? btrfs_decode_error+0x70/0x70 [ 992.687421][ T1821] legacy_get_tree+0xf2/0x200 [ 992.687439][ T1821] vfs_get_tree+0x123/0x450 [ 992.687459][ T1821] fc_mount+0x17/0xc0 [ 992.687478][ T1821] vfs_kern_mount.part.0+0xd8/0xf0 [ 992.687499][ T1821] vfs_kern_mount+0x40/0x60 [ 992.702559][ T1821] btrfs_mount+0x2b4/0x15e2 [ 992.712854][ T1821] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 992.745780][ T1821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 992.752038][ T1821] ? should_fail+0x1de/0x852 14:54:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x3f000000, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200000, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:43 executing program 4: socket$netlink(0x10, 0x3, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 992.756642][ T1821] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 992.762471][ T1821] ? btrfs_remount+0x11f0/0x11f0 [ 992.767435][ T1821] ? rcu_read_lock_sched_held+0x110/0x130 [ 992.773164][ T1821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 992.779416][ T1821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 992.785663][ T1821] ? vfs_parse_fs_string+0x111/0x170 [ 992.790962][ T1821] ? vfs_parse_fs_string+0x111/0x170 [ 992.796258][ T1821] ? rcu_read_lock_sched_held+0x110/0x130 [ 992.802011][ T1821] ? kfree+0x1fa/0x230 [ 992.806092][ T1821] ? vfs_parse_fs_string+0x116/0x170 [ 992.811394][ T1821] ? btrfs_remount+0x11f0/0x11f0 [ 992.816401][ T1821] legacy_get_tree+0xf2/0x200 [ 992.821112][ T1821] ? btrfs_remount+0x11f0/0x11f0 [ 992.826057][ T1821] ? legacy_get_tree+0xf2/0x200 [ 992.830916][ T1821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 992.837165][ T1821] vfs_get_tree+0x123/0x450 [ 992.841681][ T1821] do_mount+0x1436/0x2c40 [ 992.846031][ T1821] ? copy_mount_string+0x40/0x40 [ 992.850980][ T1821] ? _copy_from_user+0xdd/0x150 [ 992.855847][ T1821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 992.862094][ T1821] ? copy_mount_options+0x280/0x3a0 [ 992.867306][ T1821] ksys_mount+0xdb/0x150 [ 992.871572][ T1821] __x64_sys_mount+0xbe/0x150 [ 992.876266][ T1821] do_syscall_64+0x103/0x610 [ 992.880870][ T1821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 992.886771][ T1821] RIP: 0033:0x45b69a [ 992.890673][ T1821] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 992.910307][ T1821] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 992.918733][ T1821] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 992.926714][ T1821] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 992.934689][ T1821] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 992.942666][ T1821] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:54:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20000, 0x0) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000100)) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 992.950645][ T1821] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:43 executing program 2 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x20000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:43 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/audio\x00', 0x200000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000640)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000600)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000680)={0x6, 0x118, 0xfa00, {{0xfffffffffffff3de, 0x6, "922b3c3f670152e86626f53baeba7075518e5ab7631379ebc330631a4555a590c8adc7177dfa15a69b6fb3db623f59999f7763a449fc4737cea1b402b940b0ad1a0a9ec27632f9450a575da3997ebe3d3bdfa79c940498ff5c94f3408b49ffb4d23a6616562820176b40bf3003435fcec34f4711c4cc6d409bc57dde03584a8b672f051f19230d4035c9ff7b63a72f5cd324df74681a07e7b0df2463e89afe9b500de171a2e2392c7c73b4028aaba5c1bb964574a6fac5a5e441972643dbb744895cfc9541fa157a637747705a6446fa77ac2e94e7f279e6048bfc8fdb80e0b61b981df12a03a75c917018daa0de1ab359a51f8b89075a53b2faa9d58cbb14dc", 0x61, 0x4, 0x0, 0x3, 0x9, 0x8, 0x5, 0x1}, r2}}, 0xffffff64) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x164) getsockopt$netrom_NETROM_T2(0xffffffffffffffff, 0x103, 0x2, &(0x7f0000000000)=0x6, &(0x7f00000000c0)=0x4) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="02030009250000000000000000020000020009000000000000000000000000001e0018000901e600c42f4558fafb42617a24dcf5f7b32ac748a10c330efd51a8cc3bc270d92689af4c572d3d1abc2de8f509b2108230b84687e47e7e1e875af738cea74e0586d729df7c32368f9b1bb4b1df41236543db3d5050073ddcbea50b25fa71d7c10666587267d18e193916388fd2d53e7268bdc82862919fdcb6f03de1ba2632633dabbeb9e02f146d2827f22473c42a7cbf1faa2c5ef499d0b331c9d9fe34a2129237512879175c840901f6ddf5fb77091d1a2df76ae641e202f2010c7e463e497cb83d29434d7d75837be2e0852ef74c615257054af5e15722612d3d0a7554c71b37414fabf41234fee417bd43f00842b30000030005000000000002000000e000000100000000000000006996a20487347236b8d3134dcd722f7b7dc4ea46072166430968161e82a1d6b5f0f590569317b6662d47ad44"], 0x128}}, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x400603, 0x0) symlinkat(&(0x7f0000000540)='./file0\x00', r3, &(0x7f0000000580)='./file0\x00') name_to_handle_at(r3, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x90, 0x1ff, "c9487a0caf7b208883689cd44642bb6c409bcc15f2645b72ad4b68443f216cf2973d494076995da28bd8a90eeff66203e89e6f4de2a07726aebdb8a1366561e8452daac2a7c6d9e22cd4971b7315dc553aa66579eaf2f636ec8388e8df8872e6d5b13e66fc1840399bc885cadcd5024933bca37accc1a136af560f30561f30434def1319a3397532"}, &(0x7f0000000500), 0x1000) 14:54:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0xffffff7f, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 993.092762][ T1839] FAULT_INJECTION: forcing a failure. [ 993.092762][ T1839] name failslab, interval 1, probability 0, space 0, times 0 [ 993.166043][ T1839] CPU: 0 PID: 1839 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 993.173973][ T1839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 993.184030][ T1839] Call Trace: [ 993.187336][ T1839] dump_stack+0x172/0x1f0 [ 993.191686][ T1839] should_fail.cold+0xa/0x15 [ 993.196292][ T1839] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 993.202108][ T1839] ? find_held_lock+0x35/0x130 [ 993.206883][ T1839] ? blk_queue_enter+0xbcd/0xe90 [ 993.211834][ T1839] __should_failslab+0x121/0x190 [ 993.216781][ T1839] should_failslab+0x9/0x14 [ 993.221293][ T1839] kmem_cache_alloc_node+0x56/0x710 [ 993.226514][ T1839] create_task_io_context+0x33/0x450 [ 993.231814][ T1839] generic_make_request_checks+0x1a62/0x2090 [ 993.237814][ T1839] ? trace_event_raw_event_block_rq_requeue+0x640/0x640 [ 993.244762][ T1839] ? __lock_acquire+0x548/0x3fb0 [ 993.249715][ T1839] ? bio_associate_blkg_from_css+0x4e5/0x990 [ 993.255703][ T1839] generic_make_request+0x24c/0x12d0 [ 993.261001][ T1839] ? blk_queue_enter+0xe90/0xe90 [ 993.265970][ T1839] ? guard_bio_eod+0x1ce/0x6e0 [ 993.270742][ T1839] ? find_held_lock+0x35/0x130 [ 993.275512][ T1839] ? guard_bio_eod+0x1ce/0x6e0 [ 993.280298][ T1839] submit_bio+0xba/0x480 [ 993.284554][ T1839] ? submit_bio+0xba/0x480 [ 993.288983][ T1839] ? generic_make_request+0x12d0/0x12d0 [ 993.294547][ T1839] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 993.300286][ T1839] ? guard_bio_eod+0x295/0x6e0 [ 993.305065][ T1839] submit_bh_wbc+0x5f7/0x7f0 [ 993.309669][ T1839] block_read_full_page+0x7e4/0xd70 [ 993.314879][ T1839] ? check_disk_change+0x140/0x140 [ 993.320029][ T1839] ? __bread_gfp+0x300/0x300 [ 993.324629][ T1839] ? add_to_page_cache_lru+0x34e/0x760 [ 993.330976][ T1839] ? add_to_page_cache_locked+0x40/0x40 [ 993.336545][ T1839] blkdev_readpage+0x1d/0x30 [ 993.341142][ T1839] do_read_cache_page+0xc5c/0x14c0 [ 993.346266][ T1839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 993.352528][ T1839] ? blkdev_writepages+0x30/0x30 [ 993.357482][ T1839] ? blkdev_get+0xcc/0x990 [ 993.361912][ T1839] ? pagecache_get_page+0x740/0x740 [ 993.367125][ T1839] ? bd_may_claim+0xd0/0xd0 [ 993.371639][ T1839] ? lookup_bdev.part.0+0x10e/0x1b0 [ 993.376843][ T1839] ? blkdev_open+0x290/0x290 [ 993.381444][ T1839] ? lock_downgrade+0x880/0x880 [ 993.386359][ T1839] read_cache_page_gfp+0x6e/0x90 [ 993.391314][ T1839] btrfs_scan_one_device+0x19b/0x720 [ 993.396611][ T1839] ? kfree+0x173/0x230 [ 993.400692][ T1839] ? device_list_add+0x14d0/0x14d0 [ 993.405813][ T1839] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 993.411627][ T1839] ? btrfs_mount_root+0xb36/0x1220 [ 993.416758][ T1839] btrfs_mount_root+0x718/0x1220 [ 993.421708][ T1839] ? btrfs_decode_error+0x70/0x70 [ 993.426749][ T1839] ? rcu_read_lock_sched_held+0x110/0x130 [ 993.432485][ T1839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 993.439292][ T1839] ? vfs_parse_fs_string+0x111/0x170 [ 993.444600][ T1839] ? vfs_parse_fs_string+0x111/0x170 [ 993.449883][ T1839] ? rcu_read_lock_sched_held+0x110/0x130 [ 993.455614][ T1839] ? kfree+0x1fa/0x230 [ 993.459693][ T1839] ? vfs_parse_fs_string+0x116/0x170 [ 993.464989][ T1839] ? btrfs_decode_error+0x70/0x70 [ 993.470017][ T1839] legacy_get_tree+0xf2/0x200 [ 993.474708][ T1839] vfs_get_tree+0x123/0x450 [ 993.479218][ T1839] fc_mount+0x17/0xc0 [ 993.483213][ T1839] vfs_kern_mount.part.0+0xd8/0xf0 [ 993.488341][ T1839] vfs_kern_mount+0x40/0x60 [ 993.492860][ T1839] btrfs_mount+0x2b4/0x15e2 [ 993.497372][ T1839] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 993.503012][ T1839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 993.509257][ T1839] ? should_fail+0x1de/0x852 [ 993.513860][ T1839] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 993.519675][ T1839] ? btrfs_remount+0x11f0/0x11f0 [ 993.524633][ T1839] ? rcu_read_lock_sched_held+0x110/0x130 [ 993.530354][ T1839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 993.536602][ T1839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 993.542854][ T1839] ? vfs_parse_fs_string+0x111/0x170 [ 993.548148][ T1839] ? vfs_parse_fs_string+0x111/0x170 [ 993.553437][ T1839] ? rcu_read_lock_sched_held+0x110/0x130 [ 993.559166][ T1839] ? kfree+0x1fa/0x230 [ 993.563246][ T1839] ? vfs_parse_fs_string+0x116/0x170 [ 993.568559][ T1839] ? btrfs_remount+0x11f0/0x11f0 [ 993.573501][ T1839] legacy_get_tree+0xf2/0x200 [ 993.578196][ T1839] ? btrfs_remount+0x11f0/0x11f0 [ 993.583137][ T1839] ? legacy_get_tree+0xf2/0x200 [ 993.587993][ T1839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 993.594243][ T1839] vfs_get_tree+0x123/0x450 [ 993.598754][ T1839] do_mount+0x1436/0x2c40 [ 993.603101][ T1839] ? copy_mount_string+0x40/0x40 [ 993.608050][ T1839] ? _copy_from_user+0xdd/0x150 [ 993.612919][ T1839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 993.619168][ T1839] ? copy_mount_options+0x280/0x3a0 [ 993.624408][ T1839] ksys_mount+0xdb/0x150 [ 993.628660][ T1839] __x64_sys_mount+0xbe/0x150 [ 993.633352][ T1839] do_syscall_64+0x103/0x610 [ 993.637962][ T1839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 993.643855][ T1839] RIP: 0033:0x45b69a [ 993.647757][ T1839] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:54:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x101242, 0x0) setsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000000300)=0xb9, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket$inet_sctp(0x2, 0x3, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) r3 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x3, 0x2) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000200)={'mangle\x00'}, &(0x7f0000000280)=0x54) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x94040, 0x0) write$P9_RLERRORu(r4, &(0x7f0000000140)={0x19, 0x7, 0x1, {{0xc, '\\keyringbdev'}}}, 0x19) socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg$inet_sctp(r2, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) getitimer(0x2, &(0x7f00000000c0)) [ 993.667362][ T1839] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 993.675777][ T1839] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 993.683748][ T1839] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 993.691726][ T1839] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 993.699721][ T1839] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 993.707697][ T1839] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}, 0x1, 0x0, 0x0, 0x0}, 0x0) 14:54:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300090900000000000000000000000200090000000000000000000000000002000100001c9fec24e33b906a180000000000000b00000000030005000000000002120000e00000"], 0x408}}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000240)={@empty, @loopback, 0x0}, &(0x7f0000000280)=0xc) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000002c0)={@empty, r2}, 0x14) 14:54:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x40030000000000, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:44 executing program 2 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x3f000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xb1, &(0x7f00000000c0)="0adcab83564a6fb4c955d0fabb1f523c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x187, 0x40) 14:54:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x15e) ioctl$KDSETMODE(r1, 0x4b3a, 0x7) 14:54:44 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x2) [ 993.965281][ T1863] FAULT_INJECTION: forcing a failure. [ 993.965281][ T1863] name failslab, interval 1, probability 0, space 0, times 0 14:54:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x100000000000000, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 994.041080][ T1863] CPU: 1 PID: 1863 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 994.049003][ T1863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.049011][ T1863] Call Trace: [ 994.049046][ T1863] dump_stack+0x172/0x1f0 [ 994.049073][ T1863] should_fail.cold+0xa/0x15 [ 994.071303][ T1863] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 994.077112][ T1863] ? legacy_get_tree+0xf2/0x200 [ 994.081969][ T1863] ? vfs_get_tree+0x123/0x450 [ 994.086654][ T1863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.092907][ T1863] ? debug_smp_processor_id+0x3c/0x280 [ 994.098387][ T1863] __should_failslab+0x121/0x190 [ 994.103350][ T1863] should_failslab+0x9/0x14 [ 994.103369][ T1863] kmem_cache_alloc+0x47/0x6f0 [ 994.103389][ T1863] ? ___might_sleep+0x163/0x280 [ 994.103409][ T1863] ? mempool_alloc+0x380/0x380 [ 994.103422][ T1863] mempool_alloc_slab+0x47/0x60 [ 994.103440][ T1863] mempool_alloc+0x16b/0x380 [ 994.131703][ T1863] ? mempool_destroy+0x40/0x40 [ 994.136473][ T1863] ? find_held_lock+0x35/0x130 [ 994.141248][ T1863] ? create_empty_buffers+0x59e/0x840 [ 994.146639][ T1863] ? kasan_check_write+0x14/0x20 [ 994.151598][ T1863] bio_alloc_bioset+0x3bf/0x680 [ 994.156463][ T1863] ? bvec_alloc+0x2f0/0x2f0 [ 994.160986][ T1863] submit_bh_wbc+0x133/0x7f0 [ 994.165595][ T1863] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 994.171847][ T1863] block_read_full_page+0x7e4/0xd70 [ 994.177055][ T1863] ? check_disk_change+0x140/0x140 [ 994.182190][ T1863] ? __bread_gfp+0x300/0x300 [ 994.186787][ T1863] ? add_to_page_cache_lru+0x34e/0x760 [ 994.192278][ T1863] ? add_to_page_cache_locked+0x40/0x40 [ 994.197841][ T1863] blkdev_readpage+0x1d/0x30 [ 994.202447][ T1863] do_read_cache_page+0xc5c/0x14c0 [ 994.207564][ T1863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.213811][ T1863] ? blkdev_writepages+0x30/0x30 [ 994.218763][ T1863] ? blkdev_get+0xcc/0x990 [ 994.223190][ T1863] ? pagecache_get_page+0x740/0x740 [ 994.228404][ T1863] ? bd_may_claim+0xd0/0xd0 [ 994.232922][ T1863] ? lookup_bdev.part.0+0x10e/0x1b0 [ 994.238131][ T1863] ? blkdev_open+0x290/0x290 [ 994.242724][ T1863] ? lock_downgrade+0x880/0x880 [ 994.247596][ T1863] read_cache_page_gfp+0x6e/0x90 [ 994.252547][ T1863] btrfs_scan_one_device+0x19b/0x720 [ 994.257839][ T1863] ? kfree+0x173/0x230 [ 994.261919][ T1863] ? device_list_add+0x14d0/0x14d0 [ 994.267050][ T1863] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 994.272874][ T1863] ? btrfs_mount_root+0xb36/0x1220 [ 994.281043][ T1863] btrfs_mount_root+0x718/0x1220 [ 994.286009][ T1863] ? btrfs_decode_error+0x70/0x70 [ 994.291063][ T1863] ? rcu_read_lock_sched_held+0x110/0x130 [ 994.296793][ T1863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.303052][ T1863] ? vfs_parse_fs_string+0x111/0x170 [ 994.308348][ T1863] ? vfs_parse_fs_string+0x111/0x170 [ 994.313642][ T1863] ? rcu_read_lock_sched_held+0x110/0x130 [ 994.319373][ T1863] ? kfree+0x1fa/0x230 [ 994.323454][ T1863] ? vfs_parse_fs_string+0x116/0x170 [ 994.328751][ T1863] ? btrfs_decode_error+0x70/0x70 [ 994.333781][ T1863] legacy_get_tree+0xf2/0x200 [ 994.338473][ T1863] vfs_get_tree+0x123/0x450 [ 994.342987][ T1863] fc_mount+0x17/0xc0 [ 994.346992][ T1863] vfs_kern_mount.part.0+0xd8/0xf0 [ 994.352126][ T1863] vfs_kern_mount+0x40/0x60 [ 994.356646][ T1863] btrfs_mount+0x2b4/0x15e2 [ 994.361162][ T1863] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 994.366801][ T1863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.373063][ T1863] ? should_fail+0x1de/0x852 [ 994.377667][ T1863] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 994.383484][ T1863] ? btrfs_remount+0x11f0/0x11f0 [ 994.388441][ T1863] ? rcu_read_lock_sched_held+0x110/0x130 [ 994.394166][ T1863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.400417][ T1863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.406667][ T1863] ? vfs_parse_fs_string+0x111/0x170 [ 994.411989][ T1863] ? vfs_parse_fs_string+0x111/0x170 [ 994.417303][ T1863] ? rcu_read_lock_sched_held+0x110/0x130 [ 994.423036][ T1863] ? kfree+0x1fa/0x230 [ 994.427116][ T1863] ? vfs_parse_fs_string+0x116/0x170 [ 994.432418][ T1863] ? btrfs_remount+0x11f0/0x11f0 [ 994.437879][ T1863] legacy_get_tree+0xf2/0x200 [ 994.442566][ T1863] ? btrfs_remount+0x11f0/0x11f0 [ 994.447596][ T1863] ? legacy_get_tree+0xf2/0x200 [ 994.452455][ T1863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.458705][ T1863] vfs_get_tree+0x123/0x450 [ 994.463222][ T1863] do_mount+0x1436/0x2c40 [ 994.467588][ T1863] ? copy_mount_string+0x40/0x40 [ 994.472536][ T1863] ? _copy_from_user+0xdd/0x150 [ 994.477398][ T1863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.483648][ T1863] ? copy_mount_options+0x280/0x3a0 [ 994.488855][ T1863] ksys_mount+0xdb/0x150 [ 994.493110][ T1863] __x64_sys_mount+0xbe/0x150 [ 994.497808][ T1863] do_syscall_64+0x103/0x610 [ 994.502411][ T1863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 994.508305][ T1863] RIP: 0033:0x45b69a [ 994.512204][ T1863] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 994.531819][ T1863] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 14:54:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x40000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 994.540287][ T1863] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 994.548270][ T1863] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 994.556254][ T1863] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 994.564231][ T1863] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 994.572221][ T1863] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:45 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1a0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) close(r3) 14:54:45 executing program 2 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x200000000000000, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x101001, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000280)=0x24e9, 0x8) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x5c85, 0x3, 0x16, 0x8, "9fd502f7dd3c936ea21ced95d3e26c89865a9cdec84efc87e3a5cc0b1ea2aa1a9b510739cb3164d746667e9ebda8d38e2d5d019dfb88a7a10b5396a8beff1959", "56ece3de8c52b0c7d5b99faa179f6f5c01a66894e730622098ccb833f1bde397", [0x1, 0x82]}) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/current\x00', 0x2, 0x0) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="02030000e8ff000000000000090000000000000000000000000002000100000000000000000b00000000030005000000af427f8d044d0cf500"/68], 0x48}}, 0x0) 14:54:45 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x4) 14:54:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0xe0000001, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 994.762650][ T1881] FAULT_INJECTION: forcing a failure. [ 994.762650][ T1881] name failslab, interval 1, probability 0, space 0, times 0 14:54:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 994.803149][ T1881] CPU: 1 PID: 1881 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 994.811081][ T1881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.821136][ T1881] Call Trace: [ 994.821166][ T1881] dump_stack+0x172/0x1f0 [ 994.821193][ T1881] should_fail.cold+0xa/0x15 [ 994.821216][ T1881] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 994.839191][ T1881] ? find_held_lock+0x35/0x130 [ 994.839211][ T1881] ? blk_queue_enter+0xbcd/0xe90 14:54:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff, 0x5}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0), 0x0, 0x0) [ 994.839233][ T1881] __should_failslab+0x121/0x190 [ 994.839261][ T1881] should_failslab+0x9/0x14 [ 994.858377][ T1881] kmem_cache_alloc_node+0x56/0x710 [ 994.863601][ T1881] create_task_io_context+0x33/0x450 [ 994.868905][ T1881] generic_make_request_checks+0x1a62/0x2090 [ 994.874904][ T1881] ? trace_event_raw_event_block_rq_requeue+0x640/0x640 [ 994.881852][ T1881] ? __lock_acquire+0x548/0x3fb0 [ 994.886796][ T1881] ? bio_associate_blkg_from_css+0x4e5/0x990 [ 994.892785][ T1881] generic_make_request+0x24c/0x12d0 [ 994.898095][ T1881] ? blk_queue_enter+0xe90/0xe90 [ 994.903067][ T1881] ? guard_bio_eod+0x1ce/0x6e0 [ 994.903086][ T1881] ? find_held_lock+0x35/0x130 [ 994.903110][ T1881] ? guard_bio_eod+0x1ce/0x6e0 [ 994.917382][ T1881] submit_bio+0xba/0x480 [ 994.917398][ T1881] ? submit_bio+0xba/0x480 [ 994.917419][ T1881] ? generic_make_request+0x12d0/0x12d0 [ 994.931607][ T1881] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 994.937335][ T1881] ? guard_bio_eod+0x295/0x6e0 [ 994.942116][ T1881] submit_bh_wbc+0x5f7/0x7f0 [ 994.946731][ T1881] block_read_full_page+0x7e4/0xd70 14:54:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e22, 0x4f, @dev={0xfe, 0x80, [], 0xe}, 0x905}}, 0x80000001, 0x20, 0x1, 0x10001, 0x5}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={r2, 0x2000}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 994.951945][ T1881] ? check_disk_change+0x140/0x140 [ 994.957069][ T1881] ? __bread_gfp+0x300/0x300 [ 994.961667][ T1881] ? add_to_page_cache_lru+0x34e/0x760 [ 994.967137][ T1881] ? add_to_page_cache_locked+0x40/0x40 [ 994.972703][ T1881] blkdev_readpage+0x1d/0x30 [ 994.977303][ T1881] do_read_cache_page+0xc5c/0x14c0 [ 994.982432][ T1881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 994.988681][ T1881] ? blkdev_writepages+0x30/0x30 [ 994.993631][ T1881] ? blkdev_get+0xcc/0x990 [ 994.993650][ T1881] ? pagecache_get_page+0x740/0x740 [ 994.993671][ T1881] ? bd_may_claim+0xd0/0xd0 [ 994.993692][ T1881] ? lookup_bdev.part.0+0x10e/0x1b0 [ 995.007776][ T1881] ? blkdev_open+0x290/0x290 [ 995.007792][ T1881] ? lock_downgrade+0x880/0x880 [ 995.007819][ T1881] read_cache_page_gfp+0x6e/0x90 [ 995.027353][ T1881] btrfs_scan_one_device+0x19b/0x720 [ 995.032647][ T1881] ? kfree+0x173/0x230 [ 995.036732][ T1881] ? device_list_add+0x14d0/0x14d0 [ 995.041855][ T1881] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 995.047676][ T1881] ? btrfs_mount_root+0xb36/0x1220 14:54:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x7449, 0x4000) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f00000002c0)=0x8000, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r2, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.stat\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0x3, "157236"}, &(0x7f0000000140)=0xb) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000200)={r4, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x23}}}, 0x1, 0x80000001}, 0x90) [ 995.052801][ T1881] btrfs_mount_root+0x718/0x1220 [ 995.057758][ T1881] ? btrfs_decode_error+0x70/0x70 [ 995.062796][ T1881] ? rcu_read_lock_sched_held+0x110/0x130 [ 995.068529][ T1881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.074782][ T1881] ? vfs_parse_fs_string+0x111/0x170 [ 995.074799][ T1881] ? vfs_parse_fs_string+0x111/0x170 [ 995.074817][ T1881] ? rcu_read_lock_sched_held+0x110/0x130 [ 995.074834][ T1881] ? kfree+0x1fa/0x230 [ 995.074853][ T1881] ? vfs_parse_fs_string+0x116/0x170 [ 995.091119][ T1881] ? btrfs_decode_error+0x70/0x70 [ 995.105482][ T1881] legacy_get_tree+0xf2/0x200 [ 995.110188][ T1881] vfs_get_tree+0x123/0x450 [ 995.114708][ T1881] fc_mount+0x17/0xc0 [ 995.118707][ T1881] vfs_kern_mount.part.0+0xd8/0xf0 [ 995.123833][ T1881] vfs_kern_mount+0x40/0x60 [ 995.128356][ T1881] btrfs_mount+0x2b4/0x15e2 [ 995.132872][ T1881] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 995.138547][ T1881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.144794][ T1881] ? should_fail+0x1de/0x852 14:54:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) write$binfmt_elf32(r1, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0xd9, 0x8, 0x9, 0x8, 0x7fff, 0x3, 0x3, 0x4, 0x2a0, 0x38, 0x186, 0x5, 0x3, 0x20, 0x1, 0x81, 0x1, 0x1}, [{0x3, 0xfffffffffffffeff, 0x9, 0x101, 0x81, 0x2, 0x3, 0x1200}, {0x2, 0x0, 0x3, 0x6, 0xfffffffffffffffe, 0x2, 0x6, 0x4873}], "9d40023d92dbf3f00b0f599a8c964ab2085e77772a22fa15a45de756185a180ee47d9afdc9484381e493ced62e8861818371a32fc85c9e1141dbaee8c78e8c1d129bebfbedaf76ff2e8254bc402b7d8491f56acc37ef5aab0e4a801bea27f79dff516c511e925240d9d7c7a073", [[], [], [], [], [], [], [], [], [], []]}, 0xae5) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f00000000c0)=[{&(0x7f00000001c0)="93", 0x1}], 0x1, 0x0, 0x0, 0x4}], 0x1, 0x0) [ 995.149396][ T1881] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 995.155215][ T1881] ? btrfs_remount+0x11f0/0x11f0 [ 995.160184][ T1881] ? rcu_read_lock_sched_held+0x110/0x130 [ 995.165957][ T1881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.165974][ T1881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.165999][ T1881] ? vfs_parse_fs_string+0x111/0x170 [ 995.178475][ T1881] ? vfs_parse_fs_string+0x111/0x170 [ 995.189030][ T1881] ? rcu_read_lock_sched_held+0x110/0x130 [ 995.194763][ T1881] ? kfree+0x1fa/0x230 [ 995.198842][ T1881] ? vfs_parse_fs_string+0x116/0x170 14:54:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x8, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x78) [ 995.204146][ T1881] ? btrfs_remount+0x11f0/0x11f0 [ 995.209092][ T1881] legacy_get_tree+0xf2/0x200 [ 995.213778][ T1881] ? btrfs_remount+0x11f0/0x11f0 [ 995.218723][ T1881] ? legacy_get_tree+0xf2/0x200 [ 995.223588][ T1881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.229838][ T1881] vfs_get_tree+0x123/0x450 [ 995.234350][ T1881] do_mount+0x1436/0x2c40 [ 995.238741][ T1881] ? copy_mount_string+0x40/0x40 [ 995.243699][ T1881] ? _copy_from_user+0xdd/0x150 [ 995.248578][ T1881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.248593][ T1881] ? copy_mount_options+0x280/0x3a0 [ 995.248613][ T1881] ksys_mount+0xdb/0x150 [ 995.264294][ T1881] __x64_sys_mount+0xbe/0x150 [ 995.268983][ T1881] do_syscall_64+0x103/0x610 [ 995.269007][ T1881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 995.269019][ T1881] RIP: 0033:0x45b69a [ 995.269041][ T1881] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 995.302974][ T1881] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 995.311397][ T1881] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 995.319377][ T1881] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 995.328114][ T1881] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 995.336078][ T1881] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 995.344060][ T1881] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x4000, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000100)={0x2, 0xfff, 0x80000001, 0x6, 0x3, 0x8, 0x1f}, 0xc) 14:54:46 executing program 2 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x400000000000000, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYBLOB="7f454c4603020980000000000000000003003f0053010000770100000000000050ffffffffffffff46010000000000005f77000000a43800020007000200ffff01000070020000000002000000000000f71f000000000000f8ffffffffffffff0000000000000000080000000000007302a10000000000000200007001800000010000000000000000000000000000000200000000000000080000000000000008000000000000000100000001000000821e17ed0fbf2f6c6dfff7edb7768fd9b5f30c3ea247d30096b731e636096d689a1dca97a8c4d67b9849cf001d9f06f98444c0223e2ef6592ec4b578eac02cb8fd8b24d56f885670107ada6a9630896a868293e7a65d1b035611a70500000000000000e8e13501830159ae2088834d2559b5af689dc0b1f02e9ad85c7de29f25cd78c27775dd4b935d21d4fd3cce2da8733eb80f3e1464898bd31fa3346f8817bc82bb5d646f7df1befea9b901b6b0ac6dec7abe90dab2838db6fa022c0827ea8119da445ed5501a4c46ca5b77ea370bbe4bfabe6a2f000000000000000064a7b832868fa273019922c92e8d7e1b3012d5937a3e1996270d6e26fdfc85dff75d75e00000000000009d4eea1cc761adbb380d32faa79fdfe5101b6dc3f53422df9332c4a8c4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000641611abf9606b075d4ccf317032f9d482ede76b3c0c05421bd2af29f67a29eeb327ccdc601d1c"], 0xad5) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300090900000000000000000000000200004000000002000100000000000000100b0000000003000500000000004d482cd586a2c34e69a747bb02000000"], 0x48}}, 0x0) 14:54:46 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x3f00) 14:54:46 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0xffffff7f, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 995.598767][ T1918] FAULT_INJECTION: forcing a failure. [ 995.598767][ T1918] name failslab, interval 1, probability 0, space 0, times 0 [ 995.623605][ T1918] CPU: 0 PID: 1918 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 995.631519][ T1918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 995.641581][ T1918] Call Trace: [ 995.644892][ T1918] dump_stack+0x172/0x1f0 [ 995.649264][ T1918] should_fail.cold+0xa/0x15 [ 995.653870][ T1918] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 995.659695][ T1918] ? ___might_sleep+0x163/0x280 [ 995.664566][ T1918] __should_failslab+0x121/0x190 [ 995.669520][ T1918] should_failslab+0x9/0x14 [ 995.674042][ T1918] kmem_cache_alloc+0x2b2/0x6f0 [ 995.678914][ T1918] ? mark_held_locks+0xf0/0xf0 [ 995.683714][ T1918] getname_kernel+0x53/0x370 [ 995.688336][ T1918] kern_path+0x20/0x40 [ 995.688358][ T1918] lookup_bdev.part.0+0x7b/0x1b0 [ 995.688374][ T1918] ? blkdev_open+0x290/0x290 [ 995.688390][ T1918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.688412][ T1918] ? list_sort.part.0+0x605/0x8b0 [ 995.713238][ T1918] blkdev_get_by_path+0x81/0x130 [ 995.718214][ T1918] btrfs_get_bdev_and_sb+0x38/0x300 [ 995.723438][ T1918] open_fs_devices+0x68e/0xbd0 [ 995.728242][ T1918] ? find_fsid+0x2e0/0x2e0 [ 995.732688][ T1918] ? memmove_extent_buffer.cold+0x44/0x44 [ 995.738424][ T1918] btrfs_open_devices+0x147/0x170 [ 995.743468][ T1918] btrfs_mount_root+0x79a/0x1220 [ 995.748432][ T1918] ? btrfs_decode_error+0x70/0x70 [ 995.753472][ T1918] ? rcu_read_lock_sched_held+0x110/0x130 [ 995.759206][ T1918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.765463][ T1918] ? vfs_parse_fs_string+0x111/0x170 [ 995.770759][ T1918] ? vfs_parse_fs_string+0x111/0x170 [ 995.776058][ T1918] ? rcu_read_lock_sched_held+0x110/0x130 [ 995.781788][ T1918] ? kfree+0x1fa/0x230 [ 995.785867][ T1918] ? vfs_parse_fs_string+0x116/0x170 [ 995.791166][ T1918] ? btrfs_decode_error+0x70/0x70 [ 995.796195][ T1918] legacy_get_tree+0xf2/0x200 [ 995.800892][ T1918] vfs_get_tree+0x123/0x450 [ 995.805411][ T1918] fc_mount+0x17/0xc0 [ 995.809445][ T1918] vfs_kern_mount.part.0+0xd8/0xf0 [ 995.814571][ T1918] vfs_kern_mount+0x40/0x60 [ 995.814595][ T1918] btrfs_mount+0x2b4/0x15e2 [ 995.814614][ T1918] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 995.814629][ T1918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.814645][ T1918] ? should_fail+0x1de/0x852 [ 995.814664][ T1918] ? fault_create_debugfs_attr+0x1e0/0x1e0 14:54:46 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x4000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000540)={{0xa, 0x6, 0xfffffffffffffffc, 0x7f, 'syz1\x00', 0x7ff6}, 0x0, [0x3f, 0x9, 0x8b7, 0x100, 0x5, 0x400, 0x9, 0x9, 0x3f, 0x1f, 0xffffffff80000000, 0x1ff, 0x2, 0x800, 0x10000, 0x7, 0x10000, 0x8, 0x1, 0xb269, 0x7, 0x8001, 0x0, 0x6, 0x9, 0x6, 0x8001, 0x2, 0x4, 0x6d5, 0x3, 0x2, 0x1, 0x2, 0xfff, 0x7fd, 0x8, 0x9, 0xffffffffffff0d85, 0x3, 0x4, 0x7fffffff, 0x401, 0x4, 0x401, 0x4, 0x86c, 0x6, 0xffff, 0x80, 0x27983ce4, 0x8, 0x5, 0x4b, 0x0, 0x81, 0x1f, 0xfb02, 0xfde, 0x8, 0x9, 0x10001, 0x0, 0x9, 0x4, 0x3, 0x9, 0x2e, 0x2, 0x1, 0x3, 0x7ff, 0x6, 0x9, 0x8, 0x9, 0x1, 0x1f, 0x8, 0x4010000000000, 0x2, 0x100000001, 0x3, 0x1b1, 0x4, 0x1, 0x1ff, 0xe7950184000000, 0x5003, 0x7, 0x1, 0x0, 0x101, 0x0, 0x5, 0xffff, 0x7, 0x1ff, 0x9, 0x7ff, 0x2, 0x7, 0x7, 0x4, 0x562f, 0x200, 0x6, 0x1, 0x6, 0x3f, 0x200, 0x69, 0x3, 0x7fffffff, 0x4, 0x200, 0x6, 0x4, 0x5, 0x4, 0x4d, 0x9, 0x7fffffff, 0x6, 0x7ff, 0xfffffffffffffff9, 0x8, 0x5]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x9, 0x400040) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000100)=0xffffffffffffffff, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000080)={0x7ff, 0x0, 0x2}, 0x8) sendmmsg$inet_sctp(r3, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000200)={&(0x7f0000000180)=""/20, 0x200000, 0x800, 0x8001}, 0x18) 14:54:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) r2 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x4, 0x76b3a985da224286) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000002c0)={r3, 0xc3, "c891cc8e72e304f32ad38255e4b2ce34298f9602575cbf9894d1e4bc27a45863a3142af68d6874c36516d655c8dc20cc5341d7bcb6bf2d672ac98b2fd4ea1c348d883cdf26d032d6176045c00bf0a154d30bebb543fe3ab5c23b56bb08e96f7aa904b0461eafca8dcb62ec91d505fc1fabaf17e4e76e703f781ddae369cb6a86ac920739f80c0084e95f193368dfeaf47ca1ab9559a3b0416fc192ca3ffe626f138bebe61ee822a68f8a85d91a59e3c738ccb56b6db5c6db844eec541f40902bff8292"}, &(0x7f00000003c0)=0xcb) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x2000000000000000, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 995.814685][ T1918] ? btrfs_remount+0x11f0/0x11f0 [ 995.814711][ T1918] ? rcu_read_lock_sched_held+0x110/0x130 [ 995.814732][ T1918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.829355][ T1918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.829373][ T1918] ? vfs_parse_fs_string+0x111/0x170 [ 995.829389][ T1918] ? vfs_parse_fs_string+0x111/0x170 [ 995.829413][ T1918] ? rcu_read_lock_sched_held+0x110/0x130 [ 995.862868][ T1918] ? kfree+0x1fa/0x230 [ 995.862888][ T1918] ? vfs_parse_fs_string+0x116/0x170 [ 995.862911][ T1918] ? btrfs_remount+0x11f0/0x11f0 14:54:46 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000140)={0x2, 0x4}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x4000, 0x0) read$FUSE(r2, &(0x7f0000000540), 0x1000) r3 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000100)={0x7ff, 0x0, 0x0, 0x400}, 0x8) sendmmsg$inet_sctp(r3, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 995.862925][ T1918] legacy_get_tree+0xf2/0x200 [ 995.862941][ T1918] ? btrfs_remount+0x11f0/0x11f0 [ 995.862960][ T1918] ? legacy_get_tree+0xf2/0x200 [ 995.899688][ T1918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.899709][ T1918] vfs_get_tree+0x123/0x450 [ 995.899729][ T1918] do_mount+0x1436/0x2c40 [ 995.899752][ T1918] ? copy_mount_string+0x40/0x40 [ 995.899773][ T1918] ? audit_add_tree_rule.cold+0x37/0x37 [ 995.939715][ T1918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 995.945970][ T1918] ? copy_mount_options+0x280/0x3a0 [ 995.951183][ T1918] ksys_mount+0xdb/0x150 [ 995.955441][ T1918] __x64_sys_mount+0xbe/0x150 [ 995.960132][ T1918] do_syscall_64+0x103/0x610 [ 995.964740][ T1918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 995.970633][ T1918] RIP: 0033:0x45b69a [ 995.970650][ T1918] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:54:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x800, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r2, 0x5387, &(0x7f0000000100)) [ 995.970659][ T1918] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 995.970675][ T1918] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 995.970685][ T1918] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 995.970695][ T1918] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 995.970703][ T1918] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 995.970721][ T1918] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x3f00000000000000, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:47 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300090900000000000000000000000200090000000000000000000000000002000100000000007077000b00f40000030005000000000002000000e00000010000000000000000"], 0x48}}, 0x0) 14:54:47 executing program 2 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x34000) 14:54:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0xaf6fa4b635, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000100)={0xffffffff}) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x8000000000000000, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000140)={0x0, @reserved}) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000200)={0x0, @reserved}) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="020300090900000020000000000000000200090000000000000000000b000000cf030005000000000007000000000000000000000000000000000000000000000000000000000000ec40a106e147c031c2d08d3a3dea9d6d29eceb0f80b83570cf2eb8deb6e3a666cd7cd696e344db"], 0x48}}, 0x0) 14:54:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x40000, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000100)='htcp\x00', 0x5) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x9, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0xffffff7f00000000, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x40030000000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x7, 0x0, 0x0, 0x3, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_x_nat_t_port={0x1, 0x15, 0x4e23}]}, 0x38}}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80, 0x0) ioctl$PPPIOCDISCONN(r1, 0x7439) 14:54:47 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x400300) 14:54:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) tee(r1, r1, 0x8001, 0x0) [ 996.853869][ T2060] FAULT_INJECTION: forcing a failure. [ 996.853869][ T2060] name failslab, interval 1, probability 0, space 0, times 0 [ 996.874515][ T2060] CPU: 1 PID: 2060 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 996.882416][ T2060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 996.892469][ T2060] Call Trace: [ 996.895774][ T2060] dump_stack+0x172/0x1f0 [ 996.900128][ T2060] should_fail.cold+0xa/0x15 [ 996.904730][ T2060] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 996.910550][ T2060] ? ___might_sleep+0x163/0x280 [ 996.915413][ T2060] __should_failslab+0x121/0x190 [ 996.920357][ T2060] should_failslab+0x9/0x14 [ 996.924870][ T2060] kmem_cache_alloc+0x2b2/0x6f0 [ 996.929728][ T2060] ? mark_held_locks+0xf0/0xf0 [ 996.934503][ T2060] getname_kernel+0x53/0x370 [ 996.939100][ T2060] kern_path+0x20/0x40 [ 996.943176][ T2060] lookup_bdev.part.0+0x7b/0x1b0 [ 996.948123][ T2060] ? blkdev_open+0x290/0x290 [ 996.952716][ T2060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 996.958962][ T2060] ? list_sort.part.0+0x605/0x8b0 [ 996.964000][ T2060] blkdev_get_by_path+0x81/0x130 [ 996.968956][ T2060] btrfs_get_bdev_and_sb+0x38/0x300 [ 996.974165][ T2060] open_fs_devices+0x68e/0xbd0 [ 996.978947][ T2060] ? find_fsid+0x2e0/0x2e0 [ 996.983398][ T2060] ? memmove_extent_buffer.cold+0x44/0x44 [ 996.989131][ T2060] btrfs_open_devices+0x147/0x170 [ 996.994162][ T2060] btrfs_mount_root+0x79a/0x1220 [ 996.999114][ T2060] ? btrfs_decode_error+0x70/0x70 [ 997.004157][ T2060] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 997.009625][ T2060] ? retint_kernel+0x2d/0x2d [ 997.014219][ T2060] ? btrfs_decode_error+0x70/0x70 [ 997.019277][ T2060] ? btrfs_decode_error+0x70/0x70 [ 997.024306][ T2060] legacy_get_tree+0xf2/0x200 [ 997.028991][ T2060] vfs_get_tree+0x123/0x450 [ 997.033506][ T2060] fc_mount+0x17/0xc0 [ 997.037494][ T2060] vfs_kern_mount.part.0+0xd8/0xf0 [ 997.042613][ T2060] vfs_kern_mount+0x40/0x60 [ 997.047138][ T2060] btrfs_mount+0x2b4/0x15e2 [ 997.051674][ T2060] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 997.057307][ T2060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 997.063552][ T2060] ? should_fail+0x1de/0x852 [ 997.068153][ T2060] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 997.073965][ T2060] ? btrfs_remount+0x11f0/0x11f0 [ 997.078917][ T2060] ? rcu_read_lock_sched_held+0x110/0x130 [ 997.084641][ T2060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 997.090886][ T2060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 997.097131][ T2060] ? vfs_parse_fs_string+0x111/0x170 [ 997.102419][ T2060] ? vfs_parse_fs_string+0x111/0x170 [ 997.107709][ T2060] ? rcu_read_lock_sched_held+0x110/0x130 [ 997.113432][ T2060] ? kfree+0x1fa/0x230 [ 997.117604][ T2060] ? vfs_parse_fs_string+0x116/0x170 [ 997.122899][ T2060] ? btrfs_remount+0x11f0/0x11f0 [ 997.127840][ T2060] legacy_get_tree+0xf2/0x200 [ 997.132519][ T2060] ? btrfs_remount+0x11f0/0x11f0 [ 997.137457][ T2060] ? legacy_get_tree+0xf2/0x200 [ 997.142310][ T2060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 997.148559][ T2060] vfs_get_tree+0x123/0x450 [ 997.153075][ T2060] do_mount+0x1436/0x2c40 [ 997.157420][ T2060] ? copy_mount_string+0x40/0x40 [ 997.162364][ T2060] ? _copy_from_user+0xdd/0x150 [ 997.167239][ T2060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 997.173493][ T2060] ? copy_mount_options+0x280/0x3a0 [ 997.178697][ T2060] ksys_mount+0xdb/0x150 [ 997.182944][ T2060] __x64_sys_mount+0xbe/0x150 [ 997.187630][ T2060] do_syscall_64+0x103/0x610 [ 997.192240][ T2060] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 997.198164][ T2060] RIP: 0033:0x45b69a [ 997.202065][ T2060] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 997.221670][ T2060] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 997.230084][ T2060] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 997.238060][ T2060] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 997.246040][ T2060] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 997.254011][ T2060] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 997.261983][ T2060] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:48 executing program 2 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x200000) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x800, 0x0) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000100)={0x3, r2}) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020300090900000000000000000000000200090000000000000000000000000002000100000000000013000b00000000030005000000000002000000e000000100000000000000008d9fd1a2b47710a9e04fb58c4799540414596c1d52088912c8541bb7b9061c41905e5d78c83064810eb071de54ef3e82d1b4718b9e9c307d21a7479c1aa5c07f8ccc88a93d236f1da06d446a9c110d4adbab7ea037ea2437be51c37b3d65ca1ffbf19c9cabcc562614a99cc68439c58d045b780eb29b042a225088247ff97020a598896b8ac1ea0c57136a35050a9716572263"], 0x48}}, 0x0) 14:54:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0xa, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:48 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x1000000) 14:54:48 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x100000000000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = syz_open_dev$adsp(&(0x7f0000000580)='/dev/adsp#\x00', 0x8, 0x100) r3 = fcntl$getown(r1, 0x9) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000900)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@initdev}}, &(0x7f0000000a00)=0xe8) r5 = getgid() setsockopt$inet6_tcp_buf(r2, 0x6, 0x3b, &(0x7f00000000c0)="9484cd7032f52bb0ae4680332375498457495c040111a5f36fb1e780b478dda9b2b2276d28031d51ab", 0x29) fcntl$getownex(r1, 0x10, &(0x7f0000000a40)={0x0, 0x0}) fstat(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000b00)=[0x0, 0x0, 0xee01]) r9 = getpgrp(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000b40)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000c40)=0xe8) fstat(r1, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r2, &(0x7f0000000e00)={&(0x7f00000005c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000640)="929de7d9a78bb0a9a5a2741a4416d8786b25dca2c0acff599a04198133b318d95fed9cfb524facb78342442858bc686280006efe4e83c282662435e83820716d39311ce8b698ca8b5ab7c3967b82825043e6f08d50ac82f4d59d40658eb50b73d35d63f314006119e36cb09d690ddd6f303bd539dee7615e1a9bd65bd5ddd8851751e4c98d211d32cc33f38e825e9642007096cca5d94d7798bf", 0x9a}, {&(0x7f0000000700)="b5d5afffb1b541f794a1af093af0d0e3e03bc1e4b873cc87c972d49505b8e723bdb3d9", 0x23}, {&(0x7f0000000740)="79d033a540f311640fc3c8abfeebe0f4b62d0787bdce2739ec2e1414bceab7e430939bdf69d4b749c4433d16b74cda79fcbd5c8010c30dbf0b4a4c137f67c907fa7ccce60ab6546a20b9e892", 0x4c}, {&(0x7f00000007c0)="2d13d92a1d7c8f6aebffd6cf0bfca0e81bf28aca3138f9515f6eaa2deebb94f0532cac36c5b16525f8b2f2dea5234896082de222e995b335f6ba130eb6540de542ad84eb81a94d78915aa648dd2306b49dbf89886e50e1d31213bbf8aebf1ac02e7cf028065e3fec8d68c51b1d7fbef861796018d936412b4ee15b94e4b50dabce34a5a79b73ec18cbfeb0d2316293caf8b0820c3c07b30a23317541a48045be9d260c0e20b1a00e0f2cc996e9d33ebaf34502ef56a5372d757fea520b289d30a62cbf464919061a6afa1ad6f5317884f845c7", 0xd3}], 0x4, &(0x7f0000000d00)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="28004b8a9d10f368ce83000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="18000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0xe8, 0x4000000}, 0x1) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x400000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000040}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r3, 0x20, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x40) syz_init_net_socket$x25(0x9, 0x5, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) pselect6(0x40, &(0x7f0000000280)={0x33f0eb58, 0x4, 0x101, 0x9, 0x1, 0xec6, 0x1f95, 0x7}, &(0x7f00000002c0)={0x5, 0x6, 0x7, 0x1, 0x7, 0x3, 0x7, 0x3f0}, &(0x7f0000000300)={0x81, 0x38, 0x3, 0x7, 0xffff, 0xf2, 0x1f, 0x6}, &(0x7f0000000340)={0x77359400}, &(0x7f00000003c0)={&(0x7f0000000380)={0xfffffffffffffff8}, 0x8}) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) [ 997.490171][ T2083] FAULT_INJECTION: forcing a failure. [ 997.490171][ T2083] name failslab, interval 1, probability 0, space 0, times 0 [ 997.517518][ T2083] CPU: 1 PID: 2083 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 997.525430][ T2083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 997.535494][ T2083] Call Trace: [ 997.538807][ T2083] dump_stack+0x172/0x1f0 [ 997.543165][ T2083] should_fail.cold+0xa/0x15 [ 997.547767][ T2083] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 997.553582][ T2083] ? find_held_lock+0x35/0x130 [ 997.558361][ T2083] ? blk_queue_enter+0xbcd/0xe90 [ 997.563324][ T2083] __should_failslab+0x121/0x190 [ 997.568262][ T2083] should_failslab+0x9/0x14 [ 997.572780][ T2083] kmem_cache_alloc_node+0x56/0x710 [ 997.572813][ T2083] create_task_io_context+0x33/0x450 [ 997.572833][ T2083] generic_make_request_checks+0x1a62/0x2090 [ 997.572862][ T2083] ? trace_event_raw_event_block_rq_requeue+0x640/0x640 [ 997.589296][ T2083] ? __lock_acquire+0x548/0x3fb0 [ 997.589316][ T2083] ? bio_associate_blkg_from_css+0x4e5/0x990 [ 997.589337][ T2083] generic_make_request+0x24c/0x12d0 [ 997.589358][ T2083] ? blk_queue_enter+0xe90/0xe90 [ 997.589380][ T2083] ? guard_bio_eod+0x1ce/0x6e0 [ 997.622136][ T2083] ? find_held_lock+0x35/0x130 [ 997.626908][ T2083] ? guard_bio_eod+0x1ce/0x6e0 [ 997.631688][ T2083] submit_bio+0xba/0x480 [ 997.635936][ T2083] ? submit_bio+0xba/0x480 [ 997.640364][ T2083] ? generic_make_request+0x12d0/0x12d0 [ 997.645953][ T2083] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 997.651681][ T2083] ? guard_bio_eod+0x295/0x6e0 [ 997.656459][ T2083] submit_bh_wbc+0x5f7/0x7f0 [ 997.661069][ T2083] block_read_full_page+0x7e4/0xd70 [ 997.666278][ T2083] ? check_disk_change+0x140/0x140 [ 997.671402][ T2083] ? __bread_gfp+0x300/0x300 [ 997.676048][ T2083] ? add_to_page_cache_lru+0x34e/0x760 [ 997.681521][ T2083] ? add_to_page_cache_locked+0x40/0x40 [ 997.687098][ T2083] blkdev_readpage+0x1d/0x30 [ 997.691703][ T2083] do_read_cache_page+0xc5c/0x14c0 [ 997.697605][ T2083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 997.703855][ T2083] ? blkdev_writepages+0x30/0x30 [ 997.708810][ T2083] ? blkdev_get+0xcc/0x990 [ 997.713236][ T2083] ? pagecache_get_page+0x740/0x740 [ 997.718448][ T2083] ? bd_may_claim+0xd0/0xd0 [ 997.722967][ T2083] ? lookup_bdev.part.0+0x10e/0x1b0 [ 997.728175][ T2083] ? blkdev_open+0x290/0x290 [ 997.732773][ T2083] ? lock_downgrade+0x880/0x880 [ 997.737641][ T2083] read_cache_page_gfp+0x6e/0x90 [ 997.742596][ T2083] btrfs_scan_one_device+0x19b/0x720 [ 997.747887][ T2083] ? kfree+0x173/0x230 [ 997.751971][ T2083] ? device_list_add+0x14d0/0x14d0 [ 997.757093][ T2083] ? trace_hardirqs_off_caller+0x1a0/0x220 [ 997.762912][ T2083] ? btrfs_mount_root+0xb36/0x1220 [ 997.768042][ T2083] btrfs_mount_root+0x718/0x1220 [ 997.773012][ T2083] ? btrfs_decode_error+0x70/0x70 [ 997.778084][ T2083] ? rcu_read_lock_sched_held+0x110/0x130 [ 997.783814][ T2083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 997.790064][ T2083] ? vfs_parse_fs_string+0x111/0x170 [ 997.795357][ T2083] ? vfs_parse_fs_string+0x111/0x170 [ 997.800667][ T2083] ? rcu_read_lock_sched_held+0x110/0x130 [ 997.806406][ T2083] ? kfree+0x1fa/0x230 [ 997.810482][ T2083] ? vfs_parse_fs_string+0x116/0x170 [ 997.815784][ T2083] ? btrfs_decode_error+0x70/0x70 [ 997.820813][ T2083] legacy_get_tree+0xf2/0x200 [ 997.825505][ T2083] vfs_get_tree+0x123/0x450 [ 997.830035][ T2083] fc_mount+0x17/0xc0 [ 997.834042][ T2083] vfs_kern_mount.part.0+0xd8/0xf0 [ 997.839165][ T2083] vfs_kern_mount+0x40/0x60 [ 997.843684][ T2083] btrfs_mount+0x2b4/0x15e2 [ 997.848201][ T2083] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 997.853845][ T2083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 997.860091][ T2083] ? should_fail+0x1de/0x852 [ 997.864695][ T2083] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 997.870513][ T2083] ? btrfs_remount+0x11f0/0x11f0 [ 997.875476][ T2083] ? rcu_read_lock_sched_held+0x110/0x130 [ 997.881201][ T2083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 997.887450][ T2083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 997.893701][ T2083] ? vfs_parse_fs_string+0x111/0x170 [ 997.898995][ T2083] ? vfs_parse_fs_string+0x111/0x170 [ 997.904295][ T2083] ? rcu_read_lock_sched_held+0x110/0x130 [ 997.910031][ T2083] ? kfree+0x1fa/0x230 [ 997.914111][ T2083] ? vfs_parse_fs_string+0x116/0x170 [ 997.919412][ T2083] ? btrfs_remount+0x11f0/0x11f0 [ 997.924352][ T2083] legacy_get_tree+0xf2/0x200 [ 997.929041][ T2083] ? btrfs_remount+0x11f0/0x11f0 [ 997.933986][ T2083] ? legacy_get_tree+0xf2/0x200 [ 997.938853][ T2083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 997.945102][ T2083] vfs_get_tree+0x123/0x450 [ 997.949707][ T2083] do_mount+0x1436/0x2c40 [ 997.954057][ T2083] ? copy_mount_string+0x40/0x40 [ 997.959018][ T2083] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 997.965268][ T2083] ? copy_mount_options+0x280/0x3a0 [ 997.970482][ T2083] ksys_mount+0xdb/0x150 [ 997.974733][ T2083] __x64_sys_mount+0xbe/0x150 [ 997.979424][ T2083] do_syscall_64+0x103/0x610 [ 997.984032][ T2083] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 997.989927][ T2083] RIP: 0033:0x45b69a [ 997.993834][ T2083] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 998.013444][ T2083] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 998.021892][ T2083] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 998.029867][ T2083] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 14:54:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f00000004c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000640)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000680)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000780)=0xe8) setxattr$system_posix_acl(&(0x7f0000000100)='\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f00000007c0)={{}, {0x1, 0x6}, [{0x2, 0x1, r2}, {0x2, 0x4, r3}, {0x2, 0x3, r4}, {0x2, 0x2, r5}, {0x2, 0x3, r6}, {0x2, 0x3, r7}], {0x4, 0x1}, [], {0x10, 0x5}, {0x20, 0x2}}, 0x54, 0x2) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x240400, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r8, 0x117, 0x5, 0x0, 0x4) [ 998.037841][ T2083] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 998.045815][ T2083] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 998.053791][ T2083] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x17, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:49 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x200000000000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:49 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="0203000909000000040000000000000002000900000000000000000000f74e32fb9e55b26571a07f9500000002000100000000000000000b00000000030005000000000002000000e000000100000000000000000010fb"], 0x48}}, 0x0) 14:54:49 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x6, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:49 executing program 2 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x2000000) 14:54:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x48}}, 0x0) [ 998.277087][ T2102] FAULT_INJECTION: forcing a failure. [ 998.277087][ T2102] name failslab, interval 1, probability 0, space 0, times 0 [ 998.290945][ T2102] CPU: 0 PID: 2102 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 998.298851][ T2102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 998.308914][ T2102] Call Trace: [ 998.312219][ T2102] dump_stack+0x172/0x1f0 [ 998.316573][ T2102] should_fail.cold+0xa/0x15 [ 998.321180][ T2102] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 998.327000][ T2102] ? find_held_lock+0x35/0x130 [ 998.331773][ T2102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 998.338020][ T2102] ? debug_smp_processor_id+0x3c/0x280 [ 998.343498][ T2102] __should_failslab+0x121/0x190 [ 998.348454][ T2102] should_failslab+0x9/0x14 [ 998.352969][ T2102] kmem_cache_alloc+0x47/0x6f0 [ 998.357741][ T2102] ? ___might_sleep+0x163/0x280 [ 998.362604][ T2102] ? mempool_alloc+0x380/0x380 [ 998.367377][ T2102] mempool_alloc_slab+0x47/0x60 [ 998.372278][ T2102] mempool_alloc+0x16b/0x380 [ 998.376898][ T2102] ? mempool_destroy+0x40/0x40 [ 998.381675][ T2102] ? mark_held_locks+0xa4/0xf0 [ 998.386450][ T2102] ? lock_downgrade+0x880/0x880 [ 998.391319][ T2102] ? __find_get_block+0x9ba/0xcf0 [ 998.396353][ T2102] ? __getblk_gfp+0x1b1/0x970 [ 998.401035][ T2102] ? __find_get_block+0x9ba/0xcf0 [ 998.406068][ T2102] ? lockdep_hardirqs_on+0x418/0x5d0 [ 998.411366][ T2102] bio_alloc_bioset+0x3bf/0x680 [ 998.416224][ T2102] ? __find_get_block+0x317/0xcf0 [ 998.421280][ T2102] ? bvec_alloc+0x2f0/0x2f0 [ 998.425836][ T2102] submit_bh_wbc+0x133/0x7f0 [ 998.430446][ T2102] __bread_gfp+0x13d/0x300 [ 998.434878][ T2102] btrfs_read_dev_one_super+0xb6/0x2a0 [ 998.440349][ T2102] btrfs_read_dev_super+0x6c/0xd0 [ 998.445385][ T2102] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 998.451126][ T2102] btrfs_get_bdev_and_sb+0xff/0x300 [ 998.456335][ T2102] open_fs_devices+0x68e/0xbd0 [ 998.461116][ T2102] ? find_fsid+0x2e0/0x2e0 [ 998.465553][ T2102] ? memmove_extent_buffer.cold+0x44/0x44 [ 998.471287][ T2102] btrfs_open_devices+0x147/0x170 [ 998.476327][ T2102] btrfs_mount_root+0x79a/0x1220 [ 998.481283][ T2102] ? btrfs_decode_error+0x70/0x70 [ 998.486319][ T2102] ? rcu_read_lock_sched_held+0x110/0x130 [ 998.492045][ T2102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 998.498301][ T2102] ? vfs_parse_fs_string+0x111/0x170 [ 998.503592][ T2102] ? vfs_parse_fs_string+0x111/0x170 [ 998.508883][ T2102] ? rcu_read_lock_sched_held+0x110/0x130 [ 998.514609][ T2102] ? kfree+0x1fa/0x230 [ 998.518688][ T2102] ? vfs_parse_fs_string+0x116/0x170 [ 998.523990][ T2102] ? btrfs_decode_error+0x70/0x70 [ 998.529048][ T2102] legacy_get_tree+0xf2/0x200 [ 998.533766][ T2102] vfs_get_tree+0x123/0x450 [ 998.538308][ T2102] fc_mount+0x17/0xc0 [ 998.542302][ T2102] vfs_kern_mount.part.0+0xd8/0xf0 [ 998.547424][ T2102] vfs_kern_mount+0x40/0x60 [ 998.552025][ T2102] btrfs_mount+0x2b4/0x15e2 [ 998.556544][ T2102] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 998.562181][ T2102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 998.568427][ T2102] ? should_fail+0x1de/0x852 [ 998.573030][ T2102] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 998.578848][ T2102] ? btrfs_remount+0x11f0/0x11f0 [ 998.583803][ T2102] ? rcu_read_lock_sched_held+0x110/0x130 [ 998.589535][ T2102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 998.595779][ T2102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 998.602029][ T2102] ? vfs_parse_fs_string+0x111/0x170 [ 998.607326][ T2102] ? vfs_parse_fs_string+0x111/0x170 [ 998.612620][ T2102] ? rcu_read_lock_sched_held+0x110/0x130 [ 998.618351][ T2102] ? kfree+0x1fa/0x230 [ 998.622432][ T2102] ? vfs_parse_fs_string+0x116/0x170 [ 998.627730][ T2102] ? btrfs_remount+0x11f0/0x11f0 [ 998.632674][ T2102] legacy_get_tree+0xf2/0x200 [ 998.637360][ T2102] ? btrfs_remount+0x11f0/0x11f0 [ 998.642299][ T2102] ? legacy_get_tree+0xf2/0x200 [ 998.647162][ T2102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 998.653411][ T2102] vfs_get_tree+0x123/0x450 [ 998.657933][ T2102] do_mount+0x1436/0x2c40 [ 998.662277][ T2102] ? copy_mount_string+0x40/0x40 [ 998.667253][ T2102] ? copy_mount_options+0x1ea/0x3a0 [ 998.672461][ T2102] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 998.678015][ T2102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 998.684290][ T2102] ? copy_mount_options+0x280/0x3a0 [ 998.689497][ T2102] ksys_mount+0xdb/0x150 [ 998.693755][ T2102] __x64_sys_mount+0xbe/0x150 [ 998.698449][ T2102] do_syscall_64+0x103/0x610 [ 998.703050][ T2102] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 998.708950][ T2102] RIP: 0033:0x45b69a [ 998.712854][ T2102] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 998.732463][ T2102] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 998.740877][ T2102] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 998.748850][ T2102] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 998.756828][ T2102] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 998.764803][ T2102] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 14:54:49 executing program 4: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc06001c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r4 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) sendmmsg$inet_sctp(r4, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) 14:54:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x5}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:49 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x300000000000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 998.772774][ T2102] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:49 executing program 5: socket$key(0xf, 0x3, 0x2) 14:54:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x4000000) 14:54:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x7}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:49 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x6000000, 0x0, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x3f000000) 14:54:49 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001e80)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000001f80)=0xe8) sendmsg(r0, &(0x7f0000002780)={&(0x7f0000001fc0)=@xdp={0x2c, 0x6, r1, 0x33}, 0x80, &(0x7f0000002300)=[{&(0x7f0000002040)="b6ca49b0ed09c3a42de96741e4182f433933543f506ef16b7ab3fb3e6d04a828f4c3", 0x22}, {&(0x7f0000002080)="6dc1851d578b74d8be00b82bbe6c568eeba7f761e1add776a59ddbe1f9ea421186bcb4281dce48b17390ca4d8e51fc4650fb2492f78770fdfc15e323318b8c2609020f8d4cbfc237e1fbbb117125d1dc662bf95fb46057f2419e046a42943964e670aac2f960a2b5aa979b49f5626256a3f6227607608461b4c14b41a55a923363c598c83a3e0e35f507f96f124461ccc5c7b3e212452f19455f1d203fd7fd35ade4ab41c9fb5186e456db4b3f549e3726f734788fab1080a9b519992d111fc3febf0e6a72c6c744664fafcbd7d9063bbb90fc676b3a8f8b635835b7862e0b22de0130f69deef5fe776ea846147cf121672377f46eec", 0xf6}, {&(0x7f0000002180)="89ac795c265e89b15fa0e80bd3e38d15977a69605bce7aff0368241f89dd39a7a0f67f0bc852aede9ffceed4b88e14c026dfe09bc936e9f04ea465eb4c69547cf9b76b85d6c5fc59c6c46745c0c61bff7e2897ad1843e75aa08620e04d97ad16c4fa53b2504ddae353e00ce52df9103b6f32b7cfd6ff3fc5896153bb528c75725d03fabed59f0c4bf37d604376515ffc3eb68e7e477295892f8663ecc0ac916963eb0c1d3ed84bb915f424ce73fbd6e6f8ad15bc9081972db36b62fe337c10470c", 0xc1}, {&(0x7f0000002280)="db8d638c49ac0fce89d526ba434d2e18501e6e69847d31a56996ce7c1f6b4baa687556e22acd5784d623503cec6e", 0x2e}, {&(0x7f00000022c0)="8a5a8c6293c4a114", 0x8}], 0x5, &(0x7f0000002380)=[{0xd8, 0x100, 0x7, "313d6e12eb5356a5c095d09c4b623a9e0fa440b6fa0c9eb0f100f7b07b286676949f6f1708b147f4191507829822f5b128d2f6e622ecdae3ddaa2a4bb640ac957b8dcd2c308284bf33ebbfc52634edc5407862842ecbc32873eb19f40eb1a9dfbedeac552556aecef0b8c009df3882dab5c2b9bca49fae17502ba112e885fc79b27e210303ff063dab924bba1cef076f8675e8b4734d75e062e8190a6d7c9899bdd222aff78d8d25755c31ee1a3e76b374a88526663c75ea62f0aaf6f56807d77565c3a1"}, {0xd0, 0x196, 0x3, "b36f53eb8ae70585f288aa848134014cb76fb39f8bd6758f7e900b343b1d960ce09cb3ef69b0590cae34473d373f38a35cc0f29aac32d5697611f1cc883e6e3dc0e97f929409703feea6ef604a214908816a07fa605c4e7bc8d9feec36b863dd00daffa36b0a7daca04312a5772425a7c6c0ece5995b8229f1271b6d1e63248ae979a9dff20b30388f121e4ed7938eae4c4c461143633e92d447e76f0db51104de678a8eccf7a54dfb8113b7bdd87ec8897a47d164c58df8ecf5d8fbd9d4a0"}, {0x78, 0x117, 0x5, "10b776b5ccd7cc36afd073cc9d770f005df2c81d1fb99d20ba5c0e52877927ad7ec9fe9257bf5ad67e36a1aca7a231c7aa36baf2692b30b74f175b85aade1355ab9d7e24d710032ac0b2e8c89e930439fb400db0bb6439781b4509eec181acbc6856ed5111badb53"}, {0xc8, 0x110, 0x3, "df6bebaa9ba2903d02e2b8bd7f97529f5459d1ea7d0b4abea54dd8569e583ec45ec9ce9f7aadeb00d67680c89926304f54cf6086ba61d7fe4fe05779d9f6a8ce6d31dab8ea49da89c9dfb7913f7b868962a7e39561f9fc64fd3698ccc5092c5d808976a332ee024653b0f3543f8985c310d5834ab173f5703bd5c110ba557d1a36ac6f0051bf709c34ab47a2382238ab18a86f4f2eaccafb0ddc3f2ca968f78e44a53bf6453a50647a949b3f8991040e0e9ba7dbfd65"}, {0xf0, 0x0, 0xfffffffffffff672, "471978177b1de4b9fcd34443af2f3233a4e74d34ba4f1d99313c2ace719ba4eeab4df9b89e0e27c82b86ad0ea777d8a66e8d86e96fa8d32e631eb39bd7a6cda0c6ba3f02b9d4ffc1c44e1abf341ee74260105e437964aac60e3c8b2884d0ae09919eec5f35488c535e492702c24593cb1b57e9618b8cacec0f462a31658b72656d665715c668ff3963280e3ee606ac6a7e15ab3b7535fcb52108506c5311a01520554b788ff906a6d7ba6cf98ca7a2d27e259df6fda6b0ff6f1d198871f9c939614a8b7299dc46526eb1fd6722915bd216c612ac55358f2d70"}], 0x3d8}, 0x4000) recvmsg$kcm(r0, &(0x7f0000001b00)={&(0x7f0000001640)=@isdn, 0x80, &(0x7f0000001a80)=[{&(0x7f00000016c0)=""/144, 0x90}, {&(0x7f0000001780)=""/167, 0xa7}, {&(0x7f0000001840)=""/90, 0x5a}, {&(0x7f00000018c0)=""/233, 0xe9}, {&(0x7f00000019c0)=""/136, 0x88}], 0x5}, 0x2001) r2 = socket$key(0xf, 0x3, 0x2) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x80, 0x0, 0x1ff, 0x10001, 0x7fff}, &(0x7f0000000180)=0x14) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000001c00)={r4, 0xe9b, 0x30, "575676424c2c119ecd74277899954d68dc405a4ff3c2218ac27933bf2c655accd5546b13bd60a19b7535ed216cec1ae8"}, 0x38) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f0000001b80)=ANY=[@ANYBLOB="0203000909000000000000020009000000000000a78acb3164d638245f209100006f94f75f0cad00000000000002000100000000000000000b00000000030069000000000002000000e091c7ae5ad5ea55a4"], 0x48}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x3, 0xaaaaaaaaaaaab6b, &(0x7f0000001540)=[{&(0x7f0000001b40)="713ed00b72f77e95a49097bc0d7221c2b2df149d2d282215cbddcb19bb29d53815", 0x21}, {&(0x7f00000001c0)="42be15dc4c88fff7eddcb0d696981ccddf97754ce5de2ae3acc05933f1521bb3c836270ecfbe59f9e3ad1a6f83c1b0ee5a7341d00fc2fd517466a1a57a20db1c26bf362b4617c4a5762ae3d0cc2fffd77ea62769cdcec8b7d8a715241d6b9356f97efde0cfb8548a2cd8a1a31ce450129c75241c2bf262e8ab31e80e62e50c341fda5b6543edb1925369936252daab6ec2e991e72946b258037e53ed2a6771c5e32805f59ea28ca13d830941bd3ee1f6b00bd0780500ea24858a14e484fc12661f", 0xc1, 0xffffffff}, {&(0x7f00000002c0)="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", 0x1000, 0x1}, {&(0x7f00000012c0)="24f8319de211be3b78457f5eef5a9ec82de48822ad01c5bd350d969d79f5fcad1349d8bbd3074b2c90e57b1ca491fe29734bcbbe755fa98861c1f90e99", 0x3d, 0x40}, {&(0x7f0000001300)="132b63fc033106c76b221d32f8678cbe54da180641c2f2c6b24de3860eb96efa8facf64c81487f9627c197c5e9ef82d480119e927d88d9358844f51dbd1dc56401b67eb57d2378b30cb30809faf15804eab88ca4c5fc2672afcebe0fb5655286d37b21d7e615d848bfd4b6aec39def732b9a51fd0de492b36537dd7d1bb752852c244f5947bc0d9a22f2876613512f427049a38d0b3b48993b494f85f1ffbac18bf49db0737888a48d1222b0d2410c0f88f06b918bf736b7f49b9d123cd5b2bc72aae54b29d8d921c19380ba6a32ce5253852e668aab11a70d4613105675f2427c1bd43d2500c1b5f6a9823b28770c74d5ea12", 0xf3, 0x6}, {&(0x7f0000001400)="69b4519441bd3867a50f0a6fdfa4774092b740a31c1b81e495dbaa3d76b5f528c783d9bc5d7dc2c2709a3f269e317d5378eb9b350ff0da034494e48428690e1083ab0e32ea231518eded0d10e2235db1a7717a19b34f41027471dd707d3522f30a4960f0af7d9120e84ea793d2416c984b320896a79e013252c5cee2f6c7df0ae65750b455f673d7e13d49804204bacf4ba6dfc8e7b1c22f9b0bcb8627a0374773ff1376c943b2c83fab028113b389e6", 0xb0, 0x5}, {&(0x7f00000014c0)="00d8ebdfe3fe97a0df006b0561a3f1a9f8582bd3bdb36b5f75d53ca9f450873dcd6ff1da9b8af5423ca1180355ccc0cb24866e83336de312ae2c93eaed4f2c70eb60b5000000", 0x52, 0xc71a}], 0x4000, &(0x7f0000001600)=ANY=[@ANYBLOB='shortname=mixed,nnonumtail=1,nonumtail=0,nonumtail=0(appraise,\x00']) fallocate(r2, 0x0, 0x4, 0x400) 14:54:50 executing program 2 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x400000000000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="020300090900000000000000000000000200090000000000000000000000000002000100000000000000000b00000000030005000000000002000000e00000010000000000000000ac7bc2de8c2057db3955f3a23e604be0e4c3b8689622e44973360d52e0129b3112b7989489499f0d5e1fafd52b57d418f18dab6a0600000094b9901b624130f4932786aad3218935e6f85302bf0caee669797505aa2a2347b700c8e7221dad1a4fd0409519a01770f5c5fff351515b3d9be1bb58e9afaf803ed8370cdc1d147d7aa739c5f42923b638bcc682fd786e1b92cef003d26af1a1d4134c67bb39e53db1947a009a1c7664000000000000000000000000000000e30594526764641f4de81efcf6c0e1dfc06fb674297f8bd453aa2f30a66b33bb75ea219199368e9c2a796036bfc3c3b2f34ea6c7b54ad8e8f2c2b397e73aa340d282bfea28689b16d172ea0e29bd586dfa4161cc67796bc50759865e9f3e7a75c1aaa25ba204cf437e84120a4e2c3f0a8e53820058ea9248b171aa42c968e8de6e6683c0981a0a1276f1314131a099595effffffff00000000db2e214ab4b1dd48c32a5ab480065901877b5d2fa3d579795151d2981fecbf90c66742c4784ef8fc36f9eb9552bc4653b07e360a75eb24dcb71857bbd57996ff2579389f719a2e14d5708af784bda7d66a695752bbb1727a52c2cf1e84cf4445c184c288e28bf55503e42e12bff5383dc2a7e2b6f6d009f22c9df265d51693298e768b6c3951e6683a3630a5e8cef2c2554f05cfd2c6106f397785bc1f5cc44fffc192c4dac50ace51da55bf2b1ec783ad191add"], 0x48}}, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x7) 14:54:50 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0xffffff7f) 14:54:50 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x28a382, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000380)=0x20, 0x4) getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f00000001c0)=0xe8) r3 = geteuid() setresuid(r1, r2, r3) futex(&(0x7f0000001100)=0x1, 0x800000000008, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x10000, 0x80) ioctl$sock_inet_SIOCGIFADDR(r4, 0x8915, &(0x7f0000000300)={'veth1_to_bond\x00', {0x2, 0x4e20, @broadcast}}) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) getsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000240), &(0x7f00000002c0)=0x153) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000080)=0x0) setpriority(0x0, r6, 0x9e) 14:54:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x8}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x500000000000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 999.255674][ T2137] FAULT_INJECTION: forcing a failure. [ 999.255674][ T2137] name failslab, interval 1, probability 0, space 0, times 0 [ 999.283582][ T2137] CPU: 0 PID: 2137 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 999.291498][ T2137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.301594][ T2137] Call Trace: [ 999.304910][ T2137] dump_stack+0x172/0x1f0 [ 999.309266][ T2137] should_fail.cold+0xa/0x15 [ 999.313875][ T2137] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 999.319703][ T2137] ? find_held_lock+0x35/0x130 [ 999.324495][ T2137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 999.332267][ T2137] ? debug_smp_processor_id+0x3c/0x280 [ 999.337748][ T2137] __should_failslab+0x121/0x190 [ 999.343396][ T2137] should_failslab+0x9/0x14 [ 999.349479][ T2137] kmem_cache_alloc+0x47/0x6f0 [ 999.354265][ T2137] ? ___might_sleep+0x163/0x280 [ 999.359130][ T2137] ? mempool_alloc+0x380/0x380 [ 999.363901][ T2137] mempool_alloc_slab+0x47/0x60 [ 999.368754][ T2137] mempool_alloc+0x16b/0x380 [ 999.373361][ T2137] ? mempool_destroy+0x40/0x40 [ 999.378492][ T2137] ? mark_held_locks+0xa4/0xf0 [ 999.383275][ T2137] ? lock_downgrade+0x880/0x880 [ 999.388137][ T2137] ? __find_get_block+0x9ba/0xcf0 [ 999.393162][ T2137] ? __getblk_gfp+0x1b1/0x970 [ 999.397847][ T2137] ? __find_get_block+0x9ba/0xcf0 [ 999.402890][ T2137] ? lockdep_hardirqs_on+0x418/0x5d0 [ 999.408189][ T2137] bio_alloc_bioset+0x3bf/0x680 [ 999.413047][ T2137] ? __find_get_block+0x317/0xcf0 [ 999.418083][ T2137] ? bvec_alloc+0x2f0/0x2f0 [ 999.422608][ T2137] submit_bh_wbc+0x133/0x7f0 [ 999.427211][ T2137] __bread_gfp+0x13d/0x300 [ 999.431650][ T2137] btrfs_read_dev_one_super+0xb6/0x2a0 [ 999.437659][ T2137] btrfs_read_dev_super+0x6c/0xd0 [ 999.442696][ T2137] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 999.448438][ T2137] btrfs_get_bdev_and_sb+0xff/0x300 [ 999.453646][ T2137] open_fs_devices+0x68e/0xbd0 [ 999.458428][ T2137] ? find_fsid+0x2e0/0x2e0 [ 999.462864][ T2137] ? memmove_extent_buffer.cold+0x44/0x44 [ 999.468600][ T2137] btrfs_open_devices+0x147/0x170 [ 999.473638][ T2137] btrfs_mount_root+0x79a/0x1220 [ 999.478592][ T2137] ? btrfs_decode_error+0x70/0x70 [ 999.483632][ T2137] ? rcu_read_lock_sched_held+0x110/0x130 [ 999.489360][ T2137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 999.495615][ T2137] ? vfs_parse_fs_string+0x111/0x170 [ 999.500908][ T2137] ? vfs_parse_fs_string+0x111/0x170 [ 999.506207][ T2137] ? rcu_read_lock_sched_held+0x110/0x130 [ 999.511947][ T2137] ? kfree+0x1fa/0x230 [ 999.516026][ T2137] ? vfs_parse_fs_string+0x116/0x170 [ 999.521332][ T2137] ? btrfs_decode_error+0x70/0x70 [ 999.526449][ T2137] legacy_get_tree+0xf2/0x200 [ 999.531139][ T2137] vfs_get_tree+0x123/0x450 [ 999.535654][ T2137] fc_mount+0x17/0xc0 [ 999.539646][ T2137] vfs_kern_mount.part.0+0xd8/0xf0 [ 999.544765][ T2137] vfs_kern_mount+0x40/0x60 [ 999.549278][ T2137] btrfs_mount+0x2b4/0x15e2 [ 999.553792][ T2137] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 999.559430][ T2137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 999.565678][ T2137] ? should_fail+0x1de/0x852 [ 999.570278][ T2137] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 999.576104][ T2137] ? btrfs_remount+0x11f0/0x11f0 [ 999.581067][ T2137] ? rcu_read_lock_sched_held+0x110/0x130 [ 999.586797][ T2137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 999.593039][ T2137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 999.599291][ T2137] ? vfs_parse_fs_string+0x111/0x170 [ 999.604581][ T2137] ? vfs_parse_fs_string+0x111/0x170 [ 999.609879][ T2137] ? rcu_read_lock_sched_held+0x110/0x130 [ 999.615605][ T2137] ? kfree+0x1fa/0x230 [ 999.619688][ T2137] ? vfs_parse_fs_string+0x116/0x170 [ 999.624987][ T2137] ? btrfs_remount+0x11f0/0x11f0 [ 999.629929][ T2137] legacy_get_tree+0xf2/0x200 [ 999.634615][ T2137] ? btrfs_remount+0x11f0/0x11f0 [ 999.639562][ T2137] ? legacy_get_tree+0xf2/0x200 [ 999.644423][ T2137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 999.650672][ T2137] vfs_get_tree+0x123/0x450 [ 999.655190][ T2137] do_mount+0x1436/0x2c40 [ 999.659541][ T2137] ? copy_mount_string+0x40/0x40 [ 999.664491][ T2137] ? _copy_from_user+0xdd/0x150 [ 999.669383][ T2137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 999.675629][ T2137] ? copy_mount_options+0x280/0x3a0 [ 999.680842][ T2137] ksys_mount+0xdb/0x150 [ 999.685094][ T2137] __x64_sys_mount+0xbe/0x150 [ 999.689784][ T2137] do_syscall_64+0x103/0x610 [ 999.694392][ T2137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 999.700289][ T2137] RIP: 0033:0x45b69a [ 999.704192][ T2137] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 999.723886][ T2137] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 999.732299][ T2137] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 999.740274][ T2137] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 999.748252][ T2137] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 14:54:50 executing program 5: socket$key(0xf, 0x3, 0x2) 14:54:50 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000014c0)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, 0x90) shutdown(r0, 0x0) getsockopt(r0, 0x1, 0x0, &(0x7f0000000000)=""/139, &(0x7f00000000c0)=0x8b) recvmmsg(r0, &(0x7f0000001300), 0x4000000000001a1, 0x0, &(0x7f00000013c0)={0x0, 0x1c9c380}) writev(r0, &(0x7f00000000c0), 0x1) [ 999.756228][ T2137] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 999.764207][ T2137] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:50 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x40030000000000) 14:54:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x17}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x600000000000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:50 executing program 2 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f00000002c0)={0x37e, 0x6, 0x0, [{0x6, 0x0, 0x100000001, 0x8, 0x100, 0x2, 0x4}, {0x6, 0x4, 0x3f, 0x0, 0x0, 0x7fffffff, 0xdcb2}, {0xfff, 0x0, 0xffff, 0x8f, 0x4, 0x0, 0x1}, {0x7, 0x4634, 0x2, 0xf44, 0x2, 0x2, 0x200}, {0x7, 0x1, 0x3f, 0x9edd, 0x6, 0x2, 0x3}, {0x7582, 0x3f, 0x401, 0x3, 0x7, 0xfff, 0x98}]}) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0203000909000000000000000000000002000900000000000000000000000000020001000000f95f464cfff505997b00000000000b000000ff010000000000000002000000e000000100000000000000005ad86a8aa00f6b93b7e03fdef226b14ff6b9cdb80db19f099b707d49d519e4714b24b03c6b60f2b82bfadcfaa2e4c2bf69be887c0baeab8ebfaab110376453cf910e8ccb11d457cae45659e8d6d7a287ab0454289201d1150724a7e7b1f38374ef499e8ea5f87211265ce3fd15e34bcc20b1ebe2c72716412a"], 0x48}}, 0x0) 14:54:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x18}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:50 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x3ed, 0x940000, 0x1000000, 0x0, 0x196, 0x132}}, 0xffffffffffffffff, 0x35c, 0x91, 0x1}, 0x20) 14:54:50 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x100000000000000) [ 1000.075425][ T2258] FAULT_INJECTION: forcing a failure. [ 1000.075425][ T2258] name failslab, interval 1, probability 0, space 0, times 0 [ 1000.093567][ T2258] CPU: 1 PID: 2258 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 1000.101476][ T2258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.111542][ T2258] Call Trace: [ 1000.114852][ T2258] dump_stack+0x172/0x1f0 [ 1000.119273][ T2258] should_fail.cold+0xa/0x15 [ 1000.123879][ T2258] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1000.129692][ T2258] ? find_held_lock+0x35/0x130 [ 1000.134465][ T2258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.140717][ T2258] ? debug_smp_processor_id+0x3c/0x280 [ 1000.146189][ T2258] __should_failslab+0x121/0x190 [ 1000.151132][ T2258] should_failslab+0x9/0x14 [ 1000.155641][ T2258] kmem_cache_alloc+0x47/0x6f0 [ 1000.160428][ T2258] ? ___might_sleep+0x163/0x280 [ 1000.165286][ T2258] ? mempool_alloc+0x380/0x380 [ 1000.170060][ T2258] mempool_alloc_slab+0x47/0x60 [ 1000.174918][ T2258] mempool_alloc+0x16b/0x380 [ 1000.179523][ T2258] ? mempool_destroy+0x40/0x40 [ 1000.184298][ T2258] ? mark_held_locks+0xa4/0xf0 [ 1000.189117][ T2258] ? lock_downgrade+0x880/0x880 [ 1000.193979][ T2258] ? __find_get_block+0x9ba/0xcf0 [ 1000.199358][ T2258] ? __getblk_gfp+0x1b1/0x970 [ 1000.204047][ T2258] ? __find_get_block+0x9ba/0xcf0 [ 1000.209081][ T2258] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1000.214381][ T2258] bio_alloc_bioset+0x3bf/0x680 [ 1000.219245][ T2258] ? __find_get_block+0x317/0xcf0 [ 1000.224278][ T2258] ? bvec_alloc+0x2f0/0x2f0 [ 1000.228802][ T2258] submit_bh_wbc+0x133/0x7f0 [ 1000.233407][ T2258] __bread_gfp+0x13d/0x300 [ 1000.237839][ T2258] btrfs_read_dev_one_super+0xb6/0x2a0 [ 1000.243315][ T2258] btrfs_read_dev_super+0x6c/0xd0 [ 1000.248350][ T2258] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 1000.254097][ T2258] btrfs_get_bdev_and_sb+0xff/0x300 [ 1000.259306][ T2258] open_fs_devices+0x68e/0xbd0 [ 1000.264087][ T2258] ? find_fsid+0x2e0/0x2e0 [ 1000.268520][ T2258] ? memmove_extent_buffer.cold+0x44/0x44 [ 1000.274249][ T2258] btrfs_open_devices+0x147/0x170 [ 1000.279285][ T2258] btrfs_mount_root+0x79a/0x1220 [ 1000.284243][ T2258] ? btrfs_decode_error+0x70/0x70 [ 1000.289275][ T2258] ? rcu_read_lock_sched_held+0x110/0x130 [ 1000.295005][ T2258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.301257][ T2258] ? vfs_parse_fs_string+0x111/0x170 [ 1000.306549][ T2258] ? vfs_parse_fs_string+0x111/0x170 [ 1000.311846][ T2258] ? rcu_read_lock_sched_held+0x110/0x130 [ 1000.317573][ T2258] ? kfree+0x1fa/0x230 [ 1000.321650][ T2258] ? vfs_parse_fs_string+0x116/0x170 [ 1000.326954][ T2258] ? btrfs_decode_error+0x70/0x70 [ 1000.331987][ T2258] legacy_get_tree+0xf2/0x200 [ 1000.336685][ T2258] vfs_get_tree+0x123/0x450 [ 1000.341199][ T2258] fc_mount+0x17/0xc0 [ 1000.345195][ T2258] vfs_kern_mount.part.0+0xd8/0xf0 [ 1000.350317][ T2258] vfs_kern_mount+0x40/0x60 [ 1000.354832][ T2258] btrfs_mount+0x2b4/0x15e2 [ 1000.359345][ T2258] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1000.364984][ T2258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.371228][ T2258] ? should_fail+0x1de/0x852 [ 1000.375840][ T2258] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1000.381660][ T2258] ? btrfs_remount+0x11f0/0x11f0 [ 1000.386615][ T2258] ? rcu_read_lock_sched_held+0x110/0x130 [ 1000.392342][ T2258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.398591][ T2258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.404838][ T2258] ? vfs_parse_fs_string+0x111/0x170 [ 1000.410129][ T2258] ? vfs_parse_fs_string+0x111/0x170 [ 1000.415426][ T2258] ? rcu_read_lock_sched_held+0x110/0x130 [ 1000.421152][ T2258] ? kfree+0x1fa/0x230 [ 1000.425234][ T2258] ? vfs_parse_fs_string+0x116/0x170 [ 1000.430531][ T2258] ? btrfs_remount+0x11f0/0x11f0 [ 1000.435476][ T2258] legacy_get_tree+0xf2/0x200 [ 1000.440165][ T2258] ? btrfs_remount+0x11f0/0x11f0 [ 1000.445108][ T2258] ? legacy_get_tree+0xf2/0x200 [ 1000.449968][ T2258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.456220][ T2258] vfs_get_tree+0x123/0x450 [ 1000.460742][ T2258] do_mount+0x1436/0x2c40 [ 1000.465084][ T2258] ? copy_mount_string+0x40/0x40 [ 1000.470040][ T2258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.476289][ T2258] ? copy_mount_options+0x280/0x3a0 [ 1000.481498][ T2258] ksys_mount+0xdb/0x150 [ 1000.485749][ T2258] __x64_sys_mount+0xbe/0x150 [ 1000.490439][ T2258] do_syscall_64+0x103/0x610 [ 1000.495130][ T2258] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1000.501035][ T2258] RIP: 0033:0x45b69a [ 1000.504945][ T2258] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 14:54:51 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x700000000000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:51 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000200)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000001300)={0xd46e, {{0x2, 0x4e21, @multicast1}}}, 0x88) r2 = open(&(0x7f0000000180)='./file0\x00', 0x8483c, 0xb) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r2, 0x29, 0xd3, &(0x7f0000000100)={{0xa, 0x4e24, 0x56, @dev={0xfe, 0x80, [], 0xb}, 0x2}, {0xa, 0x4e21, 0x80000000, @mcast1, 0x2}, 0xff800, [0x1f, 0xff, 0x9, 0xfff, 0x4, 0x0, 0xfa, 0x100]}, 0x5c) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x40000) ioctl$EVIOCGUNIQ(r3, 0x80404508, &(0x7f0000000300)=""/4096) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000080)) setsockopt$TIPC_MCAST_REPLICAST(r2, 0x10f, 0x86) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f00000000c0)={0xa, 0x0}) [ 1000.524548][ T2258] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1000.532964][ T2258] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 1000.540936][ T2258] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 1000.548906][ T2258] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 1000.556882][ T2258] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1000.564857][ T2258] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 14:54:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x1a}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x3, 0x0, 0x9, 0xd, 0x0, 0x0, 0x0, [@sadb_ident={0x2, 0xa, 0xfffffffffffff000, 0x0, 0x200}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e23, 0x5, @rand_addr="38de51f63fb0ee5f4d8072fee6ce7fc4", 0xfffffffffffff042}}]}, 0x68}}, 0x0) 14:54:51 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x200000000000000) 14:54:51 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000380)='bpf\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5}, 0x2c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x420000, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000240)={0x1, 0x3f}, 0x2) syz_read_part_table(0x1, 0x5, &(0x7f0000001540)=[{&(0x7f00000002c0)="1aa989256269bad86e8b77b9b5307af5a1904ad2596cb9cd5e1d94c83584c1000ff1597475d3f05e131cbb44b460328ba9393ac6b5a95da6f7270c8a769540d531a2ee37d678235b5cd92cba92d10f3398016df8e638940c6d1fbaa9863a624e63938253cd4ac0f48074e7646176e807c19b06e2620ebf0884f160014d6e38e3743b", 0x82, 0x1}, {&(0x7f0000000440)="9813e90a224b70bee0b844bd96e35c458d50540ae228e620cd8555b9f4a5abb7cdc3a59350a567145ce0de903a6340abea0fc873477dd78360606021e2bb496bff8b1d61510e36cba7daa661106d8192970bb24e27a10929baf2c30871d2f9b0b36469ca4570d19b2809298c2cb5", 0x6e, 0xd53}, {&(0x7f00000004c0)="c55bc96b502ad1b9059256ec5385fb0af5728efae738b7c4e63d44111ce30aef9055e76d1ed3802beb72245dea305dd54be4a4a7aca24bf467ec8651951590b67699de36aadf1759f95f59a26a1aa69ba41f040875d4488fe1919aedaaef7a1b1ffb46aaac0f57b62c76df5749874e92d0fc38562c99d47765388c10be770440", 0x80, 0x7fffffff}, {&(0x7f0000000200)="42c46ec3ee90399201683d11329ae9f34596", 0x12, 0x8d}, {&(0x7f0000000540)="b77216b0281dd75bf201d8e3eebe64700e3d775b79afa2db2995f1f1a4fe5348f2a9af2cc65783e184ee6b2ac2eeaa65ba6591aa8a463ff2a5c4a373b1e5fb93f3c52303297160a0a5aadc85bcb6f0cdf441a18b2abdfe0aa2ce33862f3ed99d91f606e49ab9761a77540badd0024f2eb39b9e91ee34e817d95b01d6aacfa34de392275d920340367857f7168d6754117e142d19db31faac7720f165157ac4c4c348c7182c52956b48bab38680b7e26c05f7acb25f35dbdbbd13a4cbfd0ed9dd77004b0244120b8f8f3a3a4d758cb41309caa420ebb038df673ae0c208a4ec96694855192cc56a17b9f7b2caf54cc032e832c12050a782999f66dcc80f0b25c399eb5f547cc554c95f952467a824e27aefd72cbf36627f26bf86842bb1387e58f18324dbbcf097aa9dc49bd454b3be5ccde30ab17a34906655c0b5b6fa87b1bb87d8d429bd7451613d1682832bf5a391764f0ab1547e7c42c88ccba90a1170e4739ff86f4ed0504eaf09e390660ece1401d1a1f0f4632cbe984fd86b0e312431eafc079e1d0b9539250f26a8b15030b4ba6424bf69445168d88181b2095070c5e378c4e17e44fb3f1d48bb1a6f3f07f17a3ee7456b79dd5b824c3b78e149233397d7b0b144b5222f61b81e9a3e8c08c0152fc5323f89232873992acaa35df9d3e789f68f92100d2210c4102ba6ac4c9939b53cbc05b217002c4aad2864d4836a12ff8cbb80a94aecb4460180e714149b98e27b40e516b2ffb9dab14462efce8f89468d583615bac9ad0d195528e98fabf2c5fb891349015521a1053e36e0a3c81263bd1cf33ea35354e6f948b863c4c3ee21c2c86f543be519acd86dd299775a048dff32cf2bd96f43a16fba686e817f22ebfb721ef1ac7ae3a1fb888fba56c0bdb1fe68487744b1ad037a9a5ab896de977ba792e45cfe3afec983d88eace32379de684e31c9e5f713b5063d68f91e64068504ef9f7c4f9e0d50cfeb5849dc98e8802382fee29455b08ef90b7b3178d6ce36699fe52ccdfb8a628ec869e2daeb533d8c57357fc09c806ab0b732f76e78e715a3d1c18cbc8543022a26a66b700fe200ce690f9b1d5fbbdfd02ee046418862beb2ebf05c8507005912ff8ec0f18c9be4e4c053f1a64239f32726d01702d7592e6678096ef521038dcf21f9157ff9f347de274e7e60bb4dd36cfb8af6138bfbd3840ec476d842ba31ae0954dd265eaf4d753e8dc41d9b7b3d148192b5136631314d36954e5298f5c8cd20f3e7c7720246c7b863b69c493f7f754f3b4d1623a4c762789dd8dd9a7162ba74220c731db76ca5650636bd3c50804dafcd313e5a738490bccdad0cae83de5f114ed8de9204fff453bfefcafea8f1e135fa265dde6a897117e62ba02ca488fa083da06363d2d5d486ab7b66f30bb10b40189a97955077fcf59c87e8981d011cb907a2bc51f0abf72116bdccd9cdff1c9965ae5cea4dca4639e2edf6a0abf658b278037ad960126ff6a1128be6c01ef3518c978107bb61172349771a19db63beca84caeaea614fbef988179105e614b976ce45aeb9af3004e4d9657f8d05fbfcd0cf0d60268b878e04b80f628c89bbb2951e6879bf402a8e5b5540c3d7752c82767160449dadbf8a834b5018ffa60f1df50a8292ba38fdcfda01650cbdea44beac30de16288762e456b7402c32806baa72d7e7cf613e7a3415b9421cd6e929ee1f48448b42e773b75fe8a61c504ff399c780d058007dff7213446b6aaea0a37970f051e71b8f68f1b98e2adc4d301f2354c0d37efade7a68b9e2aab665bc8e8999ecfcbe1074b8c62dbf817efb4d243e85b22607c3d7f59a969d655bda2a9deb74e34247446b714c441c7742a62fa502d4e3f1d9480fc9b255236f0e15494ee65d336682d44548b84ca309139a838b1bf0c1f242d10004217f85459cd407103b5fe13e5491b97d99147ff7c43a6dd52adc171196c2e43d737f603d1663e59bbb41560ff515a325eae14cfb82fdcb9d53528d74389dcb143893f240721c8c7630160a897c860217241d5962205990574048a2446a11fc0b70a8cc8f83e6632e74fe50fe457eafb4b8c1d9d7dd9714fdab80d45babbd7435a94dae3a3f12181c148cae47435a4744b7d6cae0b5a92e15f3b4be06758be3f2e18f926cc44db0ea93466134f1366684df6ef0a0e707e50a3e56ca2a573195047493dbcb2f02daac358d5e91b90bc3cb485a86686403cb0bd2e59b4120b1cedc883270bda3e72f29ae3f744654ac1ee4505ed08a6219c6548efff7cafbd24b413d55d48ba2309ba04423927e44337cf725373c511f6ad424aaa00d3e29a25bffb77c0175987030c588a2e091eaf7d554341592eb24d681d9ec47d8d717b076ba48345866155e618967d71d785e9aed890dc0ab8346583046ecff5cb9422cb607fcfe83d8ef26548d281056036af6998b1028b72f1c0ca215c39267c9bd86a93d0f0e019dae53c396741de119f8587dfeb8f49dc639e62135121e0e41027c57161fb83cd69ea0eeecc22493d42ffcedc74998cfbe9e45b85b5c6b2d309630b09a9998b10c76d031d42a869b566d3fa44d645d3af71b7ff57374b55eb692360a36df8dc6f01604a7447cc236825cb01ac095165d4c0bd306537e6e13f3413327869d320887ef1fa84fee7bfcb5db6f8a126ffdd75287f055da26f7499a411b28178ec29c972b4907bf988de354829413a744d3f3431cc71633996b93badafac188aa5784a1016d25683620ad5bab5cf82e07ec3d6b0099e97c7929ca60495f9e0e08930647584e686ba5ce3db14afca94f1b7bf547125cfc7e693f21edc64e340c0b7166ce9201a85d5619a25cde61ab941f5c0a849a79f017e902911ab7c46cb592aa3510e3c65c524c1da88bc704947c34791b5c302ff72e356568fde62c085e6f152752a501732d5aad6973af45e4695c736f8fa48bcddc55fee24614e2744d9a13977a0a349c09ff23fda210d97bc20caa6d7c9a451a9bf83ac9ab0e3fa3fc4f2882229abbbe9a99dfa30429a8b706f58dd2ef8ed52ae7a6b9a553e67174ffa54bc90755619d8a68858802a504e77072152a009bf755daa434ce040651709bdab590962b4cf0c4720db2e867f9de11e67be2e7bbc7c2b4682deba92df79e3684db78e09c9c392d9f0ca70f93c656c44545e526b22c72130cb30c6653a5fc61cb1cf18db84322842149d10ce49ca368229e5c8aa514db95a42ff1b90d541cf4c878c21fe2fb0258ee067af0b4a44d79763d2e7c68130c4951a9d7ebb77d0b907ab7510a8384bc1f3e8c68d3f47fb719862745445f471737c0c17627f95883f4785e101ee2672241fa3618db9e91e02c4238dad1602b6aae280e64001e68ef9a7b48800c1c8832dcbf8b0ef9a8fc06ec941ee7216753161b05c6103934da43509ea69a49c0bfa9546e411013928bbed95cdf42e4864ad41140c63b1b39b03ac7fe39054105423bd29cdbb72bb4211106b238019c6a329f6e338500f41b8e807c44ef02d1066417b12f64e2c719b8090e345b2effd0f1766025e9a6e92bbcdee586e2dd1170b9eb0aa0ef088ffb674d4135be5f0e54cf76bcf0b504ab06a6244dc0a63f5df8ca7c11b5518a9c15068324e106e3c2b8cb787c82b966c34f53b2560d7c8586cad17fb2178f5a22e761cc260c6fff64677f03265f60792f21288cc38aecf5d84507a56e50621e5589a5eca35082e2aa98d37f0b448b51cf9f0b4772d77848bd97bc7db6cbd0992b04b2e4241396a5b03b14b768412889f425b15a7602bc718c22da8170c86e39bf7f19449fc40e353ed58d9cfe53508724f507d958ecf4594c192254d3343e684cf4b47247716cb5a0871fdd340c6687c56a571d602e355a9c5729cc384ed68a2a9cd294750a17df90a6304bbd6ad5b8c9388db8af59fd6283616d7cdee5adec4bed122d50fab1e37808c593903f6ff30fe16b0328f6c6558b5a4594e9c9a39d6ba4e5b70bc8a28dfa25ba7ee53ea1fbb894b43d070059e6805ff2f917882ac8fa8aa617f89bf2a237b23de48c6524f5aec7e4c29842fdfdb7a889032570306c5ecbc590ae61e7779bed209c499d411c2ca9a599b51b12a1c5a69a2c6e12be7b0673ec85bdb005f5b0d0a406cf60a2bb50a90f425fdb65a12835f833f6f4aafb7d74ddcae09e4700d0d43a1141323e963318030dbcfed42d18a6f7cf96356b2b26b6d6331b91c6c5ba7883d17de1983e87b5e44fee90f278d129b9fc9cbf1b5f2fc17143b17f1556c1ef6e44d1ff5e10be05df23331ca4609f4f5084b9fe7ae84b54f667158e9be2e9ce357fbda520c926fc28da2b8a00f3e8ba4397306bf69aa830f271b660f862c0bdfab4c76eca97b8f92561fcfbca74945e3c6cae49216814719ec271622e59b772d5521f012f13f3b6688b9eda780312f09e48857c6eb4f0161525f856a20c52871e45f3da74db7304f0125155a0456f656a32529b27de32322cca7abbfed559911e17ae277982cb592643923a358cc08250561d5ebac4a3b275364fcfdaca08a8391e92566ed91da600a054cd942046d77aa962a451931fd805a65e3fe07ec5eb25031321863aca31fd480b94d9845d77f63a9d4d7bc443399a08638536a2b3e5e0223dc5490f84e01ce8456ef0a1799c70df0c40381e90d74a7fe74252e3362deb4fd809869fde522d4f5309e8e8fb0c2309b4fc0d6dbddb6f704c973fa07a089777a497f2bb05004e53a0ebbb94b9e98932029ef8f5338b8e9b6c13db5b1bc5aaf9d68302eba0a2294d1b6fc5b1bb25efb438cded7b0106e4b98650bef00bd8842e87f5707d955c193e1cbeac2e66971b080f9678df8058bcfbdbf4e39b6a2ae44f70f396e072e67034cad4a17f344c8a369fd8ef730c71711fde84dd6c3ffd66dcbc4254698c87750e794ccc927292ab5e8ec3c3cda4e237af013b452f0d6774c346a4c07d3dc571bac170e0a6255f179315d29d8daeb7b6bbf911898a55017dc59a4008cc6d537cf9e3c9265fd8ac19d616e8c0c78462aafc878d6ec176b3adb2124bd66c3793e5077dbb6f6b892dfd82854335ac55b48649e01acea2617fdda0eb4d3a9422a12a5d013e0f11c934043437bff6227d7744ffd3b5417c83282d5b3261afb7fb13afc1b711747baa6b4a63f8516c4d3f97093fdcb751af80f1a4ac595996137729e00f438643a6ab4e70b59a7d8f18ae88ced09f14206ceb604be276da2e30d9a5bab9f6a66877faa7969298925bab5111a9e196f82e58f20a9eaa38ceebe32a74fd0ff95787f05ddd45eb582bf7457fa2ad6d641b591e1991d89f39039e36d295f58804a280b4957799c65f6e82f3b06a8fec76c0463a374376c6ba8f5468e6d4fa48f52e9e490ca5589b245505ac7ee389cbc8bd932f0711caac2d85c1dd6d8402feca1baeb499f05d105663dff5443d3943465e3a3456af3111a30c7e00de53fd91deba9e2c1a57b97bed66117dcebdaa8ee337e0c3f7aa5642fa80cf7b0299608a6ec457bb19f4073a9b6b803f8f459296040af4aaa896bb226d7ef04a9f6de75d48c4a04dbba3fb58a966c653eee69a2ca78227beae43c6154c8d399518fcdc6ebb5ba9da5675934e816fd061bc674126ccd201833da4a06d169b7dfc4d7a5ec4505caaea7ee1bed6772549ece90f2d835fb84892c9e10ccce1c8a88da199e1ca2b1149c0b63499e736b1e21f8e8f90d07ce73eebdf7ac60abaf64ef5da209e59c1173f7b86c27a169eaa0261da57f3d9cdd29add46738215dd78be9134f3f10218954f05c2b370596ff05366c0a533", 0x1000, 0xae64}]) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f00000000c0)='./file0/file0\x00', r0}, 0x10) futex(&(0x7f0000000040)=0x1, 0x9, 0x1, &(0x7f00000003c0)={0x0, 0x989680}, &(0x7f0000000180)=0x2, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x2009, 0x0) 14:54:51 executing program 2 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 14:54:51 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x2000000000000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) 14:54:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x2}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 1000.799568][ T2279] FAULT_INJECTION: forcing a failure. [ 1000.799568][ T2279] name failslab, interval 1, probability 0, space 0, times 0 [ 1000.840742][ T2279] CPU: 0 PID: 2279 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 1000.848672][ T2279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.858731][ T2279] Call Trace: [ 1000.862047][ T2279] dump_stack+0x172/0x1f0 [ 1000.866400][ T2279] should_fail.cold+0xa/0x15 [ 1000.871002][ T2279] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1000.876828][ T2279] ? ___might_sleep+0x163/0x280 [ 1000.881699][ T2279] __should_failslab+0x121/0x190 [ 1000.886651][ T2279] should_failslab+0x9/0x14 14:54:51 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x400000000000000) 14:54:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000001c0)) sendmsg$key(r0, &(0x7f00000000c0)={0x3, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB="020351ca46d6fad41ec4b2ef1d2dc9090000000000000000000000020008ffffe920000000000000000000fa572c0600000000ebffff01011000100000000000002000000000000000000000000000000000005259607b9a087645e97ab9c403c5f98e48f811e795a826146bcf809330c95f1441a797082effafbf7966d58e51cddd006d44b1b827961dc00801000000b9a212646faa712624875a824451617d1ef93125f3d48d0283"], 0x158}}, 0x0) socket$key(0xf, 0x3, 0x2) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 1000.891175][ T2279] __kmalloc+0x2dc/0x740 [ 1000.895436][ T2279] ? close_fs_devices.part.0+0x219/0x790 [ 1000.901086][ T2279] close_fs_devices.part.0+0x219/0x790 [ 1000.906572][ T2279] btrfs_close_devices+0xa0/0x200 [ 1000.911609][ T2279] btrfs_mount_root+0xf0c/0x1220 [ 1000.916570][ T2279] ? btrfs_decode_error+0x70/0x70 [ 1000.921618][ T2279] ? rcu_read_lock_sched_held+0x110/0x130 [ 1000.927350][ T2279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1000.933602][ T2279] ? vfs_parse_fs_string+0x111/0x170 [ 1000.938892][ T2279] ? vfs_parse_fs_string+0x111/0x170 [ 1000.944183][ T2279] ? rcu_read_lock_sched_held+0x110/0x130 [ 1000.949914][ T2279] ? kfree+0x1fa/0x230 [ 1000.953996][ T2279] ? vfs_parse_fs_string+0x116/0x170 [ 1000.959292][ T2279] ? btrfs_decode_error+0x70/0x70 [ 1000.964332][ T2279] legacy_get_tree+0xf2/0x200 [ 1000.969018][ T2279] vfs_get_tree+0x123/0x450 [ 1000.973542][ T2279] fc_mount+0x17/0xc0 [ 1000.977544][ T2279] vfs_kern_mount.part.0+0xd8/0xf0 [ 1000.982671][ T2279] vfs_kern_mount+0x40/0x60 [ 1000.987194][ T2279] btrfs_mount+0x2b4/0x15e2 [ 1000.991710][ T2279] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1000.997353][ T2279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.003599][ T2279] ? should_fail+0x1de/0x852 [ 1001.008202][ T2279] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1001.014021][ T2279] ? btrfs_remount+0x11f0/0x11f0 [ 1001.018978][ T2279] ? rcu_read_lock_sched_held+0x110/0x130 [ 1001.024705][ T2279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.030955][ T2279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.037219][ T2279] ? vfs_parse_fs_string+0x111/0x170 [ 1001.042510][ T2279] ? vfs_parse_fs_string+0x111/0x170 [ 1001.047811][ T2279] ? rcu_read_lock_sched_held+0x110/0x130 [ 1001.053550][ T2279] ? kfree+0x1fa/0x230 [ 1001.057636][ T2279] ? vfs_parse_fs_string+0x116/0x170 [ 1001.062971][ T2279] ? btrfs_remount+0x11f0/0x11f0 [ 1001.067913][ T2279] legacy_get_tree+0xf2/0x200 [ 1001.072604][ T2279] ? btrfs_remount+0x11f0/0x11f0 [ 1001.077550][ T2279] ? legacy_get_tree+0xf2/0x200 [ 1001.082407][ T2279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.088655][ T2279] vfs_get_tree+0x123/0x450 [ 1001.093168][ T2279] do_mount+0x1436/0x2c40 [ 1001.097513][ T2279] ? copy_mount_string+0x40/0x40 [ 1001.102464][ T2279] ? _copy_from_user+0xdd/0x150 [ 1001.107329][ T2279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.113572][ T2279] ? copy_mount_options+0x280/0x3a0 [ 1001.118784][ T2279] ksys_mount+0xdb/0x150 [ 1001.123036][ T2279] __x64_sys_mount+0xbe/0x150 [ 1001.127729][ T2279] do_syscall_64+0x103/0x610 [ 1001.132331][ T2279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1001.138225][ T2279] RIP: 0033:0x45b69a [ 1001.142126][ T2279] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1001.161743][ T2279] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1001.170166][ T2279] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 1001.178141][ T2279] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 1001.186117][ T2279] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 1001.194092][ T2279] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1001.202070][ T2279] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 1001.223127][ T2279] ------------[ cut here ]------------ [ 1001.228622][ T2279] kernel BUG at fs/btrfs/volumes.c:1281! [ 1001.241546][ T2279] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1001.243970][ T3876] kobject: 'loop3' (0000000048ab79ab): kobject_uevent_env [ 1001.247625][ T2279] CPU: 0 PID: 2279 Comm: syz-executor.2 Not tainted 5.1.0-rc5+ #72 [ 1001.247634][ T2279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.247659][ T2279] RIP: 0010:close_fs_devices.part.0+0x5c6/0x790 [ 1001.247679][ T2279] Code: 00 48 8b 45 c0 c7 80 30 01 00 00 00 00 00 00 48 83 c4 48 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 e1 c1 c6 fe 0f 0b e8 da c1 c6 fe <0f> 0b e8 d3 c1 c6 fe 0f 0b e9 16 ff ff ff e8 c7 c1 c6 fe 0f 0b e9 [ 1001.258707][ T3876] kobject: 'loop3' (0000000048ab79ab): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1001.262647][ T2279] RSP: 0018:ffff888088c97770 EFLAGS: 00010246 [ 1001.262660][ T2279] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc9000a22d000 [ 1001.262669][ T2279] RDX: 0000000000040000 RSI: ffffffff82a9cad6 RDI: 0000000000000286 [ 1001.262678][ T2279] RBP: ffff888088c977e0 R08: ffff8880928cc1c0 R09: ffffed1015d05bc8 [ 1001.262688][ T2279] R10: ffffed1015d05bc7 R11: ffff8880ae82de3b R12: ffff8880a69103d0 [ 1001.262696][ T2279] R13: dffffc0000000000 R14: ffff888090394d80 R15: ffff8880631a8480 [ 1001.262714][ T2279] FS: 00007fb0ba344700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1001.365038][ T2279] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1001.371619][ T2279] CR2: 00000000016d9000 CR3: 00000000a91f9000 CR4: 00000000001406f0 [ 1001.379588][ T2279] DR0: 0000000000000000 DR1: 0000000000004a3c DR2: 0000000000000000 [ 1001.387561][ T2279] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 1001.395533][ T2279] Call Trace: [ 1001.398842][ T2279] btrfs_close_devices+0xa0/0x200 [ 1001.403874][ T2279] btrfs_mount_root+0xf0c/0x1220 [ 1001.408823][ T2279] ? btrfs_decode_error+0x70/0x70 [ 1001.413858][ T2279] ? rcu_read_lock_sched_held+0x110/0x130 [ 1001.419579][ T2279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.425828][ T2279] ? vfs_parse_fs_string+0x111/0x170 [ 1001.431116][ T2279] ? vfs_parse_fs_string+0x111/0x170 [ 1001.436988][ T2279] ? rcu_read_lock_sched_held+0x110/0x130 [ 1001.442716][ T2279] ? kfree+0x1fa/0x230 [ 1001.446789][ T2279] ? vfs_parse_fs_string+0x116/0x170 [ 1001.452078][ T2279] ? btrfs_decode_error+0x70/0x70 [ 1001.457106][ T2279] legacy_get_tree+0xf2/0x200 [ 1001.461789][ T2279] vfs_get_tree+0x123/0x450 [ 1001.466295][ T2279] fc_mount+0x17/0xc0 [ 1001.470288][ T2279] vfs_kern_mount.part.0+0xd8/0xf0 [ 1001.475401][ T2279] vfs_kern_mount+0x40/0x60 [ 1001.479910][ T2279] btrfs_mount+0x2b4/0x15e2 [ 1001.484420][ T2279] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1001.490055][ T2279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.496301][ T2279] ? should_fail+0x1de/0x852 [ 1001.500896][ T2279] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1001.506706][ T2279] ? btrfs_remount+0x11f0/0x11f0 [ 1001.511654][ T2279] ? rcu_read_lock_sched_held+0x110/0x130 [ 1001.517374][ T2279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.523648][ T2279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.529900][ T2279] ? vfs_parse_fs_string+0x111/0x170 [ 1001.535190][ T2279] ? vfs_parse_fs_string+0x111/0x170 [ 1001.540480][ T2279] ? rcu_read_lock_sched_held+0x110/0x130 [ 1001.546204][ T2279] ? kfree+0x1fa/0x230 [ 1001.550279][ T2279] ? vfs_parse_fs_string+0x116/0x170 [ 1001.555575][ T2279] ? btrfs_remount+0x11f0/0x11f0 [ 1001.560518][ T2279] legacy_get_tree+0xf2/0x200 [ 1001.565208][ T2279] ? btrfs_remount+0x11f0/0x11f0 [ 1001.570144][ T2279] ? legacy_get_tree+0xf2/0x200 [ 1001.575001][ T2279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.581247][ T2279] vfs_get_tree+0x123/0x450 [ 1001.585768][ T2279] do_mount+0x1436/0x2c40 [ 1001.590101][ T2279] ? copy_mount_string+0x40/0x40 [ 1001.595034][ T2279] ? _copy_from_user+0xdd/0x150 [ 1001.599884][ T2279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1001.606121][ T2279] ? copy_mount_options+0x280/0x3a0 [ 1001.611313][ T2279] ksys_mount+0xdb/0x150 [ 1001.615555][ T2279] __x64_sys_mount+0xbe/0x150 [ 1001.620233][ T2279] do_syscall_64+0x103/0x610 [ 1001.624828][ T2279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1001.630715][ T2279] RIP: 0033:0x45b69a [ 1001.634606][ T2279] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1001.654201][ T2279] RSP: 002b:00007fb0ba343a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1001.662603][ T2279] RAX: ffffffffffffffda RBX: 00007fb0ba343b40 RCX: 000000000045b69a [ 1001.670567][ T2279] RDX: 00007fb0ba343ae0 RSI: 0000000020000100 RDI: 00007fb0ba343b00 [ 1001.678534][ T2279] RBP: 0000000000000001 R08: 00007fb0ba343b40 R09: 00007fb0ba343ae0 [ 1001.686500][ T2279] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 1001.694472][ T2279] R13: 00000000004c76c0 R14: 00000000004dd6e8 R15: 0000000000000003 [ 1001.702443][ T2279] Modules linked in: [ 1001.710803][ T2279] ---[ end trace 32e6f6be3465ca37 ]--- [ 1001.713848][ T3876] kobject: 'loop2' (000000008b1837f8): kobject_uevent_env [ 1001.723692][ T3876] kobject: 'loop2' (000000008b1837f8): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1001.724657][ T2279] RIP: 0010:close_fs_devices.part.0+0x5c6/0x790 14:54:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x35b6a46faf000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 1001.740803][ T2278] kobject: 'loop4' (00000000040707af): kobject_uevent_env [ 1001.758002][ T2278] kobject: 'loop4' (00000000040707af): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1001.769890][ T2279] Code: 00 48 8b 45 c0 c7 80 30 01 00 00 00 00 00 00 48 83 c4 48 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 e1 c1 c6 fe 0f 0b e8 da c1 c6 fe <0f> 0b e8 d3 c1 c6 fe 0f 0b e9 16 ff ff ff e8 c7 c1 c6 fe 0f 0b e9 14:54:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0xfb, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x4}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) 14:54:52 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x3f00000000000000) [ 1001.827857][ T2279] RSP: 0018:ffff888088c97770 EFLAGS: 00010246 [ 1001.840432][ T2279] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc9000a22d000 [ 1001.848864][ T2279] RDX: 0000000000040000 RSI: ffffffff82a9cad6 RDI: 0000000000000286 [ 1001.860901][ T2279] RBP: ffff888088c977e0 R08: ffff8880928cc1c0 R09: ffffed1015d05bc8 [ 1001.869645][ T2279] R10: ffffed1015d05bc7 R11: ffff8880ae82de3b R12: ffff8880a69103d0 14:54:52 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9, 0x10000e0}]}, 0x20}}, 0x400000000000000) 14:54:52 executing program 5: arch_prctl$ARCH_SET_GS(0x1001, 0xffffffff) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000140)=""/68, &(0x7f00000001c0)=0x44) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0x9, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x48}}, 0x0) [ 1001.880859][ T3876] kobject: 'loop4' (00000000040707af): kobject_uevent_env [ 1001.891156][ T2279] R13: dffffc0000000000 R14: ffff888090394d80 R15: ffff8880631a8480 [ 1001.899554][ T2279] FS: 00007fb0ba344700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 14:54:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x3f00000000000000, 0x3, 0xb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) [ 1001.923448][ T3876] kobject: 'loop4' (00000000040707af): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1001.927819][ T2279] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1001.949578][ T2279] CR2: 0000000020000040 CR3: 00000000a91f9000 CR4: 00000000001406e0 [ 1001.955555][ T3876] kobject: 'loop1' (0000000081024f63): kobject_uevent_env [ 1001.960758][ T2279] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1001.972820][ T3876] kobject: 'loop1' (0000000081024f63): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1001.976758][ T2279] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1001.984382][ T3876] kobject: 'loop3' (0000000048ab79ab): kobject_uevent_env [ 1001.991503][ T2279] Kernel panic - not syncing: Fatal exception [ 1001.998320][ T3876] kobject: 'loop3' (0000000048ab79ab): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1002.005038][ T2279] Kernel Offset: disabled [ 1002.019474][ T2279] Rebooting in 86400 seconds..